SSL.com

What Is an X.509 Certificate?

X.509 is a standard format for public key certificates, digital documents that securely associate cryptographic key pairs with identities such as websites, individuals, or organizations.

First introduced in 1988 alongside the X.500 standards for electronic directory services, X.509 has been adapted for internet use by the IETF’s Public-Key Infrastructure (X.509) (PKIX) working group. RFC 5280 profiles the X.509 v3 certificate, the X.509 v2 certificate revocation list (CRL), and describes an algorithm for X.509 certificate path validation.

Recent updates to X.509 certificate handling include RFC 9618 (August 2024), which updates the certificate policy validation algorithm to address potential denial-of-service vulnerabilities and improve processing efficiency.

Common applications of X.509 certificates include:

Need a certificate? SSL.com has you covered. Compare options here to find the right choice for you, from S/MIME and code signing certificates and more.

ORDER NOW

Key Pairs and Signatures

No matter its intended application(s), each X.509 certificate includes a public key, digital signature, and information about both the identity associated with the certificate and its issuing certificate authority (CA):

Certificate Fields and Extensions

To review the contents of a typical X.509 certificate in the wild, we will examine www.ssl.com’s SSL/TLS certificate, as shown in Google Chrome. (You can check all of this in your own browser for any HTTPS website by clicking the lock on the left side of the address bar.)

Certificate Chains

For both administrative and security-related reasons, X.509 certificates are typically combined into chains for validation. As shown in the screenshot from Google Chrome below, the SSL/TLS certificate for www.ssl.com is signed by one of SSL.com’s intermediate certificates, SSL.com EV SSL Intermediate CA RSA R3. In turn, the intermediate certificate is signed by SSL.com’s EV RSA root:

For publicly trusted websites, the web server will provide its own end-entity certificate, plus any intermediates required for validation. The root CA certificate with its public key will be included in the end user’s operating system and/or browser application, resulting in a complete chain of trust.

Certificate Validity Periods

X.509 certificates include validity periods specified by “Not Valid Before” and “Not Valid After” dates. For security reasons, the validity periods of certificates have been significantly reduced over time.

Currently, publicly trusted TLS certificates have a maximum validity period of 398 days (approximately 13 months). However, the industry is moving toward even shorter validity periods to improve security. In April 2025, the CA/Browser Forum approved a schedule that will reduce the maximum validity period for TLS certificates to 47 days, effective March 15, 2029.

Shorter lifecycle certificates eliminate many security concerns associated with certificate compromise, as these swift validity periods minimize the window of potential misuse. Organizations using short-lived certificates may not need to implement traditional revocation checking, as certificates expire quickly enough to limit exposure from compromised keys.

Revocation

X.509 certificates that must be invalidated before their “Not Valid After” date may be revoked.

Certificate revocation mechanisms enable certificate authorities (CAs) to communicate when certificates should no longer be trusted, typically due to key compromise, CA compromise, or changes in the certificate’s status.

Certificate Revocation Lists (CRLs)

As mentioned above, RFC 5280 profiles certificate revocation lists (CRLs), which are time-stamped lists of revoked certificates published by CAs. CRLs have become the preferred method for certificate revocation in the modern web PKI.

In March 2024, the CA/Browser Forum updated the Baseline Requirements to make CRLs mandatory and the Online Certificate Status Protocol (OCSP) optional for publicly trusted certificate authorities. This change reflects the industry’s recognition that CRLs offer significant advantages over OCSP, particularly in terms of user privacy and operational efficiency.

Modern Revocation Checking

Current browsers and applications use various approaches for revocation checking:

For more information on the thorny history of revocation checking and how current browsers check the revocation status of certificates, please read our articles, Page Load Optimization: OCSP Stapling, and How Do Browsers Handle Revoked SSL/TLS Certificates?

X.509 Frequently Asked Questions

Q: What is an X.509 certificate?

A: X.509 is a standard format for public key certificates, digital documents that securely associate cryptographic key pairs with identities such as websites, individuals, or organizations. RFC 5280 profiles the X.509 v3 certificate, the X.509 v2 certificate revocation list (CRL), with recent updates in RFC 9618 addressing policy validation improvements.

Q: What are X.509 certificates used for?

A: Common applications of X.509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID. Modern X.509 certificates for web use typically have validity periods of up to 398 days, with the industry moving toward shorter periods (47 days maximum by March 2029) for enhanced security.

Thank you for choosing SSL.com! If you have any questions, please contact us by email at Support@SSL.com, call 1-877-SSL-SECURE, or just click the chat link at the bottom right of this page. You can also find answers to many common support questions in our knowledgebase.

Was this article helpful?

Yes
No
Thanks for your feedback!
Exit mobile version