Extracting a CA certificate from a key repository

Follow this procedure to extract a CA certificate.

Using iKeyman

If you need to manage SSL certificates in a way that is FIPS compliant, use the runmqakm command. iKeyman does not provide a FIPS-compliant option.

Perform the following steps on the machine from which you want to extract the CA certificate:

  1. Start the iKeyman GUI using the strmqikm command..
  2. From the Key Database File menu, click Open. The Open window opens.
  3. Click Key database type and select CMS (Certificate Management System).
  4. Click Browse to navigate to the directory that contains the key database files.
  5. Select the key database file from which you want to extract, for example key.kdb.
  6. Click Open. The Password Prompt window opens.
  7. Type the password you set when you created the key database and click OK. The name of your key database file is displayed in the File Name field.
  8. In the Key database content field, select Signer Certificates and select the certificate you want to extract.
  9. Click Extract. The Extract a Certificate to a File window opens.
  10. Select the Data type of the certificate, for example Base64-encoded ASCII data for a file with the .arm extension.
  11. Type the certificate file name and location where you want to store the certificate, or click Browse to select the name and location.
  12. Click OK. The certificate is written to the file you specified.

Using the command line

Use the following commands to extract a CA certificate using iKeycmd :
  • On UNIX, Linux® and Windows:
    
    runmqckm -cert -extract -db filename -pw password -label label -target filename
             -format ascii
    
where: