LetsEncrypt real case to find the certification



#### **Certify The Web**


Another popular GUI-based client for Windows.


  * **Location:** `C:\ProgramData\Certify\manageditems`

  * **Files to look for:** The certificates are stored in subfolders here. You can also use the Certify The Web app itself, click on your certificate, and go to **Advanced -\> Export Certificate** to export the PEM files directly.


#### **Posh-ACME** (PowerShell based)


  * **Location:** `%LOCALAPPDATA%\Posh-ACME\` or `~/.config/Posh-ACME/`

  * **Files to look for:** Certificates are usually organized in subfolders by domain name.


-


### \#\# What If I Only Find a `.pfx` File?


Some clients, like Certify The Web, prefer to create a single `.pfx` file which contains both the certificate and the private key. HMailServer cannot use this file directly, so you must extract the `.cer` and `.key` files from it using **OpenSSL**.


1.  Copy the `.pfx` file to a working directory.


2.  Open a command prompt and run these two commands:


    **To extract the public certificate (`.cer`):**


    ```bash

    openssl pkcs12 -in yourdomain.pfx -clcerts -nokeys -out yourdomain.cer

    ```


    **To extract the private key (`.key`):**


    ```bash

    openssl pkcs12 -in yourdomain.pfx -nocerts -nodes -out yourdomain.key

    ```


    You will be prompted for an "Import Password." If you did not set one when creating the certificate, just press Enter (the password may be blank).


Once you identify your client and locate the correct `pem` files (or extract them from a `.pfx` file), you can proceed with the steps to **rename the files** and **configure HMailServer** as described previously.



Comment list 0

No comment