• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 908
  • Last Modified:

extract fingerprint from CA cert

I have created a certificate request for an HP switch SSL. I successfully submitted via IIS the request and it was issued. I have an option to copy the file to p7b and cer.

I need the fingerprint that corresponds to the signed cert. Not quite sure how to get it.

Image attached.
  • 2
1 Solution
nociSoftware EngineerCommented:

You did receive a certificate file from the CA.
For PEM formatted files:
openssl x509 -inform PEM -in certificatefile -text
For DER formatter files:
openssl x509 -inform DER -in certificatefile -text

The output text contains a fingerprint.
To explicitely request a fingerprint als the option -fingerprint can be used in stead of -text.

If you received a pkcs7 format file  use pkcs7 in stead of x509, it only knows the -text option.
btanExec ConsultantCommented:
this is a useful site for conversion to any specif format. specifically for p7b to cer, etc.


will suggest you work on, export out as .cer file which contain the public key and double click that file in an Windows machine. Look at its properties tab and you can find an fingerprint field.
nociSoftware EngineerCommented:
Be carefull though using websites.
Some conversions need a passphrase / password. Never supply it the those websites you don't know.
After you supply the password the people behind the website can also use the certificate (in a malicious way).

the openssl toolkit is available for free if you do have windows you can also use the CygWin software package.

Featured Post

What Security Threats Are We Predicting for 2018?

Cryptocurrency, IoT botnets, MFA, and more! Hackers are already planning their next big attacks for 2018. Learn what you might face, and how to defend against it with our 2018 security predictions.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now