You are located in service: Public Key Certificates

User certificates RA-Portal

User certificates RA-Portal

Detailinformation

Please note:
If your institute email address is not displayed in RA-Portal, please contact your network contact person (IT administrator) at your institute.
They can/should add your email address into RA-Portal and send you a challenge email. After redeeming your token, that is after confirming your email address via the link in the challenge email, your institute email address will be shown in RA-Portal. The following instructions describe how to apply for and collect a user certificate (also known as S/MIME certificate) in RA-Portal via your browser:

Please note:

  • An existing user certificate from RA-Portal must either be revoked, expired or valid for less than 28 days before a new one can be requested.
  • An existing user certificate from the DFN-PKI Global can continue to be used until it's expiration date. RA-Portal does not know about your DFN-PKI certificates and therefore does not prevent the issuance of another user certificate in RA-Portal. However, the simultaneous use of several user certificates for one email address is not recommended and leads to considerable problems with email encryption.

Detailinformation

During the certificate application process, two files are created and are to be saved locally:

  • the certificate request file (.json file), containing your cryptographic keys
  • the certificate file including your cryptographic keys (.p12 file)

Both of the above mentioned files contain your cryptographic keys and must be stored password protected (encrypted):

  • a .json password for the .json file (certificate request file)
    a .p12 password for the .p12 file (certificate file including cryptographic key)

Be sure to keep these files and passwords safe!

Without the .json file, you cannot generate the .p12 file (for browser-generated RSA keys).

Without the .p12 file, you cannot use your certificate.

After saving the .p12 file, the .json file may be deleted.

 

Request user certificate

1. Log into RA-Portal via Single Sign-On

  • You can only reach RA-Portal from within the RWTH intranet.
  • Your session expires after 60 minutes.

During the single sign-on, your employee/student/member status is transmitted to RA-Portal. If you do not have an employee or student status, RA-Portal will tell you that you need to carry out an identity check before you can continue with the client certificate application. You can find instructions under “Identity verification”.

 

2. Select the tab "Meine Client-Zertifikate" (my client certificates)

On your first visit, the table of your own client certificates should be empty.

3. Click the button "+ Client-Zertifikat beantragen"

Client-Zertifikat beantragen

 

4. Check whether the email address for which you want to request a certificate is present

Your @rwth-aachen.de and @post.rwth-aachen.de email addresses are conveyed automatically to RA-Portal and are therefore always displayed in the list of email addresses assigned to you.

Your institute email address(es) are only shown, once they have been "allowed" in RA-Portal. This is a multistep process:

  • The network contact person at your institute has to add your email address into RA-Portal.
  • They have to trigger the sending of a challenge email to you. A challenge email is sent from "ra-portal-noreply@itc.rwth-aachen.de" with Subject "[RA-Portal] Freischaltung für / Access for <email>" and is digitally signed.
  • You need to confirm receipt of this email by following the redeem-token-URL and logging into RA-Portal.
  • From then on, and for as long as your network contact person allows it, you will see your institute email address in RA-Portal.

By clicking on the redeem-token-URL in the challenge email, you login (via your browser) to RA-Portal and your email address is associated with your username. If there are no more pending challenge emails, e.g. aliases for your mailbox, then from this point on you can request certificates for your email address in RA-Portal. Either immediately or the next time you visit RA-Portal.

Bestätigung der E-Mail-Adresse

5. Generate a certificate request (with key generation in the browser)

As an alternative to generating your cryptographic keys in the browser, you can also upload a certificate request (this route is currently disabled, we are working on it). This requires the prior generation of your cryptographic keys and a CSR file via openssl.

Select the email address for which you want to request a certificate.

  • Aliases for @rwth-aachen.de addresses can be deselected. More then 2 aliases can not be included (limit imposed by CA), hence either deselect them all or turn to the ID-ServiceDesk to have superflous ones removed and come back.
  • “Not requestable” are email addresses for which a valid certificate exists in RA-Portal that is valid for more than 28 days. If you need a new certificate for such an email address, you must first revoke the valid certificate. To do this, go back to “My client certificates”.

The “Vorname (für Zertifikat)” field is your First Name:

  • For personal email addresses, you may choose to use either your given name (indicated as "Vollständiger Vorname") or your preferred name (indicated as "Rufname"). These are automatically sourced from your Identity Management data. They appear as soon as you have selected one personal email account. Please note that currently special characters in your name are not accepted by the certification authority and have been transcribed as shown. 
  • For functional email addresses this field is not relevant. 

The “Nachname (für Zertifikat)” field is your Surname:

  • For personal email addresses, your Surname is automatically sourced from your Identity Management data. It appears as soon as you have selected one personal email account. Please note that, currently, special characters in your name are not accepted by the certification authority and have been transcribed as shown.
  • For functional email addresses this field is not relevant. 

The “Common Name (für Zertifikat)” field is your Common Name:

  • For personal email addresses, this field is a concatenation of your chosen Vorname and Nachname above. Please note that, at present, special characters in your name are not accepted by the certification authority and have been transcribed as shown.
  • For functional email addresses this field is not relevant. 

