vuefirca.cer: CN=Virtual UEFI Root CA,O=Cisco,OU=Toliman (Root Certificate, Expiring 2099-04-03) detail info and audit record
Page content
CA Certificate Information and Audit Record
This certificate is root certificate used for the issuance of other certificates.
- Certificate Download URL: http://www.cisco.com/security/pki/certs/vuefirca.cer (in DER format )
- Serial Number : 73171966853747009745
- SHA-1 Fingerprint : f356c3649d01aa3fdb6fff93a9a713b35418a481
- SHA-1 Fingerprint : f3:56:c3:64:9d:01:aa:3f:db:6f:ff:93:a9:a7:13:b3:54:18:a4:81
- SHA-256 Fingerprint : 67501b730fe840f05cba7a84cfd26e0f11311e5f9b16ce60004fd97d3f55de4c
- SHA-256 Fingerprint : 67:50:1b:73:0f:e8:40:f0:5c:ba:7a:84:cf:d2:6e:0f:11:31:1e:5f:9b:16:ce:60:00:4f:d9:7d:3f:55:de:4c
- Signature Hash Algorithm : sha256
- Subject
: CN=Virtual UEFI Root CA,O=Cisco,OU=Toliman
- Organization Unit: Toliman
- Organization: Cisco
- Common Name: Virtual UEFI Root CA
- Not Valid Before: 2018-04-03 16:19:31
- Not Valid After: 2099-04-03 16:19:31
- Issuer (Parent Certificate):
- Issuer Name: CN=Virtual UEFI Root CA,O=Cisco,OU=Toliman
- Issuer Certificate URL: NA
- Audit Record:
- No public audit information was found by E2Encrypted.com. We update this information regularly, check back later.
Download certificate through curl
:
curl -sSL "http://www.cisco.com/security/pki/certs/vuefirca.cer" --output cert.crt
Download certificate through wget
:
wget -q "http://www.cisco.com/security/pki/certs/vuefirca.cer" --output-document=cert.crt
CA Certificate Detail Information
Use openssl x509
to decode DER certificate to get detail information:
openssl x509 -in cert.crt -inform der -text -noout
Use openssl x509
to decode PEM certificate to get detail information:
openssl x509 -in cert.crt -inform pem -text -noout
Decoded detail certificate information:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
03:f7:77:0c:2b:fa:3f:68:d1
Signature Algorithm: sha256WithRSAEncryption
Issuer: OU=Toliman, O=Cisco, CN=Virtual UEFI Root CA
Validity
Not Before: Apr 3 16:19:31 2018 GMT
Not After : Apr 3 16:19:31 2099 GMT
Subject: OU=Toliman, O=Cisco, CN=Virtual UEFI Root CA
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b4:9b:01:5f:ae:23:b5:e8:67:d2:f0:e0:a0:cc:
eb:47:e9:ec:4e:5f:09:4a:e1:db:17:42:92:84:e9:
87:10:50:8f:0d:d3:a6:d1:06:5e:c2:e8:8c:83:6c:
94:60:17:6c:11:06:64:66:a2:4f:d4:96:31:6f:18:
2d:6a:99:ca:b0:e0:5a:20:c5:3a:f3:fd:fd:a5:5d:
4b:6f:cb:f9:bc:14:08:b3:87:42:3f:a8:8a:da:17:
95:9b:18:ed:fc:83:89:2d:28:65:8f:0b:3c:15:b7:
f8:d8:a2:94:9c:0d:63:75:6c:4e:93:b6:9c:9a:4f:
6a:02:e5:57:df:45:9b:ef:ac:f2:a6:0e:fa:7d:68:
40:3e:62:a6:83:a1:a9:61:6f:03:7e:0f:43:2b:eb:
ec:5c:0b:4c:ed:5f:37:17:24:c3:af:63:73:3e:f1:
88:b8:ff:84:2b:83:82:37:a7:43:5a:df:76:f5:3e:
73:4f:6a:9c:19:88:f9:38:2a:55:e5:df:68:3a:03:
fe:59:69:08:d3:fe:c7:6b:4d:01:c6:37:57:74:b0:
b2:67:55:48:ec:70:ae:0e:ee:3a:c5:10:7d:ca:b9:
fa:e5:31:6b:a5:77:f8:99:46:0e:d3:4e:07:ee:3a:
92:fd:2f:83:14:3c:e4:c0:1a:89:43:d6:45:50:72:
5c:cf
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Certificate Sign, CRL Sign
X509v3 Basic Constraints: critical
CA:TRUE
X509v3 Subject Key Identifier:
E0:1B:C7:AA:BA:C7:DA:11:08:E9:0A:6F:15:DA:52:1E:63:0A:ED:48
Signature Algorithm: sha256WithRSAEncryption
9d:69:60:a9:39:bf:1b:71:a2:cc:2d:15:be:12:d6:c0:dc:12:
5f:2e:7c:fd:c5:05:f4:79:1c:36:4a:8a:19:52:1b:4c:e9:05:
2a:74:f6:e9:73:28:d3:3b:49:e9:de:2d:b7:18:21:69:0e:60:
4e:75:e5:38:5b:c2:5c:59:0b:75:7e:62:5d:09:29:0d:e5:4b:
b6:ca:2e:22:d2:f5:d2:51:09:5c:fb:e7:3b:b8:35:de:67:23:
7c:d4:d9:94:6a:c7:4b:6f:4d:f1:8f:d9:97:ea:28:fd:a2:ca:
24:b8:ea:20:a0:b5:c4:cc:a9:22:32:81:eb:cb:04:8b:d3:d5:
39:10:8d:1a:18:2f:1f:53:e1:43:93:59:20:4e:a6:36:2c:6e:
8b:d8:18:48:f9:39:40:f9:ad:d6:7c:39:1b:f8:c1:a5:cd:f8:
fd:ac:44:e5:c3:d5:53:cc:89:9f:ac:0a:8d:71:26:73:3b:8c:
9a:37:8a:1a:52:8f:c9:a3:2a:11:90:12:a8:98:e9:3f:48:64:
5a:2a:b5:a6:ce:1e:41:af:0f:88:a0:05:c5:81:50:c0:1e:56:
ba:4e:1c:81:88:11:5c:4c:80:a4:9b:ee:15:6d:57:ca:25:eb:
6b:5f:56:5b:da:8e:9c:0f:7f:9a:d1:9a:a1:01:f5:0a:8a:39:
7b:00:15:6a
CA Certificate in PEM Format
Use openssl x509
to convert certificate from DER
format to PEM
format:
openssl x509 -in cert.crt -inform der
Converted PEM
format certificate:
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Also see Top 1 Millions Domains CA Certificate List
Related Certificates
- airespace-root.cer: 1.2.840.113549.1.9.1=support@airespace.com,CN=Airespace Root CA,OU=Engineering,O=Airespace Inc.,L=San Jose,ST=California,C=US (Expiring: 2013-04-29)
- airespace-root-old.cer: 1.2.840.113549.1.9.1=support@airespace.com,CN=ca,OU=none,O=airespace Inc,L=San Jose,ST=California,C=US (Expiring: 2012-11-11)
- ACT2ECCSUDI.cer: CN=ACT2 ECC SUDI CA,O=Cisco (Expiring: 2099-09-07)
- ACT2SUDICA.cer: CN=ACT2 SUDI CA,O=Cisco (Expiring: 2029-05-14)
- cbarc2099.cer: CN=Cisco Basic Assurance Root CA 2099,O=Cisco (Expiring: 2099-05-26)
- CiscoClientCA001.cer: CN=Cisco Client CA 001,O=Cisco Systems (Expiring: 2019-05-14)
- eccroot.cer: CN=Cisco ECC Root CA,O=Cisco (Expiring: 2099-09-07)
- ceca.cer: CN=Cisco Employee CA,O=Cisco (Expiring: 2029-05-14)
- cmca3.cer: CN=Cisco Manufacturing CA III,O=Cisco (Expiring: 2099-05-26)
- cmca2.cer: CN=Cisco Manufacturing CA SHA2,O=Cisco (Expiring: 2037-11-12)
- cmca.cer: CN=Cisco Manufacturing CA,O=Cisco Systems (Expiring: 2029-05-14)
- rxcr2.cer: CN=Cisco RXC-R2,O=Cisco Systems,C=US (Expiring: 2034-07-09)
- crca2048.cer: CN=Cisco Root CA 2048,O=Cisco Systems (Expiring: 2029-05-14)
- crca2099.cer: CN=Cisco Root CA 2099,O=Cisco (Expiring: 2099-08-09)
- crcam1.cer: CN=Cisco Root CA M1,O=Cisco (Expiring: 2033-11-18)
- crcam2.cer: CN=Cisco Root CA M2,O=Cisco (Expiring: 2037-11-12)
- ssca.cer: CN=Cisco SSCA,O=Cisco Systems (Expiring: 2012-04-05)
- ssca2.cer: CN=Cisco SSCA2,O=Cisco Systems (Expiring: 2015-10-22)
- ssca3.cer: CN=Cisco SSCA3,O=Cisco Systems,C=US (Expiring: 2018-09-26)
- ciscoumbrellaroot.cer: CN=Cisco Umbrella Root CA,O=Cisco (Expiring: 2036-06-28)
- xsslr2.cer: CN=Cisco XSSL-R2,O=Cisco Systems,C=US (Expiring: 2034-07-09)
- hraca.cer: CN=HRA SubCA,OU=Rigel,O=Cisco (Expiring: 2035-04-17)
- itarca.cer: CN=IT Application Root CA,O=Cisco,OU=Pollux (Expiring: 2048-04-17)
- innerspace.cer: CN=Innerspace SubCA RSA,O=Cisco (Expiring: 2037-11-12)
- innerspace_sha256.cer: CN=Innerspace SubCA RSA,O=Cisco (Expiring: 2037-11-12)
- kca.cer: CN=Kafka SubCA,OU=Antares,O=Cisco (Expiring: 2048-04-17)
- sarca.cer: CN=Strong Authentication Root CA,O=Cisco,OU=Betelgeuse (Expiring: 2068-06-01)
- suasca.cer: CN=Strong User Authentication SubCA,OU=Canopus,O=Cisco (Expiring: 2068-06-01)
- test-root-ca-2048.cer: CN=TEST Root CA 2048,O=Cisco Systems (Expiring: 2034-02-19)
- vorca.cer: CN=Virtual Office Root CA,O=Cisco,OU=Castor (Expiring: 2035-04-17)
- vuefisca.cer: CN=Virtual UEFI SubCA,OU=Antares,O=Cisco (Expiring: 2099-04-03)
- attca.cer: O=Cisco,CN=Attestation CA (Expiring: 2099-08-09)
- hasudi.cer: O=Cisco,CN=High Assurance SUDI CA (Expiring: 2099-08-09)