{"id":2357,"date":"2025-06-25T15:31:17","date_gmt":"2025-06-25T13:31:17","guid":{"rendered":"https:\/\/yellotab.se\/x056\/?page_id=2357"},"modified":"2025-06-25T15:31:51","modified_gmt":"2025-06-25T13:31:51","slug":"ordlista","status":"publish","type":"page","link":"https:\/\/yellotab.se\/x056\/ordlista\/","title":{"rendered":"Ordlista"},"content":{"rendered":"\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>PKCS#12<\/summary>\n<p>PKCS#12, often seen as .pfx or .p12 files, is&nbsp;<mark>a format for storing cryptographic objects like private keys and certificates in a single, password-protected file<\/mark>.&nbsp;It&#8217;s commonly used for bundling certificates with their corresponding private keys and intermediate certificates, forming a chain of trust.&nbsp;<\/p>\n\n\n\n<p>Here&#8217;s a more detailed breakdown:&nbsp;<\/p>\n\n\n\n<p>What it is:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Archive format:<\/strong>PKCS#12 is a way to package multiple cryptographic items (certificates, private keys, etc.) into a single file.&nbsp;<\/li>\n\n\n\n<li><strong>Security:<\/strong>It can be password-protected and encrypted, enhancing security for sensitive data like private keys.&nbsp;<\/li>\n\n\n\n<li><strong>Common Usage:<\/strong>It&#8217;s widely used for:\n<ul class=\"wp-block-list\">\n<li>Bundling a private key with its corresponding certificate (e.g., server certificates).&nbsp;<\/li>\n\n\n\n<li>Bundling a chain of trust (e.g., root, intermediate, and end-entity certificates).&nbsp;<\/li>\n\n\n\n<li>Storing client certificates for authentication.&nbsp;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Interoperability:<\/strong>Unlike formats like JKS (Java KeyStore), PKCS#12 is language-neutral and widely supported by various tools and systems.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Key Features:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Private Key and Certificate Storage:<\/strong>&nbsp;PKCS#12 files are designed to store both private keys and their associated X.509 certificates.&nbsp;<\/li>\n\n\n\n<li><strong>Password Protection:<\/strong>&nbsp;The file can be password-protected, adding an extra layer of security.&nbsp;<\/li>\n\n\n\n<li><strong>Chain of Trust:<\/strong>&nbsp;PKCS#12 files can contain the entire chain of trust for a certificate, including root and intermediate certificates.&nbsp;<\/li>\n\n\n\n<li><strong>PFX\/P12 Extension:<\/strong>&nbsp;You&#8217;ll often see PKCS#12 files with the extensions .pfx or .p12.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Common Uses:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Server Certificates:<\/strong>&nbsp;Storing server certificates (e.g., for HTTPS) along with their private keys.<\/li>\n\n\n\n<li><strong>Client Certificates:<\/strong>&nbsp;Storing client certificates for authentication purposes.<\/li>\n\n\n\n<li><strong>Code Signing:<\/strong>&nbsp;Storing code signing certificates and private keys.<\/li>\n\n\n\n<li><strong>Document Signing:<\/strong>&nbsp;Storing document signing certificates and private keys.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Example Usage (OpenSSL):<\/p>\n\n\n\n<p>To extract a private key from a PKCS#12 file using OpenSSL:&nbsp;<\/p>\n\n\n\n<p>Kod<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code class=\"\" data-line=\"\">openssl pkcs12 -in certificate.p12 -nocerts -out private_key.pem -nodes<\/code><\/pre>\n\n\n\n<p>To extract the certificate(s) from a PKCS#12 file:&nbsp;<\/p>\n\n\n\n<p>Kod<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code class=\"\" data-line=\"\">openssl pkcs12 -in certificate.p12 -clcerts -nokeys -out certificate.pem<\/code><\/pre>\n\n\n\n<p>You&#8217;ll be prompted for the password of the PKCS#12 file.&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>OpenSSL<\/summary>\n<p><\/p>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>TLS<\/summary>\n<p><\/p>\n<\/details>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>TLS<\/summary>\n<p><\/p>\n<\/details>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2357","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/yellotab.se\/x056\/wp-json\/wp\/v2\/pages\/2357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yellotab.se\/x056\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/yellotab.se\/x056\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/yellotab.se\/x056\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/yellotab.se\/x056\/wp-json\/wp\/v2\/comments?post=2357"}],"version-history":[{"count":2,"href":"https:\/\/yellotab.se\/x056\/wp-json\/wp\/v2\/pages\/2357\/revisions"}],"predecessor-version":[{"id":2359,"href":"https:\/\/yellotab.se\/x056\/wp-json\/wp\/v2\/pages\/2357\/revisions\/2359"}],"wp:attachment":[{"href":"https:\/\/yellotab.se\/x056\/wp-json\/wp\/v2\/media?parent=2357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}