-1

I have an encrypted "RSA PRIVATE KEY" ".key" RSA PKCS#1 key (which I understand from here) does not include a key type OID).

I also have the password to decrypt it. I am using it to create an encrypted and signed URL.

I have managed to get the code working locally, but now I need to figure how to secure it on an Azure web app (I'm using C# MVC 5 with .NET Framework 4.6 and a SQL Server back end). I was helped along by this great post, but it is an older link that either I can't figure out how to use or it's longer valid. Azure seems to only allow me to upload a .pfx file.

3
  • Is this for an https cert or something? You've explained this very poorly Commented Feb 8, 2017 at 1:14
  • @JoePhillips - Thanks for the critique - Does the new explanation clear this up? I'm trying to not go into much detail (due to the secure nature of the info.) Commented Feb 8, 2017 at 1:23
  • stackoverflow.com/questions/553149/… Try this and then update your question with more details. You may have to research how to do the same checks on windows (unless you have access to linux) Commented Feb 8, 2017 at 1:46

1 Answer 1

0

Depending on what you want to use it for you could use Azure Key Vault to store the secure key safely.

If you want to use the key to enable SSL then you probably need to do as suggested in comments and convert it to pfx-format and then upload it to the App Service.

Azure Key Vault can store your key and you can control access to it with role-based security in Azure. Import your key to the Key Vault and then access it securely from your application.

Sign up to request clarification or add additional context in comments.

Comments

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.