Summary
Here are the steps to verify if an SSL key is valid and could be used to decrypt application traffic. The actions, described below, should be performed at a customer side, that is really a secure way as the customer does not need to provide you with sensitive/private information