itarca.cer: CN=IT Application Root CA,O=Cisco,OU=Pollux (Root Certificate, Expiring 2048-04-17) detail info and audit record
Page content
CA Certificate Information and Audit Record
This certificate is root certificate used for the issuance of other certificates.
- Certificate Download URL: http://www.cisco.com/security/pki/certs/itarca.cer (in DER format )
- Serial Number : 240316736317634414513
- SHA-1 Fingerprint : ecb69069613b3931e975c06a1b18eac6373e9ee6
- SHA-1 Fingerprint : ec:b6:90:69:61:3b:39:31:e9:75:c0:6a:1b:18:ea:c6:37:3e:9e:e6
- SHA-256 Fingerprint : 9ee289cc39971c15e94beb65142d360b5873feb970de1f9fda53ac26d10b25c6
- SHA-256 Fingerprint : 9e:e2:89:cc:39:97:1c:15:e9:4b:eb:65:14:2d:36:0b:58:73:fe:b9:70:de:1f:9f:da:53:ac:26:d1:0b:25:c6
- Signature Hash Algorithm : sha256
- Subject
: CN=IT Application Root CA,O=Cisco,OU=Pollux
- Organization Unit: Pollux
- Organization: Cisco
- Common Name: IT Application Root CA
- Not Valid Before: 2018-04-17 16:51:55
- Not Valid After: 2048-04-17 16:51:55
- Issuer (Parent Certificate):
- Issuer Name: CN=IT Application Root CA,O=Cisco,OU=Pollux
- Issuer Certificate URL: NA
- Audit Record:
- No public audit information was found by E2Encrypted.com. We update this information regularly, check back later.
Download certificate through curl
:
curl -sSL "http://www.cisco.com/security/pki/certs/itarca.cer" --output cert.crt
Download certificate through wget
:
wget -q "http://www.cisco.com/security/pki/certs/itarca.cer" --output-document=cert.crt
CA Certificate Detail Information
Use openssl x509
to decode DER certificate to get detail information:
openssl x509 -in cert.crt -inform der -text -noout
Use openssl x509
to decode PEM certificate to get detail information:
openssl x509 -in cert.crt -inform pem -text -noout
Decoded detail certificate information:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0d:07:10:8e:6d:a1:d0:87:b1
Signature Algorithm: sha256WithRSAEncryption
Issuer: OU=Pollux, O=Cisco, CN=IT Application Root CA
Validity
Not Before: Apr 17 16:51:55 2018 GMT
Not After : Apr 17 16:51:55 2048 GMT
Subject: OU=Pollux, O=Cisco, CN=IT Application Root CA
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d6:08:9d:ae:27:0f:7a:bc:d5:7a:7e:fd:5a:ac:
cc:54:6d:84:99:03:ba:9f:f8:c8:e0:2d:87:63:87:
85:48:b4:f9:99:96:81:09:cb:ca:cf:8a:95:b7:10:
3e:42:b2:40:94:c5:26:4b:09:94:83:be:d2:01:62:
c5:eb:3a:58:0a:d9:84:14:4d:f7:c9:f6:9a:6e:dd:
09:ac:24:1a:9e:3b:89:2c:9f:f7:4c:b2:36:68:44:
b2:84:18:92:c5:1e:41:e0:79:da:f0:43:ec:00:dd:
a0:04:98:5c:b1:73:f2:a5:a6:14:01:1a:c3:a2:19:
f1:f8:69:b3:94:39:ec:c4:79:fa:65:82:e3:cf:d1:
d0:92:b7:c8:f8:2d:29:81:69:c3:8d:10:99:1f:0d:
cd:c5:7c:48:88:b6:87:1f:2a:f7:7b:0f:7b:92:f1:
2b:16:c9:2a:e9:53:fa:e7:56:03:cc:97:1d:1c:27:
72:2a:8c:56:c9:87:e8:85:aa:b9:7d:f3:88:ba:2f:
47:3d:79:41:11:e0:0e:32:68:4e:c3:5c:c8:fe:2c:
a3:70:ec:30:20:1f:0b:df:03:5a:e1:22:6a:ad:cc:
f4:78:d9:70:17:1b:58:b5:b5:77:5a:be:23:a8:81:
f7:42:d6:5b:4d:1b:11:49:a4:a3:07:81:3e:1a:87:
a8:1b
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Certificate Sign, CRL Sign
X509v3 Basic Constraints: critical
CA:TRUE
X509v3 Subject Key Identifier:
82:D6:6B:92:33:CF:8B:55:9F:53:E1:31:A1:70:71:9C:60:7B:22:21
Signature Algorithm: sha256WithRSAEncryption
c1:62:64:d5:49:4d:d3:8d:01:46:b1:d1:90:a9:f3:c7:9c:12:
ca:95:96:53:b0:0d:d4:7a:37:d5:cb:39:ab:93:52:8d:20:5d:
08:84:0b:8b:04:65:80:0a:2d:dd:0d:ae:d0:75:ff:e7:39:c1:
04:4d:8f:f0:c2:f7:d1:ad:43:4b:8e:68:be:1c:66:87:1f:42:
