Solved

X509Data, X509Certificate

Posted on 2007-03-27
1
770 Views
Last Modified: 2013-12-17
I need to be able to create a key in C# that looks like this - how to do this?

            <ds:KeyInfo>
                  <ds:X509Data>
                        <ds:X509Certificate>
MIICaTCCAdICAQAwDQYJKoZIhvcNAQEEBQAwfTELMAkGA1UEBhMCVVMxETAPBgNVBAgTCENvbG9yYWRvMQ8wDQYDVQQH
EwZEZW52ZXIxEjAQBgNVBAoTCVNvdXJjZSBJRDEMMAoGA1UECxMDU1NPMSgwJgYDVQQDEx9Tb3VyY2VJRC5ORVQgc2Ft
cGxlIGNlcnRpZmljYXRlMB4XDTAzMDUyOTA4MDczN1oXDTA3MDUyODA4MDczN1owfTELMAkGA1UEBhMCVVMxETAPBgNV
..
                        </ds:X509Certificate>
                  </ds:X509Data>
            </ds:KeyInfo>
0
Comment
Question by:bluiee
1 Comment
 
LVL 1

Accepted Solution

by:
bluxau earned 500 total points
ID: 18888023
With C#

Look at

using System.Security.Cryptography.X509Certificates;

..
X509Certificate cert = new X509Certificate(Certificate, "pass");
..
byte[] certData = cert.Export(X509ContentType.Cert);
0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Summary Displaying images in RichTextBox is a common requirement with limited solutions available. Pasting through clipboard or embedding into RTF content only support static images.  This article describes how to insert Windows control objects int…
In my previous two articles we discussed Binary Serialization (http://www.experts-exchange.com/A_4362.html) and XML Serialization (http://www.experts-exchange.com/A_4425.html). In this article we will try to know more about SOAP (Simple Object Acces…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question