What is a Private Key? A private key is a piece of code created alongside your Certificate Signing Request (CSR). These are generated on your server or other generation tool. After that, CSR is then used to create your SSL Certificate, otherwise known as the public key. These keys work together to encrypt and decrypt […]
Month: June 2019
IP addresses – what are they and what do they do?
What is an IP address? Internet Protocol (IP) addresses function a lot like real-world home or return addresses on mail. A computer or laptop is assigned one by an Internet Service Provider (ISP) through the router. More specifically, each device accessing the internet through your router will be assigned its own local IP address. But, […]
Why haven’t I received my validation email?
What is a validation email? A validation email, referred to by Trustico as an approver email, is a form of Domain Control Validation (DCV) which proves ownership of a domain when applying for an SSL certificate. Where is it sent? As per CA/B Forum rulings that dictate the SSL certificate industry, the approver email can […]
How to correctly generate a CSR for SSL
An SSL certificate can only be generated with a CSR. It contains all the information required for the certificate, such as the domain name and country code. CSR stands for Certificate Signing Request. What is a CSR? A CSR is a block of encrypted text you send to the Certificate Authority (CA) to generate an […]
CAA records – what are they and why use them?
Using CAA records will ensure your domain/s aren’t issued any SSL certificate/s you didn’t apply for — whether malicious or accidental. What is CAA? CA stands for Certification Authority — an entity that issues SSL Certificates. CAA stands for Certification Authority Authorization — a mechanism where you choose which Certificate Authorities can issue your domain […]
WHOIS and SSL/TLS certificate validation
Domain Control Validation (DCV) must be completed before an SSL/TLS certificate can be issued. This proves to the issuing Certificate Authority (CA) that the individual applying for the SSL/TLS certificate has control over the domain they are securing. An email to a WHOIS registered email address is a common way of doing so. Approver email […]