This section describes how to recover key access from:
Loss of a user-specified encryption password on a key copy.
Loss of login password.
Loss or unavailability of password on base key.