The certificate contains only a public certificate. Nothing can stop you from using the private key for any things you want to do with it.
As mentioned earlier, the certificate for the other side must deal - after you have signed or encrypted something, the other side must make a decision if it is satisfied. He then checks the certificate and its flags to make sure that it can be used for the operation, in accordance with the policies set for the other party.
source share