Extract data from Cryptographic Signatures.

Parameters
X509 Certificates, PKCS7 SignaturesThe SignatureCrypto action is used to extract metadata from digital signatures or X.509 certificates provided in PEM format. It supports decoding:
This action is useful in certificate validation, PKI data processing, and cryptographic audits.
pem_certificate
"-----BEGIN CERTIFICATE-----
MIIDXTCCAkWgAwIBAgIJAKC7Va4O6ZilMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV
...
-----END CERTIFICATE-----"
| Column | Description |
|---|---|
cert_Status |
Shows Success or Error based on parsing outcome |
cert_Certificate_Serial_Number |
Certificate serial number |
cert_Subject |
Subject (who the certificate is issued to) |
cert_Issuer |
Issuer (who issued the certificate) |
cert_NotBefore |
Certificate validity start |
cert_NotAfter |
Certificate expiry date |
cert_Public_Key |
Public key |
cert_Email, cert_Purpose, etc. |
Optional fields extracted when extensions are enabled |
If cert_Status shows Error, most output fields will be null.

Notes
- This action is designed for PEM-encoded content only. DER/binary formats must be converted prior to input.
- The action will fail if the PEM data is line-broken in CSV. Prefer readTXT for loading full PEM blobs.
- In production, validate with test certs and adjust toggles (BEGIN/END, extensions) as needed.