    The field "Passwort zum Verschlüsseln des Private Key": Set a password to encrypt your .json file. The .json file contains your cryptographic keys. You need this file and its password to retrieve and use your certificate. There is no password reset available, so keep the file and its password safely.

    Schlüsselalgorithmus: Select "RSA-4096" (recommended) or "RSA-2048.

     

      Your Full Name:

      • If your IdM name does not match the name in your personal identification document, please contact the central university administration that manages your data in order to have your name corrected, and come back later.
      • Please note that (academic) titles cannot be entered on RA-Portal certificates, even if these are documented in your identity document.

      Pflichtfelder (Mandatory fields):

      • Please confirm that your name, as conveyed from your IdM data, is correct and that you have authorized access to the mailbox.
      • Please consent to the processing of your data for the purposes of issuing and managing your user certificate. Please read the text carefully.
      • You acknowledge that your certificate is included in the RWTH-LDAP (RWTH internal directory service) and the DFN-LDAP.

      6. Upload the certificate application

      Clicking on the blue button triggers three events:

      • Generate certificate request in your browser (here your cryptographic keys are generated in your browser).
      • Save the certificate request file locally (here the .json file is saved locally on your device).
      • Upload your certificate request into RA-Portal.

      Depending on your browser settings, you may be asked where and how to save the .json file. If you do not get a dialog box and/or use the default browser settings, then the .json file is saved in the Downloads folder.

      7. Send the certificate request

      After you have generated your certificate signing request (application), you have to send (submit) it to the CA (Certification Authority). There are two ways around this.

      Sidenote: here is your last chance to save the .json file (again): The .json-file should have been automatically downloaded to your computer in the previous step 5 (check your Downloads folder if necessary). By clicking the "Antragsdatei erneut speichern" button you can request to download it again manually. The .json file is necessary in order to use your certificate later (as it contains your cryptographic keys).

      Your certificate signing request (application) must now be sent to the CA (PKI). This can be done in two ways:

      • By clicking on the button "Zertifikatsantrag jetzt absenden" (Send certificate application now) your certificate application will be sent to the CA immediately. Proceed to step 8 of this instruction.

      • By clicking on the “Zertifikatsantrag erst anzeigen" (Show certificate request first) button, you can check your request again before sending it to the CA.
        • You can read the plaintext content of your certificate signing request under "Inhalt des Zertifikatsantrages" (Content of the certificate request).
        • You still have the option to change your mind und just delete your certificate application by clicking on the "Löschen" (delete) button.
        • Or you can click on the "Absenden" (send) button, and finally send your certificate application to the CA.

       

      Collect user certificate

      8. Collect your user certificate

      Once your certificate has been issued, you will receive an email notification from ra-portal-noreply@itc.rwth-aachen.de with subject "[ra-portal] Client-Zertifikat für <email> ausgestellt" (client certificate for <email> issued).

      A green check mark is displayed left of the certificate “Status” "Momentan gültig" (currently valid). It is now possible to download your certificate and "bind" it to your cryptographic keys (step 5-6).

      • Select the button "PKCS#12-Datei generieren" to generate your PKCS#12 file. This is what you need to import into your email or document signing application.
      • Option "Zertifikat-Download (PKCS#7)": Here you can download your user certificate with its chain. This option is required if your certificate request was previously generated via openssl.
      • Option "Inhalt als Text anzeigen": This is the content of your S/MIME certificate in plaintext.
       

      The “Durchsuchen” (Browse) field: Click to select the certificate request file (.json file) you downloaded in step 6.

      The "Passwort zum Entschlüsseln des Private Key" (Password for decrypting the private key) field: Enter the password for the .json file that was set in step 5.

      The "Passwort zum Verschlüsseln des PKCS#12-Datei" (Password for encrypting the PKCS#12 file) field: Set a password for your .p12 file. You need this password to be able to import your .p12 file (and consequently your certificate and the associated cryptographic keys) into your email application, for example. Keep this password safe, there is no way to recover or reset it.

      Click on the “PKCS#12-Datei erstellen" (create PCKS#12 file) button to generate the .p12 file and save it locally.

      It is also possible to reuse the .json password for the .p12 file. To do this, click the box "Gleiches Passwort ... benutzen" (use the same password to encrypt the PKCS#12 file).

      You will receive a confirmation that the .p12 file has been created. If you were unable to download the file, you can click on the green “PKCS#12-Datei erneuet speichern” button (not shown here).

      Once you have successfully downloaded and saved your .p12 file, you can close the pop-up.

      Please keep this .p12 file safe, you will need later in order to import your “certificate” into various applications.

      Once you have found a secure place for your .p12 file, you can (and should) delete your .json file (aka tidying up loose ends).


      Additional Information:

      last changed on 04/04/2025

      How did this content help you?

      Creative Commons Lizenzvertrag
      This work is licensed under a Creative Commons Attribution - Share Alike 3.0 Germany License