This section describes how to obtain the AKs and SKs of users and how to activate, deactivate, and delete access keys.