Public key cryptography is used with key management systems (KMS). KMS is required whenever your organization uses USB tokens and smart cards. This type of system manages and compares keys found on these types of devices. For example, when a user swipes their smart card, the key on the card is compared and authenticated against a private key contained on a server. As long as the key can be authenticated, access is granted.
Public Key Cryptography and a KMS Can be Used to Generate, Update, Import and Distribute Keys
Another purpose of a key management system is to generate and update keys through a network service provide using a hardware security module. Keys have to be updated at various times, such as when an employee leaves the organization, their certificate expires, or a new key is issued for access to a new secure location. You can also import and distribute keys from members using a KMS with public key cryptography.