VPN
OpenVPN Connect
Edit the Client Profile
2 min
in this section, we will edit the client connection profile ( ovpn file) to prepare it for the pkcs #11 integration with the futurex cryptohub important if your openvpn access server instance is integrated with cryptohub, you should skip this section and go straight to docid gdbeqtpfppn5hffwqwhv open your terminal and navigate to the directory where you saved the ovpn connection profile extract the ca certificate sed n '/\<ca>/,/<\\/ca>/p' futurex profile ovpn | sed '1d;$d' > ca crt extract the client certificate sed n '/\<cert>/,/<\\/cert>/p' futurex profile ovpn | sed '1d;$d' > client crt remove the client certificate from the connection profile sed i '/\<cert>/,/<\\/cert>/d' futurex profile ovpn extract the client private key sed n '/\<key>/,/<\\/key>/p' futurex profile ovpn | sed '1d;$d' > client key remove the client private key from the connection profile sed i '/\<key>/,/<\\/key>/d' futurex profile ovpn you should now have four files the client connection profile ( futurex profile ovpn ) the ca certificate ( ca crt ) the client certificate ( client crt ) the client private key ( client key ) create pkcs #12 file containing the client certificate and private key in this sub section, we'll use openssl to package the client certificate, client private key, and ca certificate into an encrypted and password protected pkcs #12 file run the following openssl command openssl pkcs12 export inkey client key in client crt certfile ca crt out futurex p12 this command will prompt you set an export password this password will be required to import the pkcs #12 file into the cryptohub in the next sub section