This example demonstrates how an application can perform multiple KMIP Re-Key operations in a row creating a chain of replaced keys.
Initially a symmetric key is created, then it is activated and re-keyed once. The first Re-Key operation creates a new key. The exmaple then shows that the new key can also be replaced by another KMIP Re-key operation.