Am I mixing up my technologies? You need stored security certificates to gain and maintain secure sessions with secure resources, but even if you have them, you still need authentication. Just having the keys themselves to get you in, no?
If these work like trusted certificates, then it is really just a footprint. It doesn’t necessarily mean that he accessed anything, but it certainly means he was capable of it, and more importantly, some premeditation by someone was created for him to.
Seems like it’s just a tiny tip of a huge iceberg
Nevertheless, if a fraction of Maxey's generalized allegations are true, for example the allegations concerning unauthorized possession of "keys" to the secrets, he is liable for a lot of jail time especially if one adds the alleged photographs of underage girls, the crimes concerning his loss of a handgun, drug possession and his tax violations.
The accumulated packages so serious that one must expect that Joe Biden will grant his son a pardon because the political cost of issuing the pardon would be trivial compared to the potential impeachment and criminal liability that might attach to Joe if a full-blown prosecution of Hunter begins to unravel the whole corrupt family business.
I assume it would be a plenary pardon because it is difficult to even identify the universe of Hunter's crimes. However, if the pardon is plenary then Hunter would lose the right to claim self-incrimination and would be forced to testify. If some small element were withheld from a pardon to save that right for Hunter to protect Joe, the inquiring agency might cut a deal with a prosecutor to extend immunity to take away the privilege against self-incrimination.
All of this assumes that we will have some identifiable semblance of rule of law that will spontaneously flower like tulips in the spring and there might actually be a real-life prosecution of Hunter Biden.

Am I mixing up my technologies? You need stored security certificates to gain and maintain secure sessions with secure resources, but even if you have them, you still need authentication. Just having the keys themselves to get you in, no?
—
If they’re RSA Public/Private keys, and if there is a private key stored on the laptop, then it’s all you need to access the server. No additional login required.
The $64,000 question would be who gave Hunter Biden a private key to access a DoD server.
Seems like the certificates would be for device side authentication...but why does he have them? Who gave them to him? This whole thing stinks and the lack of responsibility of their handling is criminal respective to national security.
The short answer is depends.
Basically comes down to what the key is used for. Some keys encrypt data at rest. Others = are used to encrypt sessions (data in motion). If the key is reused for both (poor practice) then you could access anything.