#### **Certify The Web**
Another popular GUI-based client for Windows.
* **Location:** `C:\ProgramData\Certify\manageditems`
* **Files to look for:** The certificates are stored in subfolders here. You c
an also use the Certify The Web app itself, click on your certificate, and go to
**Advanced -\> Export Certificate** to export the PEM files directly.
#### **Posh-ACME** (PowerShell based)
* **Location:** `%LOCALAPPDATA%\Posh-ACME\` or `~/.config/Posh-ACME/`
* **Files to look for:** Certificates are usually organized in subfolders by d
omain name.
-
### \#\# What If I Only Find a `.pfx` File?
Some clients, like Certify The Web, prefer to create a single `.pfx` file which
contains both the certificate and the private key. HMailServer cannot use this f
ile directly, so you must extract the `.cer` and `.key` files from it using **Op
enSSL**.
1. Copy the `.pfx` file to a working directory.
2. Open a command prompt and run these two commands:
**To extract the public certificate (`.cer`):**
```bash
openssl pkcs12 -in yourdomain.pfx -clcerts -nokeys -out yourdomain.cer
```
**To extract the private key (`.key`):**
```bash
openssl pkcs12 -in yourdomain.pfx -nocerts -nodes -out yourdomain.key
```
You will be prompted for an "Import Password." If you did not set one when c
reating the certificate, just press Enter (the password may be blank).
Once you identify your client and locate the correct `pem` files (or extract the
m from a `.pfx` file), you can proceed with the steps to **rename the files** an
d **configure HMailServer** as described previously.