CSR stands for Certificate Signing Request. A CSR contains information such your organization’s name, your domain name, and your location, and is filled out and submitted to a certificate authority such as SSL.com. The information in a CSR is used to verify and create your SSL certificate. Most importantly, it also contains the public […]
EV SSL FAQ(2)
OV SSL FAQ(1)
UCC SSL FAQ(1)
Code Signing certificates from SSL.com use the same technology as our other digital security certificates. However, they are designed to apply a digital signature to your software, which lets your users know it came from a trusted source. Code signing your work helps prevent tampering or compromise of your applications by unauthorized parties.
Organization Validation (or OV) certificates – also known as High Assurance certificates – are recognized to provide a higher standard in Internet trust. Ordering an SSL.com OV certificate gives visitors to your site an extra level of confidence in your web presence and your product. However, in order to fully validate and issue an OV certificate, several steps […]
Every Certificate Signing Request (or CSR) needs to include the name of what you intend to protect. Typically this is a domain name of the site you are aiming to protect.
A Fully Qualified Domain Name (or FQDN) is a complete and unambiguous domain name that specifies an exact location for an object in a Domain Name System (DNS) hierarchy. It specifies all domain levels, including the top-level domain and the root zone. Most domain names as used in the internet’s Uniform Resource Locators (or URL) are only partially […]
“I’ve lost my private key!” The private key for your SSL.com certificate is important, sure – but losing it is far from the end of the world. So relax. You’re going to be fine – since SSL.com can reissue any certificate you’ve purchased from us, at any time during the purchased term of that certificate, as […]
The SSL/TLS protocol uses a pair of keys – one private, one public – to authenticate, secure and manage secure connections. These keys are created together as a pair and work together during the SSL/TLS handshake process (using asymmetric encryption) to set up a secure session. The private key is a text file used initially to generate […]
A protocol is simply a set of rules or instructions that determine how to act or interact in a given situation. A cryptographic protocol is designed to allow secure communication under a given set of circumstances. The cryptographic protocol most familiar to internet users is the Secure Sockets Layer (or SSL) protocol, which […]
Extended Validation (or EV) certificates, with their green address bar, are recognized as the highest standard in Internet trust. Ordering an SSL.com EV certificate is a great way to offer visitors to your site an extra level of confidence. However, in order to fully validate and issue an EV certificate several steps must be […]
There are changes afoot regarding SSL certificate renewal periods. However, as always, SSL.com is here to explain and assist. Here’s what you need to know: What’s Changing? Starting April 1st, 2015, the maximum renewal period for digital security certificates will be limited to 39 months. This is actually linked to verification policy changes. A given […]