Cryptographic keys that protect access tokens are generated, managed, and protected from disclosure and misuse.