Categories:
Android (13)
Apple Mac (27)
DH Keys (39)
DSA Keys (83)
EC Keys (2463)
Firefox (30)
General (10)
Google Chrome (25)
Intermediate CA (152)
Java VM (29)
JDK Keytool (28)
Microsoft CertUtil (29)
Microsoft Edge (9)
Mozilla CertUtil (21)
OpenSSL (236)
Other (7)
Portecle (38)
Publishers (6622)
Revoked Certificates (16)
Root CA (85)
RSA Keys (5335)
Tools (46)
Tutorial (1)
What Is (22)
Windows (127)
Collections:
Other Resources:
OpenSSL "req -new -reqexts" - Specify CSR V3 Extensions
How to specify x.509 v3 extensions options in the configuration file for generating CSR using the OpenSSL "req" command?
✍: FYIcenter.com
You can use x.509 v3 extensions options when using OpenSSL "req -new" command to generate a CSR (Certificate Signing Request). The provided x509 extensions will be included in the resulting CSR.
In order to user x.509 v3 extensions options for the OpenSSL "req -new" command, first you need write them in a named section in the configuration file. For example:
[my_req_ext] basicConstraints = critical, CA:false subjectKeyIdentifier = hash keyUsage = cRLSign, keyCertSign extendedKeyUsage = codeSigning, timeStamping subjectAltName = email:john@fyicenter.com
Then you can provided this named section [my_req_ext] to the "req -new" command in two ways:
1. Using "req_extensions" option in the [req] section - You can set "req_extensions=my_req_ext" in the [req] section of the configuration file. For example:
[req] default_bits = 1024 input_password = fyicenter req_extensions = my_req_ext [my_req_ext] ...
2. Using "-reqexts" option in the "req -new" command - For example, "req -new -reqexts my_req_ext" command will take x.509 v3 extensions from the [my_req_ext] section in the configuration file.
Note that you can not use all x.509 v3 extensions when generating s CSR using the "req -new" command, because some of them can not be supported in CSR, like authorityKeyIdentifier and issuerAltName.
⇒ OpenSSL "req -new -reqexts" - Test CSR V3 Extensions
2016-10-25, 12552🔥, 0💬
Popular Posts:
Certificate Summary: Subject: GlobalSign Domain Validation CA - SHA256 - G2 Issuer: GlobalSign Expir...
Certificate summary - Owner: www.ftc.gov, FEDERAL TRADE COMMISSION, L=Washington, ST=District Of Col...
How to delete a root CA certificate from Google Chrome? I don't know this CA (Certificate Authority)...
Certificate Summary: Subject: Equifax Secure eBusiness CA-1 Issuer: Equifax Secure eBusiness CA-1 Ex...
Certificate Summary: Subject: *.google.com Issuer: Google Internet Authority G2 Expiration: 2015-12-...