ac:8c:e5:64:1c:16:f5:65:d4:92:67:f1:56:fa:a7:cc:5b:f1:
77:56:d4:cb:60:76:ae:0b:e6:a5:43:3b:ad:55:e4:e7:c7:c0:
43:e5:58:6d:53:f5:d7:dd:14:5b:11:c4:92:23:24:eb:64:2d:
22:dc:50:29:c6:a3:66:12:cc:05:eb:ed:fd:80:01:44:8d:57:
98:0c:81:38:f5:85:87:cf:1f:e8:c5:1c:89:08:03:4c:e1:3f:
ea:1d:e6:fc:37:be:4a:8b:f3:12:22:8a:b3:2a:03:b3:7c:e8:
a9:d0:47:42:d2:a6:0b:d5:48:4e:14:9a:92:3d:82:0c:68:8a:
fe:09:52:95:81:03:ef:1d:8a:08:a9:ae:4b:a1:14:79:e4:a4:
da:b2:4c:f5:a1:f6:ac:69:a6:9f:d9:b6:a6:99:a0:4e:e9:7e:
87:0f:b6:cf:f1:43:25:aa:53:d1:42:9b:1b:bd:e3:b2:f1:1d:
67:b1:6c:8b
CA Certificate in PEM Format
Use openssl x509
to convert certificate from DER
format to PEM
format:
openssl x509 -in cert.crt -inform der
Converted PEM
format certificate:
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Also see Top 1 Millions Domains CA Certificate List
Related Certificates
- airespace-root.cer: 1.2.840.113549.1.9.1=support@airespace.com,CN=Airespace Root CA,OU=Engineering,O=Airespace Inc.,L=San Jose,ST=California,C=US (Expiring: 2013-04-29)
- airespace-root-old.cer: 1.2.840.113549.1.9.1=support@airespace.com,CN=ca,OU=none,O=airespace Inc,L=San Jose,ST=California,C=US (Expiring: 2012-11-11)
- ACT2ECCSUDI.cer: CN=ACT2 ECC SUDI CA,O=Cisco (Expiring: 2099-09-07)
- ACT2SUDICA.cer: CN=ACT2 SUDI CA,O=Cisco (Expiring: 2029-05-14)
- cbarc2099.cer: CN=Cisco Basic Assurance Root CA 2099,O=Cisco (Expiring: 2099-05-26)
- CiscoClientCA001.cer: CN=Cisco Client CA 001,O=Cisco Systems (Expiring: 2019-05-14)
- eccroot.cer: CN=Cisco ECC Root CA,O=Cisco (Expiring: 2099-09-07)
- ceca.cer: CN=Cisco Employee CA,O=Cisco (Expiring: 2029-05-14)
- cmca3.cer: CN=Cisco Manufacturing CA III,O=Cisco (Expiring: 2099-05-26)
- cmca2.cer: CN=Cisco Manufacturing CA SHA2,O=Cisco (Expiring: 2037-11-12)
- cmca.cer: CN=Cisco Manufacturing CA,O=Cisco Systems (Expiring: 2029-05-14)
- rxcr2.cer: CN=Cisco RXC-R2,O=Cisco Systems,C=US (Expiring: 2034-07-09)
- crca2048.cer: CN=Cisco Root CA 2048,O=Cisco Systems (Expiring: 2029-05-14)
- crca2099.cer: CN=Cisco Root CA 2099,O=Cisco (Expiring: 2099-08-09)
- crcam1.cer: CN=Cisco Root CA M1,O=Cisco (Expiring: 2033-11-18)
- crcam2.cer: CN=Cisco Root CA M2,O=Cisco (Expiring: 2037-11-12)
- ssca.cer: CN=Cisco SSCA,O=Cisco Systems (Expiring: 2012-04-05)
- ssca2.cer: CN=Cisco SSCA2,O=Cisco Systems (Expiring: 2015-10-22)
- ssca3.cer: CN=Cisco SSCA3,O=Cisco Systems,C=US (Expiring: 2018-09-26)
- ciscoumbrellaroot.cer: CN=Cisco Umbrella Root CA,O=Cisco (Expiring: 2036-06-28)
- xsslr2.cer: CN=Cisco XSSL-R2,O=Cisco Systems,C=US (Expiring: 2034-07-09)
- hraca.cer: CN=HRA SubCA,OU=Rigel,O=Cisco (Expiring: 2035-04-17)
- innerspace.cer: CN=Innerspace SubCA RSA,O=Cisco (Expiring: 2037-11-12)
- innerspace_sha256.cer: CN=Innerspace SubCA RSA,O=Cisco (Expiring: 2037-11-12)
- kca.cer: CN=Kafka SubCA,OU=Antares,O=Cisco (Expiring: 2048-04-17)
- sarca.cer: CN=Strong Authentication Root CA,O=Cisco,OU=Betelgeuse (Expiring: 2068-06-01)
- suasca.cer: CN=Strong User Authentication SubCA,OU=Canopus,O=Cisco (Expiring: 2068-06-01)
- test-root-ca-2048.cer: CN=TEST Root CA 2048,O=Cisco Systems (Expiring: 2034-02-19)
- vorca.cer: CN=Virtual Office Root CA,O=Cisco,OU=Castor (Expiring: 2035-04-17)
- vuefirca.cer: CN=Virtual UEFI Root CA,O=Cisco,OU=Toliman (Expiring: 2099-04-03)
- vuefisca.cer: CN=Virtual UEFI SubCA,OU=Antares,O=Cisco (Expiring: 2099-04-03)
- attca.cer: O=Cisco,CN=Attestation CA (Expiring: 2099-08-09)
- hasudi.cer: O=Cisco,CN=High Assurance SUDI CA (Expiring: 2099-08-09)