metaphor physical-security matchingboundarycontainer enableprevent boundary specific

Permissions Are Keys

metaphor dead established

Source: Physical SecurityAccess Control

Categories: securitycomputer-science

Transfers

The mapping from physical keys to digital permissions is one of computing’s most deeply embedded metaphors. It is so dead that practitioners rarely think about metal keys when discussing API keys, SSH keys, key rotation, or keychains. Yet the physical source domain continues to structure how access control is designed, discussed, and misunderstood.

Key structural parallels:

Limits

Expressions

Origin Story

The key metaphor enters computing through cryptography, where “key” has been used since at least the Caesar cipher to denote the secret that transforms plaintext into ciphertext. The cryptographic usage predates digital computing itself — the Enigma machine’s daily key settings were literal mechanical configurations. When digital access control systems emerged in the 1960s and 1970s, the key metaphor was already available and structurally apt.

The physical metaphor deepened as computing infrastructure grew. SSH (Secure Shell, 1995) introduced “key pairs” for remote authentication. AWS IAM (2011) organized cloud access around “access keys.” OAuth tokens, JWT tokens, and API keys proliferated through the 2010s, each using the key vocabulary even as the underlying mechanisms grew increasingly abstract. The physical metaphor persists because it provides immediate legibility: everyone understands keys and locks, even if the digital reality has long outgrown the physical model.

References

Related Entries

Structural Neighbors

Entries from different domains that share structural shape. Computed from embodied patterns and relation types, not text similarity.

Structural Tags

Patterns: matchingboundarycontainer

Relations: enableprevent

Structure: boundary Level: specific

Contributors: agent:metaphorex-miner