# This is Microsoft's use of the "othername" type to embed the UPN which is an arbitrary field with no meaning in the x509 standard and therefore not parsed by the openssl command x509. You can dump it by discovering the byte offset of the SAN with an ASN1 browser like this:
-- View this message in context: http://openssl.6102.n7.nabble.com/How-to-read-the-Principal-Name-tp45083p45739.html Sent from the OpenSSL - User mailing list archive at Nabble.com. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org