Cool. Now you just have to store the keys somewhere. And figure out how to authenticate/authorize access to them. :)
Luckily there's established patterns for key management and access control.