We have created instructions for the most frequently used servers and control panels for your convenience: Control Panels cPanel WHM DirectAdmin Vesta cpanel Plesk 12 Webmin Secure WHM services UNIX-based servers Apache NGINX Postfix/Dovecot mail server Mac OS Heroku Microsoft Servers IIS10 IIS8 IIS7 IIS5&6 Exchange 2007 Exchange 2013 Exchange 2013 Shell Microsoft Azure Web ..
The challenge password which is still required by some control panels and servers was previously required for certificate revocation, however, this entry is no longer used. However, there is another type of password, that can be used, the one you specify during RSA key generation. It’s called ‘passphrase’ and it is used to encrypt your ..
How it worked prior to SNI implementation SNI as a solution Applications that support SNI How to configure SNI SNI stands for Server Name Indication and is an extension of the TLS protocol. It indicates which hostname is being contacted by the browser at the beginning of the handshake process. This technology allows a server ..
Overview Advantages Disadvantages OCSP stapling setup and test Overview Most applications that depend on X.509 certificates need to validate the status of the certificates used when performing authentication, signing, or encryption operations. This certificate validity and revocation check are performed for all certificates in a certificate chain, up to the root one. If any of ..
The Certificate Authority may not accept Certificate Signing Requests that contain non-alphanumeric characters. If the details in the CSR contain symbols other than A-Z, 0-9 and dot, you may receive an error when attempting to activate your certificate. You should also leave Optional Company Name (Opt Organization) and Challenge passphrase fields empty. You may check ..
Here we would like to explain the notifications related to HTTPS connection and SSL certificates in Chrome. After installing the certificate and browsing the site via https:// one may see the following warnings in Chrome: Your connection to this site is not fully secure. This page includes HTTP resources. Connection – obsolete connection settings. Your ..
You can check to see if the CSR you generated is valid before trying to activate the SSL certificate. You can do so using an online tool from Namecheap or CSR checker from Comodo (now..
This article describes basic steps to make your WordPress website work via a secure web protocol, as well as the main methods which can be used to get rid of insecure content in order to display a green padlock in browsers. One of the key steps in ensuring that your WordPress site is secure is ..
CA Bundle file contains root and intermediate certificates. These certificates build the chain of trust for your domain certificate. The Bundle files differ by the validation level of your certificate and the key type in the CSR you used to activate your certificate. The CA Bundle file can be downloaded from your SSLs.com account. The ..
When an SSL certificate is issued, it is sent to the email address specified by you during the activation process. Your certificate’s status should be changed to Active under your account within 10-15 minutes. The option to download your certificate becomes available in your account once the certificate is issued. To download the certificate: 1. ..
What is a Certificate Signing Request? What details are included in the CSR code? What is the format of the CSR code? How can I check the details included in the CSR code? How can I generate a CSR code? What is a Certificate Signing Request? A Certificate Signing Request (CSR code) is a block ..
What Is a Private Key? Finding your Private Key when you created the CSR in-browser Finding your Private Key on Different Servers or Control Panels Linux-Based (Apache, Nginx, LightHttpd) Windows Operating Systems Mac OS X Tomcat cPanel WHM Plesk Synology NAS DSM Webmin VestaCP DirectAdmin Webuzo What Is a Private Key? You’ve received your SSL ..
For your convenience, we created CSR generation instructions for the most popular servers and control panels: Control Panels cPanel WHM DirectAdmin Webmin Vesta cpanel Zimbra Plesk 12 GoDaddy cPanel UNIX-based servers Apache/Nginx (OpenSSL) Mac OS Microsoft Servers IIS8 IIS7 IIS5&6 Exchange 2013 Exchange 2013 Shell Exchange 2007 JAVA servers Tomcat Node.js GlassFish Other servers AWS ..
You should enter the exact domain name or subdomain you wish to secure in the Common Name (CN) field. For example: if you intend to secure the URL https://www.yourdomain.com, then your CSR’s Common Name must be www.yourdomain.com. Please do not include http:// or https:// in your CSR’s Common Name. Will the certificate work for domain.com ..
Usually a dedicated IP address is a technical requirement for the SSL installation. For proper SSL functionality it is recommended to have a separate dedicated IP for each certificate. However, nowadays it is possible to install multiple SSL certificates using a shared IP address thanks to the SNI (Server Name Indication) technology. A mandatory use ..
There is a multitude of server and device types out there. Ones that allow an SSL to be installed and configured require the digital certificate file to be encoded and formatted in a certain way. All you need to know is that there are several file extension types and encoding formats. Plus, in order to ..