There could be some errors here (I often learn stuff while investigating Posts), but basically the SSL protocol provides you with the certificate...for you to verify and establish the connection. You don't provide the server with anything that is stored in a local file.
Occasionally you will see things like "certificate expired" or some such error. It is possible for you to make an "exception to the rule" and allow this connection. In this case, you would consult some "rule" stored on your computer or ask the user. But in general if the Server has a valid certificate, you don't need to do anything.
I found this post on stackoverflow validate SSL Certificate. It appears that if you use the most recent version of LWP:
use LWP::UserAgent 6;
LWP will validate that the server cert is valid, LWP >=6.03 and solves a host_name spoof issue - (may or not be a problem for you).
How to override that and continue with an apparently invalid certificate is something that I do not know. But there are links to some complex stuff. Anyway if the server has a valid cert, I don't see any action for you to do. Basically, it will "just work".
See Microsoft: about certificate errors
and Wiki Public_key_certificate.
You will need to install Crypt-SSLeay, but once you do that, LWP "knows about it" and uses it when you connect via HTTPS. There is nothing more to do. An HTTP connection happens on port 80. An HTTPS connection happens on port 443. LWP will figure that out from the URL.
Update: Yes indeed there can be client files that may be required to talk to an SSL connection. I realized that I actually have such a file (thank you Monks for jogging my memory!). However this, to my recollection, wasn't easy to set up and the sysop had to help me do it. I would ask the OP: is that what you mean?
In reply to Re: LWP and Windows certificates store
by Marshall
in thread LWP and Windows certificates store
by asthaonard
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |