-private | The PKCS#8 private key in one of the following formats: [PKCS#8 PEM](https://tools.ietf.org/html/rfc7468#section-10) (optionally encrypted with AEM's Crypto Support) or [PKCS#8 Encrypted PEM](https://tools.ietf.org/html/rfc7468#section-11). One of the following approaches can be used for protecting the sensitive private key: <br/>1. Use value interpolation with secrets with an [unencrypted PKCS#8 private key](https://tools.ietf.org/html/rfc7468#section-10) (only supported on AEMaaCS and since v2.7.0, **recommended option for AEMaaCS**) </br>2. Use AEM Crypto Support to encrypt the [unencrypted PKCS#8 private key](https://tools.ietf.org/html/rfc7468#section-10) (only supported since v2.7.0, **recommended option for AEM Classic**)</br>3. Use [encrypted PKCS#8 private keys](https://tools.ietf.org/html/rfc7468#section-11) (better algorithms only supported with Bouncy Castle and even those provide weaker encryption than 1. or 2, therefore **rather use one of the other options**). In this case the encryption password must be given in `privatePassword` ()</br>Non-encrypted keys should be used with care! In case of encrypted private keys | yes
0 commit comments