

Then, the -noout option prevents any output from the command. Issuer: C = US, O = Google Trust Services LLC, CN = GTS CA 1C3įirstly, the -in option specify the certificate file to be decoded. Signature Algorithm: sha256WithRSAEncryption

To decode the entire certificate into plain text, we use the x509 command with the -text option: $ openssl x509 -in googlecert.pem -noout -textĢ4:4e:52:d9:6b:55:1f:96:0a:00:00:00:00:f2:ba:f4 MQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExM MIINUDCCDDigAwIBAgIQJE5S2WtVH5YKAAAAAPK69DANBgkqhkiG9w0BAQsFADBG In other words, this certificate would also be valid for the *., *., and so on. For example, the X509v3 Subject Alternative Name field defines other domains that are authenticating using the same certificates. In the X509v3 extensions field, we can find several extended properties that are on version 3 of the X.509 certificate standard. Beneath the same field, the certificate also defines the algorithm type of the public key as well as the necessary parameters. Furthermore, the Subject Public Key Info field specifies the public key for this certificate. This is a wildcard common name that allows all the subdomains of to identify themselves using the same certificate. On the Subject field, we can see that this certificate has a common name of *. Particularly, a certificate is only valid during the period defined by the Not Before and Not After. Next, the Validity field defines the period during which a certificate is effective. Additionally, the issuer has a common name of GTS CA 1C3. For this particular certificate, the issuer is under the Google Trust Services LLC organization that’s residing in the US. The issuer of the certificate is defined under the field Issuer. It’s a value given by the issuer when it signs the certificate.
#OPENSSL VIEW CERTIFICATE SERIAL#
Firstly, every certificate contains a Serial Number.
