<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article SHA-256 and Converting the Cryptographic Service Provider Type in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/SHA-256-and-Converting-the-Cryptographic-Service-Provider-Type/ta-p/1716032</link>
    <description>&lt;P&gt;SHA-256, SHA-384 and SHA-512&amp;nbsp;XML signatures require the &lt;STRONG&gt;Microsoft Enhanced RSA and AES Cryptographic Provider&lt;/STRONG&gt;. This provider's type is 24.&lt;BR /&gt;&lt;BR /&gt;More details about cryptographic service providers (CSPs) and their capabilities may be found at:&lt;BR /&gt;&lt;A title="https://msdn.microsoft.com/en-us/library/windows/desktop/bb931357(v=vs.85).aspx" href="https://msdn.microsoft.com/en-us/library/windows/desktop/bb931357(v=vs.85).aspx" target="_blank" rel="noopener"&gt;https://msdn.microsoft.com/en-us/library/windows/desktop/bb931357(v=vs.85).aspx&lt;/A&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How to verify:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This can be checked using Microsoft's &lt;STRONG&gt;CertUtil&lt;/STRONG&gt;&amp;nbsp;command.&amp;nbsp;The following command outputs information about the private key and certificate including the CSP.&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;&lt;STRONG&gt;c:\&amp;gt;certutil -dump c:\temp\idp.pfx&lt;/STRONG&gt;
Enter PFX password:
================ Certificate 0 ================
================ Begin Nesting Level 1 ================
Element 0:
Serial Number: 09ec562aa92ffa0ed554f5135afa3ccb
Issuer: CN=DigiCert High Assurance CA-3, OU=www.digicert.com, O=DigiCert Inc, C=US
 NotBefore: 2/7/2013 2:00 AM
 NotAfter: 4/4/2016 2:00 PM
Subject: CN=*.qlik.com, O=QlikTech International AB, L=Lund, S=Skane, C=SE
Non-root Certificate
Cert Hash(sha1): d7 fe a0 8d c7 f5 e5 e4 ff e9 14 91 00 d9 95 5f 61 51 00 68
----------------  End Nesting Level 1  ----------------
  Provider = &lt;STRONG&gt;Microsoft RSA SChannel Cryptographic Provider&lt;/STRONG&gt;
Encryption test passed
CertUtil: -dump command completed successfully.&lt;/PRE&gt;
&lt;P&gt;The "Microsoft RSA SChannel Cryptographic Provider"&amp;nbsp;is suitable for SHA-1 XML signatures but doesn't support SHA-256 XML signatures.&lt;/P&gt;
&lt;P&gt;The PFX can be recreated specifying the required CSP.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Before conversion:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;- NB. The conversion does not modify the public or private key values or any other information apart from the CSP to use.
- NB. It's safe to perform this conversion on self-signed as well as certificate authority issued certificate files.
- One method to perform this conversion is to use OpenSSL. Windows binaries are available for download. Refer to the &lt;A href="https://wiki.openssl.org/index.php/Binaries" target="_blank" rel="noopener"&gt;OpenSSL Wiki&lt;/A&gt;.&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Start conversion:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;1. Firstly, it must be converted from&amp;nbsp;PKCS12 to PEM format. From the example below, you will see how to convert a single .pfx file containing both certificate and private key into a .pem format. When it was asked, be ready to provide the password used for protecting the private key.&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;&lt;STRONG&gt;c:\&amp;gt;openssl pkcs12 -in c:\temp\idp.pfx -out c:\temp\idp.pem&lt;/STRONG&gt;
WARNING: can't open config file: /usr/local/ssl/openssl.cnf
Enter Import Password:
MAC verified OK
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;2.&amp;nbsp;Then it must be converted back to PKCS12 specifying the Microsoft Enhanced RSA and AES Cryptographic Provider.&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;&lt;STRONG&gt;c:\&amp;gt;openssl pkcs12 -export -in c:\temp\idp.pem -out c:\temp\new-idp.pfx -CSP "Microsoft Enhanced RSA and AES Cryptographic Provider" &lt;SPAN&gt;-certpbe PBE-SHA1-3DES -keypbe PBE-SHA1-3DES -macalg sha1&lt;/SPAN&gt;&lt;/STRONG&gt;
WARNING: can't open config file: /usr/local/ssl/openssl.cnf
Enter pass phrase for c:\temp\idp.pem:
Enter Export Password:
Verifying - Enter Export Password:&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;3. Now you can verify the CSP in the new PFX file with the CertUtil command again.&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;&lt;STRONG&gt;c:\&amp;gt;certutil -dump c:\temp\new-idp.pfx&lt;/STRONG&gt;
