This is just a quick follow-up to yesterdays post concerning certificate signing.
As briefly mentioned yesterday, the process shown would result in a signed certificate (filename.crt) for each certificate request (filename.pem), and a corresponding key-file (filename.key). If you need to use these (for instance in an Azure key vault, as was my purpose here), you might need to combine the
.crt and the
.key into a single file which contains both. This can be either a
.pfx file or a
.pem. If my understanding is correct,
.pfx is really just a different file extension, typically used on Windows. Both are essentially
.pem files – that is, a certificate which can contain both public and private keys in the same file. This is in contrast with the
.crt files we generated, which only contain the public certificate by itself.
So how do we do combine these? Once again, let’s use OpenSSL:
openssl pkcs12 -export -out certfile.pfx -inkey keyfile.key -in certificate.crt
You’ll be requested for a password, which will be used to secure the file while storing and transferring it. You should now have a file named
certfile.pfx. Later, you’ll need to provide the password again in order to import the keys from this file into e.g. Azure, or wherever you want to use them.