Skip to main content

From PFX to PEM

If you ever find yourself in the situation when you need to extract the certificate and the private key from the PFX file you might be somewhat disoriented at first, especially if your experience is limited to Windows systems. Do not despair, it is very easy to do.  

One possible scenario - you have requested and processed the original certificate using IIS, then exported certificate with the private key, either to be stored in the safe place as a backup or to be imported into other servers or devices (typical in case of say wildcard certificates). Then, when you try to import it into a Linux/Apache based appliance, you find out that it requires a slightly different format (a certificate file and a private key file):



First, you would need to get a hold of an OpenSSL toolkit, visit OpenSSL Project website or download Windows installer hereOnce you have installed OpenSSL and have your PFX file handy, you can run the following commands to extract the private key and the certificate into two separate files:

openssl.exe pkcs12 -in XYZ.pfx -nocerts -out XYZprivateKey.pem
openssl.exe pkcs12 -in XYZ.pfx -clcerts -nokeys -out XYZpublicCert.cer

That's it. You can now import them.

Comments

  1. I just wanted to say this is an elegantly composed article as we have seen here.Professional swiss work Certificate Generation Tool I got some knowledge from your article and also it is a significant article for us. Thanks for sharing an article like this.

    ReplyDelete
  2. Further consideration is required to make sure playing coverage, industry practices and public well being measures extra effectively cut back playing harm in up to date settings. In particular, the proliferation of inducements and the poor pricing of 점보카지노 complex bets corresponding to multi-bets, and their outsized attraction to players with issues, must be a key area of focus. These incentivised bets goal problem players with poor odds, whereas profitable gamblers are banned from play by online betting suppliers. This mixture is clearly in opposition to customers’ reasonable expectations for fair-play in betting.

    ReplyDelete

Post a Comment

Popular posts from this blog

Updating computer's AD Security Group membership without rebooting

I found the following to be very useful - From the elevated command prompt execute “ klist –li 0x3e7 ” to view the logon session of the computer account . To purge them, simply execute “ klist –li 0x3e7 purge ”. A typical use case might involve targeting GPOs based on computer's group membership. When you add computer to the group in order to test the application of policies you can reboot it or, alternatively, run the above mentioned to clear logon sessions, then do “ gpupdate /force ” and check. In a spirit of giving credit where credit is due, I found a few references to this, but the one I learned it from was  http://setspn.blogspot.com/2010/10/updating-servers-security-group.html
  AI Agents as Trusted IoT/Software Defined Devices 🤖 Your Newest Endpoint Isn’t a Laptop; It’s an AI Agent. Are You Ready to Secure It? Dive into the next frontier of cybersecurity. Autonomous AI agents are no longer just code; they are powerful actors in our digital ecosystems. Treating them as simple software leaves a massive security gap. Our latest report introduces a new paradigm: The AI Agent as a Software-Defined Device. Discover the essential framework for securing the agentic future: ➡️ The Agent-as-Device Model: Learn why abstracting agents as software-defined devices, similar to IoT endpoints, is the key to managing their complexity and risk. Secure the “hardware” (host), “software” (agent logic), and “network” (communications). ➡️ A Digital Passport for AI: Move beyond static API keys. Explore how Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) create a cryptographic root of trust, giving every agent a verifiable identity and provable permissions. ➡️...

WordPress displays weird characters

Sometimes after a database conversion (e.g. from MySQL to MariaDB) or due to encoding issues a situation might arise when WordPress is showing weird characters. A quick way of remedying the situation would involve examining the pages to discover a pattern (what characters are being substituted, in the example below the apostrophe was replaced by  ’ ) then running an queries against the database to reverse the effect. Here's a quick example (common tables that store content): UPDATE  wp_posts  SET  post_content =  REPLACE (post_content,  'Â' ,  '' )      UPDATE  wp_posts  SET  post_content =  REPLACE (post_content,  '’' ,  "'" )      UPDATE  wp_postmeta  SET  meta_value =  REPLACE (meta_value,  'Â' ,  '' )      UPDATE  wp_postmeta  SET  meta_value =  REPLACE (me...