-1

I have an encrypted "RSA PRIVATE KEY" ".key" RSA PKCS#1 key (which I understand from here) does not include a key type OID).

I also have the password to decrypt it. I am using it to create an encrypted and signed URL.

I have managed to get the code working locally, but now I need to figure how to secure it on an Azure web app (I'm using C# MVC 5 with .NET Framework 4.6 and a SQL Server back end). I was helped along by this great post, but it is an older link that either I can't figure out how to use or it's longer valid. Azure seems to only allow me to upload a .pfx file.

Community
  • 1
  • 1
Danimal111
  • 1,976
  • 25
  • 31
  • Is this for an https cert or something? You've explained this very poorly – Joe Phillips Feb 08 '17 at 01:14
  • @JoePhillips - Thanks for the critique - Does the new explanation clear this up? I'm trying to not go into much detail (due to the secure nature of the info.) – Danimal111 Feb 08 '17 at 01:23
  • http://stackoverflow.com/questions/553149/is-it-possible-to-convert-an-ssl-certificate-from-a-key-file-to-a-pfx Try this and then update your question with more details. You may have to research how to do the same checks on windows (unless you have access to linux) – Joe Phillips Feb 08 '17 at 01:46

1 Answers1

0

Depending on what you want to use it for you could use Azure Key Vault to store the secure key safely.

If you want to use the key to enable SSL then you probably need to do as suggested in comments and convert it to pfx-format and then upload it to the App Service.

Azure Key Vault can store your key and you can control access to it with role-based security in Azure. Import your key to the Key Vault and then access it securely from your application.

yoape
  • 3,285
  • 1
  • 14
  • 27