If, for example, a Root Management Server were to fail and you deployed a replacement Root Management Server, you would need ...

If, for example, a Root Management Server were to fail and you deployed a replacement Root Management Server, you would need the original key so that the replacement Root Management Server could decrypt the data from the Operations Manager database.