Certificates, Education Center
What is an SSL certificate and Why is it important?

Certificates, Education Center
SSL stands for Secure Sockets Layer; it is the standard technology for keeping an Internet connection secure and safeguarding any sensitive data sent between two systems. The two systems can be server to client (for example, a shopping website and browser) or server to server (for example, an application with personal identifiable information or payroll information).
Table of Contents
TLS stands for Transport Layer Security, which is just an updated, and more secure, version of SSL. TLS is a cryptographic protocol that establishes an encrypted session between applications over the Internet.
TLS certificates usually contain the following information:
TLS uses a combination of symmetric and asymmetric cryptography, as this provides a good negotiation between performance and security when transmitting data securely.
Lean more about TLS handshake:
Certificate Management | Usage | Security | Encryption Glossary (encryptionconsulting.com)
The communication over SSL always begins with the SSL handshake. The SSL handshake allows the browser to verify the web server, get the public key, and establish a secure connection before the beginning of the actual data transfer.
The following steps are involved in the standard SSL handshake:
Client Hello
Server communicates with the client using SSL.This includes the SSL version number, cipher settings, and session-specific data.
Server Hello
The server responds with a “server hello” message.This includes the server’s SSL version number, cipher settings, session-specific data, an SSL certificate with a public key, and other information that the client needs to communicate with the server over SSL.
Authentication
The client verifies the server’s SSL certificate from the CA (Certificate Authority) and authenticates the server.If the authentication fails, then the client refuses the SSL connection and throws an exception. If the authentication succeeds, then they proceed to the next step.
Decryption
The client creates a session key, encrypts it with the server’s public key and sends it to the server.If the server has requested client authentication (mostly in server to server communication), then the client sends their own certificate to the server.
Encryption with Session Key
The server decrypts the session key with its private key and sends the acknowledgement to the client encrypted with the session key.
Thus, at the end of the SSL handshake, both the client and the server have a valid session key which they will use to encrypt or decrypt the original data.
There are multiple types of SSL certificates available today based on the validation level and number of domains they secure.SSL Certificates based on Validation Level:
Domain Validated certificate
The Domain Validated (DV) certificate requires the lowest level of validation because, the main purpose of DV certificates is to secure communication between the domain’s web server and browser. The CA only verifies that the owner has a control over the domain.
Organization Validated Certificates
The Organization Validated (OV) certificate requires a medium level validation where the CA checks the rights of an organization to use the domain and the organization’s information. The OV certificate enhances the trust level of the organization and its domain.
Extended Validated Certificates
The Extended Validated (EV) certificate requires a high-level validation where the CA conducts rigorous background checks on the organization according to guidelines. This includes verification of the legal, physical, and operational existence of the entity.
SSL Certificates based on the Number of Domains:
Single Domain Certificate
Single Domain Certificates secure one fully qualified domain name or subdomain name.
Wildcard SSL Certificate
Wildcard certificates cover one domain name and an unlimited number of its subdomains
Multi-Domain SSL Certificate
The Multi-Domain SSL certificate secures multiple domains using the same certificate with the help of the SAN extension. It is especially designed to secure Microsoft Exchange and Office Communication environments.
There are a few visual clues mentioned below to indicate a website has an SSL certificate:
SSL uses symmetric encryption to encrypt data between the browser and web server while asymmetric encryption is used to exchange generated symmetric keys which validate the identity of the client and server.
The Difference between SSL and TLS certificates are minor, the notable differences include:
For Comparison | SSL | TLS |
---|---|---|
Abbreviation | SSL stands for “Secure Socket Layer.” | TLS stands for “Transport Layer Security.” |
Cipher suites | SSL protocol offers support for Fortezza cipher suite | Cipher suites SSL protocol offers support for Fortezza cipher suite The TLS standardization process makes it much easier to define new cipher suites, such as RC4, Triple DES, AES, IDEA, etc. |
Version | Three versions of SSL have been released: SSL 1.0, 2.0, and 3.0 | Four versions of TLS have been released: TLS 1.0, 1.1, 1.2, and 1.3 |
Version Status | All versions of SSL have been found vulnerable, and they all have been deprecated | TLS 1.0 and 1.1 have been “broken” and are deprecated as of March 2020. TLS 1.2 is the most widely deployed protocol version |
Secure Communication | SSL is a cryptographic protocol that uses explicit connections to establish secure communication between the web server and client | TLS is also a cryptographic protocol that provides secure communication between the web server and client via implicit connections. It is the successor to the SSL protocol. |
Master Secret | SSL creates a master secret, the message digest of the pre-master secret is used | TLS uses a pseudorandom function to generate the master secret |
Any site visitor can follow the below step to get certificate information in Chrome:
Any site visitor can follow the below step to get certificate information in Firefox:
For more details about the certificate, just click “View Certificate”.
There are two methods to locate the installed SSL certificates on a website you own. In Windows Server environment, the installed certificates are stored in Certificate Stores, there are containers which holds one or more certificates. These containers are:
You can check the certificate stores manually on your local machine:
Run > type mcc > EnterOrOpen command prompt > type mcc > Enter
This is another method to view the installed certificates by launching windows Certificate Manager Tool.
Along with checking your own certificate, it is important to be able to determine, if the site you are visiting uses SSL certificates. Below are a few points which you should keep in mind to check if the site uses certificates:
SSL Certificates validity period is generally set to expire anywhere between one to three years. The validity period of the certificate completely depends on the company policy, cost considerations etc.There are multiple tools available to check the SSL certificates validity, in this article we will see how you can check the certificate validity by yourself.
Option 1: This process is time-consuming
Run > certlm.msc > open Certificates Local Computer
Go through the list of the certificates listed in the store to make sure only the legitimated ones are installed.
Option 2: Download the Windows sysinternals utility
Use Windows Sysinternals utility called sigcheck > Download
Once it is downloaded and installed > run command sigcheck -tv
Sigcheck downloads the trusted Microsoft root certificate list and provide outputs for only valid certificates.
Install an SSL certificate on Linux (Apache) servers:
4.1. [It is important to keep the files secure by restricting permission. Using ‘chmod 0400’, you will securely restrict permission to the key]
Following are the steps to install an SSL certificate on Windows Server 2016:
9.1.1 On the website Home page > Actions menu > Edit Site.. click bindings link
Type: In the drop-down list > Select https
IP address: Select the IP address of the site or select All Unassigned.
Port: Type port 443. The port over which traffic is secure by SSL is port 443.
SSL certificate: In the drop-down list, select your new SSL certificate (e.g. mydomain.com).
Renewing a certificate is, technically, purchasing a new certificate for
the domain and company. As per the industry standards, certificates comes with
an expiration date. When the certificate expires, it is no longer valid. So,
when you “renew” a certificate, the certificate authority must issue a new one
to replace the expiring one, and the new certificate must be installed on the
server.
There are two procedures to renew the certificate:
Renew a self-signed certificate
Renew a certificate from a CA
In this example we will show you how to renew the Root certificate from your CA.
A website needs an SSL/TLS certificate to keep user data secure, verify ownership of the website, prevent attackers from creating a fake version of the site, and gain user trust. SSL/TLS certificates verify that a client is talking to the correct server that owns the domain. This helps prevent domain spoofing and other kinds of attacks.
Encryption Consulting provides a specialized Certificate Lifecycle management solution CertSecure Manager. From discovery and inventory to issuance, deployment, renewal, revocation, and reporting. CertSecure provides an all-encompassing solution. Intelligent report generation, alerting, automation, automatic deployment onto servers, and certificate enrollment add layers of sophistication, making it a versatile and intelligent asset.