== Notes ==
; *Each origin will only have access to the asymmetric private key generated for it. This will minimize the need for any kind of access control dialog for key usage.*The configuration object should be removed from the IDL as we move to a set of keys per domain
== References ==