Archives: FAQs
SSL.com can issue Domain Validated (DV) and Organization Validated (OV) digital certificates to public IPv6 addresses. Internet Protocol version 6 (IPv6) has similar functions to
Read More »
eSigner FAQ
Frequently asked questions about SSL.com’s eSigner cloud document and code signing service.
Read More »
How Do I Revalidate an Expired Domain?
How to revalidate an expired domain name, so you can continue ordering certificates for it from SSL.com.
Read More »
FAQ: Extended Validation (EV) Process
Frequently asked questions about the process of validating and issuing Extended Validation (EV) certificates from SSL.com
Read More »
What if my EV Code Signing token is blank?
Steps you should take to install your certificate if you received a blank EV Code Signing token.
Read More »
Underscores Not Allowed in Domain Names
Following CA/B Forum Ballot SC12, publicly trusted CAs cannot issue SSL/TLS certificates for subdomains containing underscore (_) characters.
Read More »
Which ACME Challenge Type Should I Use? HTTP-01 or DNS-01?
Not sure if you should use the HTTP-01 or DNS-01 ACME challenge? This FAQ outlines the advantages and disadvantages of both DV methods.
Read More »
What Is the ACME Protocol?
Automated Certificate Management Environment (ACME) is a standard protocol for automated management of X.509 certificates.
Read More »
FAQ: Expired Document Signing Certificates
Frequently asked questions about expired document signing certificates.
Read More »
FAQ: Expired Code Signing Certificates
Frequently asked questions about expired code signing certificates.
Read More »
FAQ: Expired S/MIME Certificates
Frequently asked questions about how expired S/MIME certificates affect signed and encrypted email.
Read More »
FAQ: Network Attacks and Security Issues
FAQ on network attacks and securitity issues, especially as they pertain to SSL/TLS, PKI, and digital certificates.
Read More »
What is HTTPS?
HTTPS (Hypertext Transfer Protocol Secure) is a secure version of the HTTP protocol that uses the SSL/TLS protocol to encrypt data sent between a web browser and a website.
Read More »
FAQ: Digital Certificate Revocation
FAQ covering common methods for communicating information about digital certificate revocation: CRL, OCSP, OCSP Stapling and Must-Staple, and CRLite.
Read More »
FAQ: Compromised Private Keys
Think your key might be compromised? This might be an emergency, but it might just be a chance to re-key your certificate. Find out how to move forward here.
Read More »
What is a Digital Certificate?
A digital certificate is a type of file used to associate cryptographic key pairs with identities such as websites, individuals, or organizations.
Read More »
FAQ: Getting Started With Your EV Code Signing Certificate
This FAQ answers common questions about getting started signing files with your SSL.com EV Code Signing certificate and YubiKey FIPS token.
Read More »
FAQ: Kernel-Mode Code Signing Certificates
This FAQ answers common questions developers may have about getting started with kernel-mode code signing in Windows.
Read More »
What is the “unique value” used in domain validation (DV)?
The “unique value” used in domain validation (DV) is a random or user-supplied value used to ensure the uniqueness of the DV request.
Read More »
FAQ: Getting Started With Your Business Identity Certificate
This FAQ answers common questions about getting started signing documents and email with SSL.com’s Business Identity Certificate and YubiKey FIPS token.
Read More »
What is a Wildcard SSL Certificate?
A Wildcard SSL/TLS certificate from SSL.com offers convenience, affordability, and saves time when protecting multiple subdomains.
Read More »
What is a chain of trust?
A chain of trust is a linked validation path from a root CA that serves as a trust anchor to an end-entity certificate, via any intermediate certificates.
Read More »
What Is the Difference Between Electronic and Digital Signatures?
Certificate-based digital signatures offer guarantees of authenticity, integrity, and non-repudiation that are not offered by simple electronic signatures.
Read More »
What is Public-Key Cryptography?
Public-key cryptography, also known as asymmetric cryptography, is a system that uses pairs of public and private keys for encryption and authentication.
Read More »
Can I order an SSL/TLS certificate for an IP address?
You can protect an IP address with an SSL/TLS certificate, but only under certain circumstances.
Read More »