Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    Cert Manager - P12 Export

    General pfSense Questions
    3
    5
    34
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mjt-tx last edited by

      Hi All,
      Is there a way to either set a password on .p12 certificate exports or determine what the default password IS? I have created a user cert and would like to import it into my macbook via keychain access. I have tried using no password, using a " " space as a password, and nothing works. Any help would be appreciated.

      Best,
      Michael

      1 Reply Last reply Reply Quote 0
      • jimp
        jimp Rebel Alliance Developer Netgate last edited by

        By default there is no password.

        We have added a means to export with a password in 2.5.0

        M 1 Reply Last reply Reply Quote 0
        • M
          mjt-tx @jimp last edited by

          @jimp Thanks for the info. I tried with empty password and also with a space charachter. Is OSX just picky about this stuff?

          1 Reply Last reply Reply Quote 0
          • johnpoz
            johnpoz LAYER 8 Global Moderator last edited by johnpoz

            you can set a password on it with openssl... let me dig up the thread where went over it.

            Here
            https://forum.netgate.com/post/670290

            Which points to the docs, where I had put it in back when it was wiki

            https://docs.netgate.com/pfsense/en/latest/packages/using-eap-and-peap-with-freeradius.html#eap-tls

            If your client will not load the .p12 without a password on it, and space does not work you can add a password with openssl
            
            Just download user cert and key vs the p12 and with the ca cert use the following command
            openssl pkcs12 -export -certfile ca.crt -in user.crt -inkey user.key -out user.p12
            
            
            M 1 Reply Last reply Reply Quote 0
            • M
              mjt-tx @johnpoz last edited by

              @johnpoz Thanks for the input. This worked just fine.

              1 Reply Last reply Reply Quote 0

              Products

              • Platform Overview
              • TNSR
              • pfSense
              • Appliances

              Services

              • Training
              • Professional Services

              Support

              • Subscription Plans
              • Contact Support
              • Product Lifecycle
              • Documentation

              News

              • Media Coverage
              • Press
              • Events

              Resources

              • Blog
              • FAQ
              • Find a Partner
              • Resource Library
              • Security Information

              Company

              • About Us
              • Careers
              • Partners
              • Contact Us
              • Legal
              Our Mission

              We provide leading-edge network security at a fair price - regardless of organizational size or network sophistication. We believe that an open-source security model offers disruptive pricing along with the agility required to quickly address emerging threats.

              Subscribe to our Newsletter

              Product information, software announcements, and special offers. See our newsletter archive to sign up for future newsletters and to read past announcements.

              © 2021 Rubicon Communications, LLC | Privacy Policy