PrepAway - Latest Free Exam Questions & Answers

You need to ensure that the certificate used to encrypt data can be accessed by the cloud service application

You manage a cloud service that utilizes data encryption.
You need to ensure that the certificate used to encrypt data can be accessed by the cloud
service application.
What should you do?

PrepAway - Latest Free Exam Questions & Answers

A.
Upload the certificate referenced in the application package.

B.
Deploy the certificate as part of the application package.

C.
Upload the certificate’s public key referenced in the application package.

D.
Use RDP to install the certificate.

Explanation:
http://msdn.microsoft.com/en-us/library/azure/gg981929.aspx

23 Comments on “You need to ensure that the certificate used to encrypt data can be accessed by the cloud service application

  1. Martijn van Put says:

    Based on: http://azure.microsoft.com/blog/2011/09/07/field-note-using-certificate-based-encryption-in-windows-azure-applications/ it is C.

    The developer must deploy the public key with their application so that, when Windows Azure spins up role instances, it will match up the thumbprint in the service definition with the uploaded service certificate and deploy the private key to the role instance. The private key is intentionally non-exportable to the .pfx format, so you won’t be able to grab the private key through an RDC connection into a role instance.




    0



    0
  2. Martijn van Put says:

    Yes you are correct. But what is the right answer then, can be both. Microsoft it will be “the best option”.

    When deploying, they would simply replace the thumbprint in their encrypt/decrypt code with that of the service certificate uploaded to Windows Azure and also deploy the public key of the service certificate with their application.




    0



    0
  3. @lx says:

    it’s C

    The developer must deploy the public key with their application so that, when Windows Azure spins up role instances, it will match up the thumbprint in the service definition with the uploaded service certificate and deploy the private key to the role instance. The private key is intentionally non-exportable to the .pfx format, so you won’t be able to grab the private key through an RDC connection into a role instance.

    http://azure.microsoft.com/blog/2011/09/07/field-note-using-certificate-based-encryption-in-windows-azure-applications/




    0



    0
  4. testerkv says:

    The correct answer is C. The reason are as follows.

    1. Separation of Concerns , a developer should never get access to any certificates. The IT team should deploy the certificate in the Azure portal.
    2. Based on the above points options A , B and D are eliminated




    0



    0
  5. fred says:

    an Azure cloud service certificates is deployed via the CERTIFICATES tab from the management portal

    this eliminates D and B

    one does not deploy a publi key, but a thumbprint into the definition file
    this eliminates C

    so the answer is A that: deploy the certificate from the portal




    0



    0
  6. challenge says:

    Answer is: C – Upload the certificate’s public key referenced in the application package.

    The Certificate thumbprint is held in ServiceConfiguration.cscfg so we’d need the public key to be uploaded / available.




    0



    0
  7. challenge says:

    I have changed my mind after re-reading the question – I think it’s A. Upload the certificate referenced in the application package. The Certificate needs to be present in the Azure Portal for the app to work.




    0



    0
  8. RobV says:

    Great dialog! Think I’m betting on (A) as Smaji points out in Step #3 of the Azure Doc above. No mention in question about SoC (between Developer and Admin) and who is uploading what.




    0



    0
  9. Jhb says:

    Try this for A.

    https://azure.microsoft.com/en-us/blog/field-note-using-certificate-based-encryption-in-windows-azure-applications/

    With a certificate-based (asymmetric key) approach, a best practice is to follow a “separation of concerns” protocol in order to protect the private key. Thus, IT would be responsible for any certificates with private keys that are uploaded to the Windows Azure Management Portal as service certificates for use by Windows Azure applications (service certificates available to Windows Azure applications must be uploaded to the corresponding hosted service).




    1



    0

Leave a Reply