{"id":151,"date":"2019-07-09T07:35:29","date_gmt":"2019-07-09T07:35:29","guid":{"rendered":"https:\/\/www.ssls.com\/knowledgebase\/?p=151"},"modified":"2023-11-02T13:57:25","modified_gmt":"2023-11-02T13:57:25","slug":"what-is-certificate-transparency","status":"publish","type":"post","link":"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/","title":{"rendered":"What is Certificate Transparency"},"content":{"rendered":"<p><a href=\"#implmnt\">How Is Certificate Transparency Implemented?<\/a><br \/>\n<a href=\"#advntg\">Advantages of Certificate Transparency (CT)<\/a><br \/>\n<a href=\"#check\">How to Check for Certificate Transparency (CT) Compliance?<\/a><\/p>\n<p><span style=\"font-weight: 400;\">Certificate Transparency is a relatively new framework that\u2019s designed to fix some structural flaws within the existing system of SSL certificates, in return making it more open to the public. It was first announced by Google Inc. in the beginning of 2010 and is now gaining some momentum in terms of Internet implementation. Let us dive into some of the most important details regarding this subject.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Originally defined by Netscape and other companies in nineties, the process implies that Certificate Authorities (also known as CAs) should present the certificate requester with the certificate, prior to its issuance. This way, it can reviewed and approved. Once the certificate is issued, it must be published in an independent database in order to prove that the person in charge of the certificate request is aware of the fact that it was issued.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The database (or repository) allows anyone to check the public key along with the other fields that are included within the certificate. This checking can be performed without connecting to and establishing a secure server connection where the certificate in question is installed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, it\u2019s possible to gain access to the public key in an alternative way besides secure-session negotiation. Certificate Transparency, in effect, makes the whole system more open and provides any concerned parties with a reliable way to monitor and audit issued certificates.<\/span><\/p>\n<p>At some point in the future, all CAs should comply with CT by automatically publishing the issued certificates. This is due in part to Google\u2019s strong positioning with their Chrome browser. Future versions of the Chrome browser may even show warning indicators for sites with certificates that are not present in CT Log Servers.<\/p>\n<h4 id=\"implmnt\"><em><strong>How Is Certificate Transparency Implemented?<\/strong><\/em><\/h4>\n<p><span style=\"font-weight: 400;\">In short, Certificate Transparency (CT) is achieved via the posting of any issued certificates to publicly-available Qualified CT logs. The main participants in the process are:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Certificate Authorities<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Publicly-Available Repositories (with certificates and Log Servers)<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Auditors (usually, client browsers that accept the certificate)<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Publicly-Available Monitors (monitoring of new certificates that were added to the aforementioned Log Servers and the detection of certificates that were wrongly issued)<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">A CA creates a \u2018pre-version\u2019 of the certificate with all necessary information that will be reflected in the future, after its issuance. This version then gets sent to a trusted Log Server to accept this information and subsequently sends back a <strong>\u2018Signed Certificate Timestamp\u2019 (SCT)<\/strong>. This timestamp guarantees that the certificate will be added to the Log Server within a certain time period. This time period is also referred to as <strong>Maximum Merge Delay (MMD)<\/strong>. It should be noted, however, that MMD does not defer issuance of the actual certificate; it exists only to provide Log Server operators with some flexibility (in case of technical outages, for example) in conforming to the rules set forth for any entity willing to provide a publicly-accessible CT Log server. According to the rules, a maximum MMD timeframe is set to last 24 hours, meaning that any new certificate will be present in CT Log Servers within 24 hours since the time when SCT was generated. The timestamp accompanies the certificate during its life cycle directly to expiration (revocation). Also, any reissued certificate will get a new SCT.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once a CA receives the SCT from the Log Server, it incorporates the SCT into the body of the certificate or presents it via these <a href=\"https:\/\/tools.ietf.org\/html\/rfc6962#section-3\">alternative ways<\/a>. The timestamp that is present on a certificate signifies that it has already been published in CT Log Servers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In general, there are 3 methods in which SCT for a certificate can be delivered:<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"><strong>The x509v3 extension method. <\/strong>Here, no further actions are required by server operators.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"><strong>The TLS extension method.<\/strong> Here, the SCT is delivered during the TLS handshake using the signed_certificate_timestamp type.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"><strong>The OCSP stapling method.<\/strong> Here, SCT information gets delivered to clients by the server operator, along with the appropriate Online Certificate Status Protocol (OCSP) response.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/CT_1.jpg\" width=\"438\" height=\"463\"><\/span><\/p>\n<p><span style=\"font-weight: 400;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><span style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/CT_2.png\" width=\"549\" height=\"417\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A more detailed explanation behind these three methods can be found <a href=\"http:\/\/www.certificate-transparency.org\/how-ct-works\">here<\/a>. The general takeaway is that a SCT must be presented, along with the SSL certificate, during a secure- session negotiation.<\/span><\/p>\n<h4 id=\"advntg\"><em><strong>Advantages of Certificate Transparency (CT)<\/strong><\/em><\/h4>\n<p><span style=\"font-weight: 400;\">This proposed system offers many benefits to the existing SSL certificate system. Although they are primarily focused on Certificate Authorities (CAs) and domain operators, individual users may also benefit as a result.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Below is a short list of advantages that CT provides:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">A more open system, which provides any concerned parties with a more reliable way to monitor certificates for required domain names.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Easier to spot certificates that should not have been issued, given there is a publicly logged record.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">No additional steps required by end users for the initial SSL set up.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">No effect to latency when establishing a secure connection.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Please note, however, that some minor changes to the infrastructure are required from server administrators in case of OCSP stapling\/TLS extension ways of SCT delivery. Also, any CA who wants to incorporate SCT in their certificates via the <strong>x509v3 extension<\/strong> must first make changes to their infrastructure when submitting \u2018pre-certificates\u2019 to the Log Servers for issuance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At some point in the future, all CAs should comply with CT by automatically publishing the issued certificates. This is due in part to Google\u2019s strong positioning with their Chrome browser. Future versions of the Chrome browser may even show warning indicators for sites with certificates that are not present in CT Log Servers.<br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our SSL vendor, Comodo CA (<a href=\"https:\/\/www.ssls.com\/knowledgebase\/comodo-ca-rebrands-as-sectigo\">now Sectigo CA<\/a>), supports CT for all their newly-issued certificates, including domain validated ones (DV certificates). Therefore, all of our certificates are present in the CT Log Servers and will not result in any warnings in Google Chrome.<\/span><\/p>\n<h4 id=\"check\"><em><strong>How to Check for Certificate Transparency (CT) Compliance?<\/strong><\/em><\/h4>\n<p><span style=\"font-weight: 400;\">It\u2019s possible to check for the SCT directly in Google Chrome. To do so, please follow the listed steps:<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\">To inspect the CT status of the certificate, open Google Chrome&#8217;s developer tools (located under &#8220;More tools&#8221; in the Chrome navigation menu).<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Toggle to the \u2018Security\u2019 tab.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Now enter the website with the certificate in question. (You should then see the detailed security information about this site.)<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Locate a section called &#8220;Certificate Transparency&#8221; near the bottom of the page. It will list all available SCT for that particular website in question. An empty section will mean that the website does not provide any SCTs (and it does not comply to CT).<br \/>\n<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/CT_3.png\" width=\"690\" height=\"423\"><\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can check any certificate present in the Log Servers by using <a href=\"https:\/\/transparencyreport.google.com\/https\/certificates?hl=en\">Google\u2019s web service<\/a>. In addition, you can also use a variety of web services from reliable third-parties and CAs from across the Internet (e.g. the Comodo (<a href=\"https:\/\/www.ssls.com\/knowledgebase\/comodo-ca-rebrands-as-sectigo\">now Sectigo<\/a>) CT <a href=\"https:\/\/crt.sh\/?af=7639\">checker<\/a>). Also, there are paid services that provide automated monitoring of all certificates for a particular domain name(s). The CT framework provides technical possibilities for these new services to emerge.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given this framework\u2019s complexity, feel free to visit the Certificate Transparency (CT) official FAQ <a href=\"http:\/\/www.certificate-transparency.org\/faq\">here<\/a> to deepen your knowledge of the subject.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As always, if you have any lingering questions, please contact our 24\/7 Customer Support Team <strong><a href=\"https:\/\/support.ssls.com\/index.php?\/cheapssl\/Tickets\/Submit\">via ticket<\/a><\/strong> or start a <strong>Live Chat<\/strong> by clicking on the blue bubble icon at the lower right corner of the page<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How Is Certificate Transparency Implemented? Advantages of Certificate Transparency (CT) How to Check for Certificate Transparency (CT) Compliance? Certificate Transparency is a relatively new framework that\u2019s designed to fix some structural flaws within the existing system of SSL certificates, in return making it more open to the public. It was first announced by Google Inc. ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/\" title=\"read more...\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-151","post","type-post","status-publish","format-standard","hentry","category-general-questions"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Certificate Transparency \u2013 HelpDesk | SSLs.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Certificate Transparency \u2013 HelpDesk | SSLs.com\" \/>\n<meta property=\"og:description\" content=\"How Is Certificate Transparency Implemented? Advantages of Certificate Transparency (CT) How to Check for Certificate Transparency (CT) Compliance? Certificate Transparency is a relatively new framework that\u2019s designed to fix some structural flaws within the existing system of SSL certificates, in return making it more open to the public. It was first announced by Google Inc. ..Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/\" \/>\n<meta property=\"og:site_name\" content=\"SSL Certificate Knowledgebase | SSLs.com\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SSLsCom\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-09T07:35:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-02T13:57:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/CT_1.jpg\" \/>\n<meta name=\"author\" content=\"sslbizdev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SSLscom\" \/>\n<meta name=\"twitter:site\" content=\"@SSLscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sslbizdev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/\"},\"author\":{\"name\":\"sslbizdev\",\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/#\/schema\/person\/7e29a188929740c7a59d9a1c15c18806\"},\"headline\":\"What is Certificate Transparency\",\"datePublished\":\"2019-07-09T07:35:29+00:00\",\"dateModified\":\"2023-11-02T13:57:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/\"},\"wordCount\":1251,\"publisher\":{\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/CT_1.jpg\",\"articleSection\":[\"General Questions\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/\",\"url\":\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/\",\"name\":\"What is Certificate Transparency \u2013 HelpDesk | SSLs.com\",\"isPartOf\":{\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/CT_1.jpg\",\"datePublished\":\"2019-07-09T07:35:29+00:00\",\"dateModified\":\"2023-11-02T13:57:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/#primaryimage\",\"url\":\"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/CT_1.jpg\",\"contentUrl\":\"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/CT_1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ssls.com\/knowledgebase\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Certificate Transparency\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/#website\",\"url\":\"https:\/\/www.ssls.com\/knowledgebase\/\",\"name\":\"SSL Certificate Knowledgebase | SSLs.com\",\"description\":\"SSL Knowledgebase | SSLs.com\",\"publisher\":{\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ssls.com\/knowledgebase\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/#organization\",\"name\":\"SSLs.com\",\"url\":\"https:\/\/www.ssls.com\/knowledgebase\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/8WCg7Uph_400x400-1.png\",\"contentUrl\":\"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/8WCg7Uph_400x400-1.png\",\"width\":400,\"height\":400,\"caption\":\"SSLs.com\"},\"image\":{\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SSLsCom\",\"https:\/\/x.com\/SSLscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ssls.com\/knowledgebase\/#\/schema\/person\/7e29a188929740c7a59d9a1c15c18806\",\"name\":\"sslbizdev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/b43c2e48b8cf4c353e91aa8232dac0c56e490f3f1eff58a7652c7d9a866e3f66?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b43c2e48b8cf4c353e91aa8232dac0c56e490f3f1eff58a7652c7d9a866e3f66?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b43c2e48b8cf4c353e91aa8232dac0c56e490f3f1eff58a7652c7d9a866e3f66?s=96&d=mm&r=g\",\"caption\":\"sslbizdev\"},\"url\":\"https:\/\/www.ssls.com\/knowledgebase\/author\/sslbizdev\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Certificate Transparency \u2013 HelpDesk | SSLs.