extract fingerprint from CA cert

Posted on 2011-05-02
Last Modified: 2012-05-11
I have created a certificate request for an HP switch SSL. I successfully submitted via IIS the request and it was issued. I have an option to copy the file to p7b and cer.

I need the fingerprint that corresponds to the signed cert. Not quite sure how to get it.

Image attached.
Question by:cs2009
    LVL 39

    Accepted Solution


    You did receive a certificate file from the CA.
    For PEM formatted files:
    openssl x509 -inform PEM -in certificatefile -text
    For DER formatter files:
    openssl x509 -inform DER -in certificatefile -text

    The output text contains a fingerprint.
    To explicitely request a fingerprint als the option -fingerprint can be used in stead of -text.

    If you received a pkcs7 format file  use pkcs7 in stead of x509, it only knows the -text option.
    LVL 60

    Expert Comment

    this is a useful site for conversion to any specif format. specifically for p7b to cer, etc.

    will suggest you work on, export out as .cer file which contain the public key and double click that file in an Windows machine. Look at its properties tab and you can find an fingerprint field.
    LVL 39

    Expert Comment

    Be carefull though using websites.
    Some conversions need a passphrase / password. Never supply it the those websites you don't know.
    After you supply the password the people behind the website can also use the certificate (in a malicious way).

    the openssl toolkit is available for free if you do have windows you can also use the CygWin software package.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Highfive Gives IT Their Time Back

    Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

    Suggested Solutions

    Cryptanalysis is the science of cracking codes and decoding secrets. It is used to violate authentication schemes, to break cryptographic protocols, and, more benignly, to find and correct weaknesses in encryption algorithms. It may be used in in…
    Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    758 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now