Who Signed My Cert
Every now and then you have to open up an SSL cert to inspect its content or verify information contained within. This is something that I had to do fairly often in a past life but is now firmly in the ‘reference a search engine’ territory.
This Red Hat article is not only a good overview of CA and Server certificates and their functions but also includes examples of inspecting x509 certificates.
source: Who signed my cert
openssl x509 -noout -text -in www.redhat.com.crt
There is another article detailing how to create podman secrets. It includes a useful command to generate a self-signed cert that you can use for internal testing.
openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:4096 -keyout certificate.key -out certificate.pem
Read other posts