Dashboard Guide
Key Management

Key Management

Tenuo uses a hierarchical key structure to enable secure delegation of authority. This page explains how to manage keys in the dashboard.

Key Hierarchy

                    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
                    β”‚   Root Key   β”‚
                    β”‚  (Ed25519)   β”‚
                    β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜
                           β”‚
              β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
              β–Ό            β–Ό            β–Ό
       β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
       β”‚ Issuer 1 β”‚ β”‚ Issuer 2 β”‚ β”‚ Issuer 3 β”‚
       β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜
            β”‚            β”‚            β”‚
            β–Ό            β–Ό            β–Ό
        Warrants     Warrants     Warrants

Key Types

TypePurposeCreated By
RootSigns issuer keys, anchor of trustYou (via dashboard/API)
IssuerSigns warrants for agentsRoot key
NotarySigns receipts for audit trailRoot key

Creating Keys

Navigate to Keys

Click Keys in the sidebar, then click Create Key

Select Key Type

Choose Root, Issuer, or Notary

Configure Key

  • Name: A descriptive name (e.g., "Production Issuer")
  • Parent Key: For issuer/notary keys, select the signing root key
  • Expiration: Optional expiration date

Create

Click Create Key. The key is generated and stored securely.

⚠️

Root keys should be created sparingly. Most organizations need only 1-2 root keys.

Key Operations

View Key Details

Click on any key in the list to view:

  • Key ID and fingerprint
  • Creation date and expiration
  • Parent key (for issuer/notary)
  • Child keys signed by this key
  • Recent operations

Rotate a Key

Key rotation creates a new key version while maintaining the key ID:

  1. Click on the key β†’ Rotate
  2. Confirm the rotation
  3. The old key version is marked as rotated
  4. New warrants will use the new key version

Existing warrants signed with the old key version remain valid until they expire or are revoked.

Revoke a Key

Revoking a key invalidates it and all warrants it has signed:

  1. Click on the key β†’ Revoke
  2. Enter a revocation reason
  3. Confirm the revocation
🚫

Revoking an issuer key invalidates all warrants signed by that key. Use with caution.

Suspend a Key

Temporarily disable a key without full revocation:

  1. Click on the key β†’ Suspend
  2. The key cannot sign new warrants while suspended
  3. Re-enable with Enable when ready

Key Hierarchy View

The Keys β†’ Hierarchy page shows a visual tree of your key structure:

  • See parent-child relationships at a glance
  • Identify orphaned or expired keys
  • Understand your trust chain

Best Practices

Use separate issuer keys per environment

Create different issuer keys for development, staging, and production. This limits blast radius if a key is compromised.

Set reasonable expiration dates

Root keys can have longer lifetimes (1-2 years). Issuer keys should rotate more frequently (30-90 days).

Monitor key usage

Review the audit log regularly to detect unusual key activity.

Have a rotation plan

Document your key rotation procedures before you need them.

API Reference