# Description Hardware keys are being attempted to be used for software key phones as well as software key phones are being allowed to create eIDs with verified env