Hello, I posted the message below last Friday, and I haven't seen any response, not even a curt directive to RTFM (which I have). Perhaps I'm not asking in the right way, or perhaps I'm not asking the right people. If any of you could explicitly tell me how to sign a certificate request from a browser, while adding my own subject distinguished name, I'd appreciate that very much. Or perhaps you can tell me where I can find out, or give me a pointer to a perl script which does so? -- Christopher ============================================================ Hi all, I've been researching the literature for about a week now, and I've got a very good handle on what needs to happen at the browser with respect to generating a certificate request and installing the signed certificate, but I can't figure out what I need to do to receive the certificate request from a client and sign it with my CA within a CGI script. 1) In what form would the certificate request arrive from the browser? 2) How do I sign it while adding a Subject DN based on how they log in like Thawte does? 3) Is there a way of getting the signed cert to be written to STDOUT instead of a file so I can handle the cert directly without having to open a file? 4) I've seen indications that the signed cert can be combined with the CA cert in one download, so that the CA can be a trusted CA. How does one do this? TIA for your help. --Christopher ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]