This chapter provides some information about how SAKA uses cryptographic keys and hardware modules, and the type of key management functions it enables.