Enter PFX password:
================ Certificate 0 ================
================ Begin Nesting Level 1 ================
Element 0:
Serial Number: 09ec562aa92ffa0ed554f5135afa3ccb
Issuer: CN=DigiCert High Assurance CA-3, OU=www.digicert.com, O=DigiCert Inc, C=US
 NotBefore: 2/7/2013 2:00 AM
 NotAfter: 4/4/2016 2:00 PM
Subject: CN=*.qlik.com, O=QlikTech International AB, L=Lund, S=Skane, C=SE
Non-root Certificate
Cert Hash(sha1): d7 fe a0 8d c7 f5 e5 e4 ff e9 14 91 00 d9 95 5f 61 51 00 68
----------------  End Nesting Level 1  ----------------
  Provider = &lt;STRONG&gt;Microsoft Enhanced RSA and AES Cryptographic Provider&lt;/STRONG&gt;
Encryption test passed
CertUtil: -dump command completed successfully.&lt;/PRE&gt;
&lt;P&gt;The new PFX file is now ready for generating SHA-256, SHA-384 and SHA-512&amp;nbsp;XML signatures.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Conversion is Done!&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;OPTIONAL: If you have your certificate and private key stored in the .pem format already but separate files, the following command will help you to combine them and generate the .pfx file with the correct CSP.&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;openssl pkcs12 -export -inkey key.pem -in cert.pem -out new-idp.pfx -CSP "Microsoft Enhanced RSA and AES Cryptographic Provider" &lt;SPAN&gt;-certpbe PBE-SHA1-3DES -keypbe PBE-SHA1-3DES -macalg sha1&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;Reference link:&lt;BR /&gt;&lt;A href="http://www.componentspace.com/Forums/1578/SHA256-and-Converting-the-Cryptographic-Provider-Type" target="test_blank"&gt;http://www.componentspace.com/Forums/1578/SHA256-and-Converting-the-Cryptographic-Provider-Type&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 10 Mar 2026 11:28:48 GMT</pubDate>
    <dc:creator>Sonja_Bauernfeind</dc:creator>
    <dc:date>2026-03-10T11:28:48Z</dc:date>
    <item>
      <title>SHA-256 and Converting the Cryptographic Service Provider Type</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/SHA-256-and-Converting-the-Cryptographic-Service-Provider-Type/ta-p/1716032</link>
      <description>&lt;P&gt;SHA-256, SHA-384 and SHA-512&amp;nbsp;XML signatures require the &lt;STRONG&gt;Microsoft Enhanced RSA and AES Cryptographic Provider&lt;/STRONG&gt;. This provider's type is 24.&lt;BR /&gt;&lt;BR /&gt;More details about cryptographic service providers (CSPs) and their capabilities may be found at:&lt;BR /&gt;&lt;A title="https://msdn.microsoft.com/en-us/library/windows/desktop/bb931357(v=vs.85).aspx" href="https://msdn.microsoft.com/en-us/library/windows/desktop/bb931357(v=vs.85).aspx" target="_blank" rel="noopener"&gt;https://msdn.microsoft.com/en-us/library/windows/desktop/bb931357(v=vs.85).aspx&lt;/A&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How to verify:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This can be checked using Microsoft's &lt;STRONG&gt;CertUtil&lt;/STRONG&gt;&amp;nbsp;command.&amp;nbsp;The following command outputs information about the private key and certificate including the CSP.&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;&lt;STRONG&gt;c:\&amp;gt;certutil -dump c:\temp\idp.pfx&lt;/STRONG&gt;
Enter PFX password:
================ Certificate 0 ================
================ Begin Nesting Level 1 ================
Element 0:
Serial Number: 09ec562aa92ffa0ed554f5135afa3ccb
Issuer: CN=DigiCert High Assurance CA-3, OU=www.digicert.com, O=DigiCert Inc, C=US
 NotBefore: 2/7/2013 2:00 AM
 NotAfter: 4/4/2016 2:00 PM
Subject: CN=*.qlik.com, O=QlikTech International AB, L=Lund, S=Skane, C=SE
Non-root Certificate
Cert Hash(sha1): d7 fe a0 8d c7 f5 e5 e4 ff e9 14 91 00 d9 95 5f 61 51 00 68
----------------  End Nesting Level 1  ----------------
  Provider = &lt;STRONG&gt;Microsoft RSA SChannel Cryptographic Provider&lt;/STRONG&gt;
Encryption test passed
CertUtil: -dump command completed successfully.&lt;/PRE&gt;
&lt;P&gt;The "Microsoft RSA SChannel Cryptographic Provider"&amp;nbsp;is suitable for SHA-1 XML signatures but doesn't support SHA-256 XML signatures.&lt;/P&gt;
&lt;P&gt;The PFX can be recreated specifying the required CSP.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Before conversion:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;- NB. The conversion does not modify the public or private key values or any other information apart from the CSP to use.