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/","og_locale":"en_US","og_type":"article","og_title":"What is Certificate Transparency \u2013 HelpDesk | SSLs.com","og_description":"How Is Certificate Transparency Implemented? Advantages of Certificate Transparency (CT) How to Check for Certificate Transparency (CT) Compliance? Certificate Transparency is a relatively new framework that\u2019s designed to fix some structural flaws within the existing system of SSL certificates, in return making it more open to the public. It was first announced by Google Inc. ..Read more","og_url":"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/","og_site_name":"SSL Certificate Knowledgebase | SSLs.com","article_publisher":"https:\/\/www.facebook.com\/SSLsCom","article_published_time":"2019-07-09T07:35:29+00:00","article_modified_time":"2023-11-02T13:57:25+00:00","og_image":[{"url":"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/CT_1.jpg","type":"","width":"","height":""}],"author":"sslbizdev","twitter_card":"summary_large_image","twitter_creator":"@SSLscom","twitter_site":"@SSLscom","twitter_misc":{"Written by":"sslbizdev","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/#article","isPartOf":{"@id":"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/"},"author":{"name":"sslbizdev","@id":"https:\/\/www.ssls.com\/knowledgebase\/#\/schema\/person\/7e29a188929740c7a59d9a1c15c18806"},"headline":"What is Certificate Transparency","datePublished":"2019-07-09T07:35:29+00:00","dateModified":"2023-11-02T13:57:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/"},"wordCount":1251,"publisher":{"@id":"https:\/\/www.ssls.com\/knowledgebase\/#organization"},"image":{"@id":"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/CT_1.jpg","articleSection":["General Questions"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/","url":"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/","name":"What is Certificate Transparency \u2013 HelpDesk | SSLs.com","isPartOf":{"@id":"https:\/\/www.ssls.com\/knowledgebase\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/#primaryimage"},"image":{"@id":"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/CT_1.jpg","datePublished":"2019-07-09T07:35:29+00:00","dateModified":"2023-11-02T13:57:25+00:00","breadcrumb":{"@id":"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/#primaryimage","url":"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/CT_1.jpg","contentUrl":"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/CT_1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ssls.com\/knowledgebase\/what-is-certificate-transparency\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ssls.com\/knowledgebase\/"},{"@type":"ListItem","position":2,"name":"What is Certificate Transparency"}]},{"@type":"WebSite","@id":"https:\/\/www.ssls.com\/knowledgebase\/#website","url":"https:\/\/www.ssls.com\/knowledgebase\/","name":"SSL Certificate Knowledgebase | SSLs.com","description":"SSL Knowledgebase | SSLs.com","publisher":{"@id":"https:\/\/www.ssls.com\/knowledgebase\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ssls.com\/knowledgebase\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ssls.com\/knowledgebase\/#organization","name":"SSLs.com","url":"https:\/\/www.ssls.com\/knowledgebase\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ssls.com\/knowledgebase\/#\/schema\/logo\/image\/","url":"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/8WCg7Uph_400x400-1.png","contentUrl":"https:\/\/www.ssls.com\/knowledgebase\/wp-content\/uploads\/2019\/07\/8WCg7Uph_400x400-1.png","width":400,"height":400,"caption":"SSLs.com"},"image":{"@id":"https:\/\/www.ssls.com\/knowledgebase\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SSLsCom","https:\/\/x.com\/SSLscom"]},{"@type":"Person","@id":"https:\/\/www.ssls.com\/knowledgebase\/#\/schema\/person\/7e29a188929740c7a59d9a1c15c18806","name":"sslbizdev","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b43c2e48b8cf4c353e91aa8232dac0c56e490f3f1eff58a7652c7d9a866e3f66?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b43c2e48b8cf4c353e91aa8232dac0c56e490f3f1eff58a7652c7d9a866e3f66?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b43c2e48b8cf4c353e91aa8232dac0c56e490f3f1eff58a7652c7d9a866e3f66?s=96&d=mm&r=g","caption":"sslbizdev"},"url":"https:\/\/www.ssls.com\/knowledgebase\/author\/sslbizdev\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-28 09:32:01","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.ssls.com\/knowledgebase\/wp-json\/wp\/v2\/posts\/151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ssls.com\/knowledgebase\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ssls.com\/knowledgebase\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ssls.com\/knowledgebase\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ssls.com\/knowledgebase\/wp-json\/wp\/v2\/comments?post=151"}],"version-history":[{"count":8,"href":"https:\/\/www.ssls.com\/knowledgebase\/wp-json\/wp\/v2\/posts\/151\/revisions"}],"predecessor-version":[{"id":7291,"href":"https:\/\/www.ssls.com\/knowledgebase\/wp-json\/wp\/v2\/posts\/151\/revisions\/7291"}],"wp:attachment":[{"href":"https:\/\/www.ssls.com\/knowledgebase\/wp-json\/wp\/v2\/media?parent=151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ssls.com\/knowledgebase\/wp-json\/wp\/v2\/categories?post=151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ssls.com\/knowledgebase\/wp-json\/wp\/v2\/tags?post=151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}