====== Create new key and csr for ssl-cert ====== openssl genrsa -des3 -out server17.key 2048 openssl req -new -key server17.key -out server17.csr OR all in one command openssl req -new -newkey rsa:2048 -nodes -keyout server.key -out server.csr and maybe also a self signed certificate: openssl x509 -req -days 365 -in server17.csr -signkey server17.key -out server17.crt get key uncrypted: openssl rsa -in server17.key -out postfix.key.unencrypted ===== Use a config-File ===== server.cnf [req] distinguished_name = req_distinguished_name req_extensions = v3_req default_keyfile = server.key prompt = no encrypt_key = no default_bits = 4096 default_md = sha512 [req_distinguished_name] # two character country code C = XX # State or Province Name ST = Middelearth # Locality Name (eg, city) L = Gondor # Organization Name (eg, company) O = Fellowship of the ring # Organizational Unit Name (eg, section) OU = Hobbits # Common Name (eg, your name or your server's hostname) CN = alias1.example.com [v3_req] keyUsage = keyEncipherment, dataEncipherment extendedKeyUsage = serverAuth subjectAltName = @alt_names [alt_names] DNS.1 = server1.example.com DNS.2 = alias1.example.com IP = 10.20.30.40 After editing the file you can generate your CSR # openssl req -new -config server.cnf -out server.csr === Get things out of a pfx file === == Certificate == # openssl pkcs12 -in /path/to/wildcard.pfx -out /path/to/certstore/mydomain.cer -nokeys -clcerts == key == # openssl pkcs12 -in /path/to/wildcard.pfx -out /path/to/keystore/mydomain.key -nocerts -nodes == CA-Cert == # openssl pkcs12 -in /path/to/wildcard.pfx -out /path/to/certstore/ca.cer -nodes -nokeys -cacerts === Get things in a pfx file === openssl pkcs12 -inkey bob_key.pem -in bob_cert.cert -export -out bob_pfx.pfx {{tag>[Good2Know HowTo SSL TLS]}}