Certificate and Key Requirements

Format and requirements for certificates and private keys used with Bindplane collectors.

triangle-exclamation

Format Requirements Summary

Requirement
Status
Details

Format

PEM ONLY

Base64-encoded text with headers

DER Format

NOT SUPPORTED

Binary format must be converted to PEM

PKCS#12/PFX

NOT SUPPORTED

Bundle format (.p12, .pfx) must be extracted to PEM

Private Key

Must be unencrypted

Password-protected keys NOT supported

Certificate

Must start with -----BEGIN CERTIFICATE-----

Binary files NOT supported

Private Key

Must start with -----BEGIN PRIVATE KEY----- or similar

Binary files NOT supported

PEM Format Identification

What PEM Files Look Like

PEM files are human-readable text files containing Base64-encoded data with clearly marked headers and footers.

Valid PEM certificate:

-----BEGIN CERTIFICATE-----
MIIDXTCCAkWgAwIBAgIJAKJ3PqGFGNkqMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV
BAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBX
... (more base64 text) ...
-----END CERTIFICATE-----

Valid PEM private key headers:

How to Check Your File Format

What you should see:

  • If you see -----BEGIN CERTIFICATE----- or -----BEGIN PRIVATE KEY----- → PEM format

  • If you see binary gibberish or unreadable characters → DER format or other

Supported Key Types

Key Type
Supported
Private Key Format
Notes

RSA

YES

PKCS#1 or PKCS#8

Most common. Headers: -----BEGIN RSA PRIVATE KEY----- or -----BEGIN PRIVATE KEY-----

ECDSA

YES

SEC1 or PKCS#8

Modern, efficient. Headers: -----BEGIN EC PRIVATE KEY----- or -----BEGIN PRIVATE KEY-----

Ed25519

YES

PKCS#8 only

Modern, fast. Header: -----BEGIN PRIVATE KEY-----

DSA

NO

Not supported

Legacy algorithm

Encrypted Private Keys Are NOT Supported

triangle-exclamation

How to Check if Your Key is Encrypted

View the key file:

Encrypted keys contain one of these indicators:

  • Header: -----BEGIN ENCRYPTED PRIVATE KEY-----

  • Contains line: Proc-Type: 4,ENCRYPTED

  • Contains line: DEK-Info: DES-EDE3-CBC,...

Decrypting Private Keys

If your key is encrypted, you MUST decrypt it before use:

For RSA keys (PKCS#1):

For other key types or PKCS#8 format:

Secure the decrypted key file:

Verify the key is unencrypted:

Certificate Chain Requirements

What Clients Need to Verify

When a client connects to your collector, it needs to verify the certificate chain from your server certificate up to a trusted root CA. If any intermediate certificates are missing, clients will fail with errors like:

  • "Unknown CA"

  • "Certificate verification failed"

  • "Unable to get issuer certificate"

Creating a Full Chain Certificate

Your certificate file should contain certificates in this order:

  1. Server/leaf certificate (first)

  2. Intermediate CA certificate(s)

  3. Root CA (optional, clients usually have this)

Example:

The resulting file should look like:

circle-info

Certificate Order Matters

The order must be: leaf certificate first, then intermediate(s), optionally root CA last. Reverse order will cause verification failures.

Private Key Requirements

CRITICAL REQUIREMENTS:

  1. Must be PEM format - Binary DER format is not supported

  2. Must be unencrypted - Password-protected keys are not supported

  3. Must match the certificate - The private key must be the one used to generate the certificate

For instructions on verifying that your certificate and key match, see Testing and Verification: Verify Certificate and Key Match.

File Permissions and Security

Proper file permissions are critical for security:

Private key files:

Certificate files:

circle-exclamation

Quick Format Verification Checklist

Before using certificates with Bindplane collectors, verify:

File Extensions and Naming Conventions

circle-info

File Extensions Are Just Naming Conventions

Extensions like .crt, .pem, .key, .cer, and .cert are naming conventions, not strict indicators of content. The actual file format (PEM vs DER) matters more than the extension.

Extension
Typical Content
Format
Notes

.pem

Anything (cert, private key, public key, CA cert, chain)

Base64-encoded with headers

Most flexible format

.crt / .cert / .cer

Certificate (public certificate)

Usually PEM, sometimes DER

Convention suggests it's a certificate

.key

Private key

Usually PEM, sometimes DER

Convention suggests it's a private key

.ca / .ca-bundle

CA certificate(s)

Usually PEM

Multiple CA certs concatenated

.der

Anything

Binary DER encoding

Not human-readable

Inspecting File Contents

You can't always trust the file extension. To see what's actually in a file:

Need to Convert Formats?

If your certificates are not in PEM format, see Certificate Conversion Guide.

Last updated

Was this helpful?