*Each origin will only have access to the asymmetric private key generated for it. This will minimize the need for any kind of access control dialog for key usage.
*The configuration object should be removed from the IDL as we move to a set of keys per domain