DISCLAIMER: This answer is a wild abuse of RSA keygen. I would think really hard about whether your use-case will allow HMAC signatures instead of RSA signatures before you resort to a kludge like this.
I would also consider a centralized key-management solution where the server generates the user's keys and gives it to them as a password-protected ssh or p12 key file. I've even heard of some digital signature cloud platforms where the user's RSA keys actually live in the cloud and the user needs to do password / API key / SSO MFA auth in order to use the signing platform.
So, I'm answering the question as asked, but I think this solution is ill-advised if any other solution is available that does not weaken the RSA keys themselves by kludging how they are generated.
I have seen terrible-horrible hacks that accomplish deriving RSA keys from short secrets in the following way (java pseudocode):
KeyPair genRsaKeyFromSecret(byte[] secret) {
byte[] hashedSecret = KDF(secret); // use whatever kdf you think appropriate
// use hashedSecret as your RNG seed
SecureRandom rng = new SecureRandom(hashedSecret);
// RSA keygen using that deterministically-seeded RNG
KeyPairGenerator keyGen = KeyPairGenerator.getInstance("RSA");
keyGen.initialize(2048, rng);
return keyGen.generateKeyPair();
}
More Security Warning!
Now, just because I've seen it done does not mean it's a good idea.
You've kludged your RNG to generate deterministic RSA keys from a password, which was your stated goal, but it makes the cryptographers of the world collectively shudder because brute-forcing the private key from the public key is only as strong as the password that was used to seed the RNG (though I'll admit that RSA keygen is a damn slow hash function so that brute force would take a long time...).
The typical password has ~ 40 bits of entropy [1], which is roughly equivalent in strength to RSA-512 [2]. If I was evaluating this system, I would ignore the actual RSA key size (2048, 3072, 4096, etc), and I would evaluate the system as if those were RSA-512 keys, which ... spoiler alert ... is gonna fail security review unless you're, I don't know, using them to make art, or something else that does not need more than 40 bits of security.