-
Notifications
You must be signed in to change notification settings - Fork 150
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Readme file questions #38
Comments
Hi! About the push certificate, you're extracting a P12 version of the certificate. Yes, it's the same certificate in a different format. I suggest you to read if you're interested the different formats (p12, pfx, etc). |
Hi, In step 3 we are adding the apple generated mdm vendor to the keychain so that we can export the private key that is used in the Certificate Signing Request request in step 1 to a p12 file. When we right-click on the private key which is now linked to the certificate we are not only extracting the private key but in fact putting the private key and the certificate in the private.p12 file. In step 5 with the command openssl pkcs12 -in private.p12 -nocerts -out key.pem we are exporting the private key that was used in the Certificate Signing Request request and with openssl pkcs12 -in private.p12 -clcerts -nokeys -out cert.pem we are exporting the certificate that we imported earlier on to the keychain. I don't see how the certificates are different. Am I missing something? About the push certificate. Its in pem format in the beginning and in pem format in the end. What I didn't saw is that the private key that is used in the Certificate Signing Request Sebo |
Step 1 till 8 would then actually look like this. I also figured out how to not use the keychain assistant tool: create mdm vendor private keyopenssl genrsa -out mdmVendorPrivateKey.key 2048 create csr for applecommon name should be your apple developer email addressopenssl req -new -sha256 -key mdmVendorPrivateKey.key -out mdmVendor.csr upload to mdm csr and download mdmApple's Certificates, Identifiers & Profiles page create mdm push private keyopenssl genrsa -out mdmPushPrivateKey.key 2048 create csr for pushcommon name should be your email addressopenssl req -new -sha256 -key mdmPushPrivateKey.key -out mdmPush.csr sign csr with vendor certificatepython mdm_vendor_sign.py --key mdmVendorPrivateKey.key --csr mdmPush.csr --mdm mdmVendor.cer --out vendorSignedMdmPush.csr get push certificate with signed csrhttps://identity.apple.com/pushcert/save it as mdmPush.pemCopy down the User ID froim the following which should look like com.apple.mgmt.External.hexstuffhere..openssl x509 -noout -subject -in mdmPush.pem concate the files to be used in apn server for pushcat mdmPush.pem <(echo) <(echo) mdmPushPrivateKey.key > mdmPushIncludesPrivatekey.pem |
mdm.cer
In 5. in step openssl x509 -in cert.pem -inform PEM -out mdm.cer -outform DES we export the mdm.cer. Isn't that mdm.cer file exactly the same as the mdmvendor.cer file that we received from Apple in step 2? At least the md5sum is identical in my case.
PushCert.pem
Whats the difference between the push certificate that we get from apple in step 7 and the push certificate we extract again from the mdm.p12 in step 8? Aren't those files also the same?
Thanks for letting me know.
The text was updated successfully, but these errors were encountered: