Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
These steps are typically performed by the OpenVPN Access Server Admin. See Underlying Responsibility Roles for more information.
.ovpn file) to prepare it for the PKCS #11 integration with the Futurex CryptoHub.
Extract the CA Certificate, Client Certificate, and Client Private Key
Extract the individual certificate components from the generated You should now have four files:
.ovpn file:- The client connection profile (
futurex-profile.ovpn). - The CA certificate (
ca.crt). - The client certificate (
client.crt). - The client private key (
client.key).
Remove the embedded certificate and key blocks from the .ovpn file:Verify the removal was successful:If the command returns nothing, the removal was successful.
Create a PKCS #12 file containing the client certificate and private key:
This command will prompt you to set an export password. This password will be provided to the end user so they can import the PKCS #12 file into the CryptoHub in the next sub-section.
Replace
futurex.p12 with the name that you would like the .p12 to be stored as and futurex_client with a name that identifies the client certificate. Package the following file for the CryptoHub admin:
futurex.p12: PKCS #12 file containing the client certificate and private key (used for importing into the CryptoHub)Export password: The password you set when exporting the PKCS #12 file, which will be needed for importing into the CryptoHub
Futurex_profile.ovpn: Modified client profileCRYPTO-OPR-PASS: The password for the hardware token, which will be needed to authorize the token in OpenVPN Connect and establish a VPN connection.

