Viewing the Cryptographic Configuration of CMKs