A process for creating and managing pairs of asymmetrical cryptographic
keys and/or certificates associated with the pairs of keys, each pair of
keys and associated certificates being intended for an object managed by
a computer system. The process includes creating an individual request
for creating and/or certifying at least one pair of keys for an object of
the system that lacks a pair of keys or a certificate for its pair of
keys.