Your private key is in the file 'user.key', which you have specified by
passing the argument '-out user.key' to the genrsa command.

Your certificate, stored in 'user.crt' does not contain the private key,
hence the name "public-key certificate", but the PFX you create
('user.pfx') using the pkcs12 command will. The phrase "if I need the
[certificate] in pkcs12 format" is a bit misleading, as pkcs12 isn't a
certificate format per se, but rather a format used to transport and
store both private keys and certificates.

//oscar

> Sarath Chandra M wrote:
> 
> Hi,
> I am generating client certificates using this method at the openssl
> server:
> 
> openssl genrsa -des3 -out user.key 1024
> openssl req -new -config openssl.cnf -key user.key -out user.csr
> openssl ca -config openssl.cnf -cert CA.pem -in user.csr -keyfile
> CA.key -out user.crt
> 
> After this, I am exporting the user.crt to the browser for that user.
> Its working fine. Now, I would like
> to know where the private key of the user is ?
> I am using the user.crt to put it in the user entry in the ldap
> server. Does this user.crt contain
> client's private key also ?
> 
> If I need the user.crt in pkcs12 format, I use
> openssl pkcs12 -export -in user.crt -inkey user.key -out user.pfx
> 
> Anything wrong with this export ? Does it contain the private key ?
> 
> I am doing all these without proper knowledge of openssl. Half
> knowledge is dangerous. But I can't
> help it now. So kindly bear with me if there's anything stupid in the
> method above.
> 
> thanx and regards
> sarath
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to