- NB. It's safe to perform this conversion on self-signed as well as certificate authority issued certificate files.
- One method to perform this conversion is to use OpenSSL. Windows binaries are available for download. Refer to the &lt;A href="https://wiki.openssl.org/index.php/Binaries" target="_blank" rel="noopener"&gt;OpenSSL Wiki&lt;/A&gt;.&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Start conversion:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;1. Firstly, it must be converted from&amp;nbsp;PKCS12 to PEM format. From the example below, you will see how to convert a single .pfx file containing both certificate and private key into a .pem format. When it was asked, be ready to provide the password used for protecting the private key.&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;&lt;STRONG&gt;c:\&amp;gt;openssl pkcs12 -in c:\temp\idp.pfx -out c:\temp\idp.pem&lt;/STRONG&gt;
WARNING: can't open config file: /usr/local/ssl/openssl.cnf
Enter Import Password:
MAC verified OK
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;2.&amp;nbsp;Then it must be converted back to PKCS12 specifying the Microsoft Enhanced RSA and AES Cryptographic Provider.&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;&lt;STRONG&gt;c:\&amp;gt;openssl pkcs12 -export -in c:\temp\idp.pem -out c:\temp\new-idp.pfx -CSP "Microsoft Enhanced RSA and AES Cryptographic Provider" &lt;SPAN&gt;-certpbe PBE-SHA1-3DES -keypbe PBE-SHA1-3DES -macalg sha1&lt;/SPAN&gt;&lt;/STRONG&gt;
WARNING: can't open config file: /usr/local/ssl/openssl.cnf
Enter pass phrase for c:\temp\idp.pem:
Enter Export Password:
Verifying - Enter Export Password:&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;3. Now you can verify the CSP in the new PFX file with the CertUtil command again.&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;&lt;STRONG&gt;c:\&amp;gt;certutil -dump c:\temp\new-idp.pfx&lt;/STRONG&gt;
Enter PFX password:
================ Certificate 0 ================
================ Begin Nesting Level 1 ================
Element 0:
Serial Number: 09ec562aa92ffa0ed554f5135afa3ccb
Issuer: CN=DigiCert High Assurance CA-3, OU=www.digicert.com, O=DigiCert Inc, C=US
 NotBefore: 2/7/2013 2:00 AM
 NotAfter: 4/4/2016 2:00 PM
Subject: CN=*.qlik.com, O=QlikTech International AB, L=Lund, S=Skane, C=SE
Non-root Certificate
Cert Hash(sha1): d7 fe a0 8d c7 f5 e5 e4 ff e9 14 91 00 d9 95 5f 61 51 00 68
----------------  End Nesting Level 1  ----------------
  Provider = &lt;STRONG&gt;Microsoft Enhanced RSA and AES Cryptographic Provider&lt;/STRONG&gt;
Encryption test passed
CertUtil: -dump command completed successfully.&lt;/PRE&gt;
&lt;P&gt;The new PFX file is now ready for generating SHA-256, SHA-384 and SHA-512&amp;nbsp;XML signatures.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Conversion is Done!&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;OPTIONAL: If you have your certificate and private key stored in the .pem format already but separate files, the following command will help you to combine them and generate the .pfx file with the correct CSP.&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;openssl pkcs12 -export -inkey key.pem -in cert.pem -out new-idp.pfx -CSP "Microsoft Enhanced RSA and AES Cryptographic Provider" &lt;SPAN&gt;-certpbe PBE-SHA1-3DES -keypbe PBE-SHA1-3DES -macalg sha1&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;Reference link:&lt;BR /&gt;&lt;A href="http://www.componentspace.com/Forums/1578/SHA256-and-Converting-the-Cryptographic-Provider-Type" target="test_blank"&gt;http://www.componentspace.com/Forums/1578/SHA256-and-Converting-the-Cryptographic-Provider-Type&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 11:28:48 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/SHA-256-and-Converting-the-Cryptographic-Service-Provider-Type/ta-p/1716032</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2026-03-10T11:28:48Z</dc:date>
    </item>
  </channel>
</rss>

