Generate SSH key pair

From here you can generate a new SSH key pair.
This includes the private key together with the associated public key.

Type of the new SSH Key.

Size of the new SSH Key.

Optional passphrase used to encrypt newly created private key.
Leave empty when you don't want to protect generated private keys with a password/passphrase.

Read or convert the format of an existing SSH key

From here you can load an existing SSH key and have it available in all the supported formats.
Both private key and public keys are supported.

Local SSH key (private or public) to be validated.

Select local file

Optional password used to read encrypted private keys.
Leave empty for public keys and private keys which are not password protected.

Optional password used to generate encrypted private keys.
Leave empty for public keys and private keys which should not be password protected.

CSR or self-signed certificate generation

From here you can generate a certificate signing request (CSR) or a fully functional self-signed certificate.
CSR can automatically generate an associated private key and can also be associated with an existing private key.

Size of the new SSL Key.

Optional password used to encrypt newly created private key.
Leave empty when you don't want to protect generated private keys with a password.

Private key (in PEM format) used to generate the CSR.

In general this is the fully qualified domain name (FQDN) for the server attached to this certificate.
If you are generating a certificate for a wildcard domain name, your common name must start with an *, for example *.domain.tld.

Optional alternative name associated with the certificate.
For example DNS:www.fs.domain.tld or IP:192.168.7.1.
A combined example: DNS:www.fs.domain.tld,IP:192.168.7.1.

Optional comma-separated key usage extensions for the certificate.
Prefix with 'critical' to make them mandatory.
For example key-agreement,server-authentication or critical,server-authentication.

Optional comma-separated basic constraints for the certificate.
Prefix with 'critical' to make them mandatory.
For example CA:FALSE or critical,CA:TRUE.

Optional email address associated with the certificate.

Full legal company or personal name, as registered in your state.

Optionally, the branch of your company ordering the certificate (accounting, marketing, etc).

Full name for city, locality, district.

Full name for state, province, region.

Country associated with the certificate.

Algorithm used to signed the certificate or CSR.

Not all input fields are valid.

PFX/P12 convertion

The .pfx or .p12 are password protected files containing the certificate itself, the private key and the list of certificates for the associated certificate authority.

Local SSL key or certificate.

Select local file

Password used to read the encrypted private keys.

PGP / GPG / OpenPGP key generation

This will generate a private key together with the associated public key.

Type of the new GPG/PGP Key.

Size of the new GPG/PGP Key.

Name associated with the new PGP key.
If this is empty, you need to define an email.

Email address associated with the new PGP key.
If this is empty, you need to define a name.

Comment associated with the new PGP key.

Optional passphrase used to encrypt newly created private key.
Leave empty when you don't want to protect with a password the newly generated private key.

File imported as with password protected without password protected private key. Private key exported with password without password protection .
SFTPPlus / OpenSSH Public (single line)

    

When handling the public key, make sure it is stored as a single line.

OpenSSH V1 Private

  
OpenSSH PEM Private

  
PuTTY Key File version 3

  
PuTTY Key File version 2

  
SSH.com Public

  
SSH.com Private

  
Public fingerprints
MD5

    SHA1

    SHA256

  
File imported as with password protected without password protected private key. Private key exported with password without password protection .
Self-signed certificate in PEM x509 format

  
Certificate Signing Request in PEM x509 format

  
Certificate in PEM x509 format

  
Private Key in PEM PKCS#8 format

    

The private key identifies the server. To prevent server impersonation, make sure it is not exposed to 3rd parties.

Certificate chain in PEM x509 format

  
PGP/GPG Public Key

  
PGP/GPG Private Key