Certificate Lifecycle Management
Understanding SAN in X.509 SSL Certificates

Certificate Lifecycle Management
The Subject Alternative Name (SAN) is an important extension to the X.509 certificate standard, defined in RFC 5280. It allows SSL/TLS certificates to include multiple identities beyond just the Common Name (CN) field. These identities can include domain names, subdomains, IP addresses, email addresses, and more—enabling secure communication across a wide variety of endpoints.
By using the SAN extension, organizations can significantly enhance the flexibility, scalability, and security of their SSL certificates. Instead of managing separate certificates for each domain or service, one SAN-enabled certificate can secure all required identities under a single certificate, simplifying certificate management and reducing operational overhead.
In earlier SSL certificates, the domain name secured by the certificate was identified mainly through the Common Name (CN) field.
Example:
If the CN was:
CN = www.example.com
The certificate would only be valid for:
If a user visited:
They would receive a security warning because the certificate does not align with the requested domain. Modern browsers no longer rely on the CN field for domain validation—they validate only against entries in the Subject Alternative Name (SAN) field for better security and consistency, as per current industry standards.
By using the Subject Alternative Name (SAN) extension, a single SSL/TLS certificate can secure multiple identities across different services. These identities can include:
Example:
A SAN-enabled certificate could have:
CN = www.example.com
SAN:
DNS.1 = www.example.com
DNS.2 = example.com
DNS.3 = blog.example.com
DNS.4 = www.example.net
IP.1 = 203.0.113.5
This certificate is valid for all the listed DNS and IP entries.
Benefits:
During the generation of a certificate signing request (CSR), the administrator specifies a list of SAN entries. These can be:
To include these SAN values, the administrator must define them in the subjectAltName field within the CSR configuration file (typically openssl.cnf or equivalent).
Once the CSR is created and submitted to a Certificate Authority (CA), the CA verifies the ownership or control of each SAN entry. After successful validation, the CA issues a certificate with the SAN entries encoded in the Subject Alternative Name extension.
When a client (like a browser or app) connects to a secure website via HTTPS:
As part of the handshake, the client performs hostname verification, where it checks whether the requested domain matches any of the entries in the SAN field. This verification step is critical to establishing trust—modern clients rely exclusively on the SAN extension for this check, ignoring the Common Name field.
Modern browsers rely on SAN list instead and ignore the common name. The client looks for a match between:
The connection proceeds securely only if an exact or valid wildcard match is found.
If no match is found, the browser displays a security warning, such as “Your connection is not private” or “Invalid certificate”.
Since the SAN list includes several identities, one certificate can be used across:
This makes the management easy and simple, as now there is no need to install and manage separate certificates for each domain.
SAN certificates are used across many industries and infrastructures, because of their multi-domain support. They help you to protect multiple domains, subdomains, and IP addresses using a single certificate, which makes it ideal for organisations which seek scalability as well as simplicity.
A company have the ownership of multiple websites or brand domains:
Buying and managing separate SSL certificates for each is not at all necessary, as a company can now use a single SAN certificate to protect all domains and subdomains.
Note: Each subdomain must be explicitly listed in the SAN field unless a wildcard entry (e.g., *.example.com) is included. Without a wildcard, subdomain matching is exact, and unlisted subdomains will not be covered by the certificate.
A web application operates across various subdomains:
All subdomains are added as SAN entries in one certificate.
Modern applications, those using micro-services or cloud platforms, operate across:
Example:
A SAN certificate can be used to protect all these services, even if they are geographically distributed or span multiple domains.
Consideration: While SAN certificates simplify management, tying too many services to a single certificate can create a single point of failure. If the certificate expires, is compromised, or needs to be reissued, all services relying on it are affected simultaneously. To mitigate this, organizations should carefully group services by risk and environment, and use separate SAN certificates when appropriate.
Developers want to use HTTPS on local or staging domains:
All environments are secured by using SAN certificates and there is no need for multiple certs.
For internal environments like .local domains (e.g., dev.example.local), it’s recommended to use an internal Certificate Authority (CA) or a self-signed SAN certificate. Public CAs no longer issue certificates for internal names due to security restrictions imposed by the CA/Browser Forum.
Microsoft Exchange and Skype for Business require SAN certificates, so that they function correctly with multiple internal and external services like:
To simplify deployment, Microsoft recommends certificates that support multiple SAN entries.
A Unified Communications Certificate (UCC) is often used in these scenarios. While UCC is commonly referred to as a special certificate, it’s essentially a marketing term for a multi-SAN certificate that’s optimized for Microsoft applications like Exchange, Skype for Business, and Office 365.
Choose a globally trusted CA that is:
Popular Trusted CAs:
Note: While Let’s Encrypt is widely trusted and ideal for short-term, automated deployments, it may not be suitable for longer certificate lifespans or complex enterprise needs that require extended validation (EV), organization validation (OV), or advanced support and reporting features.
Why it matters: With public trust users don’t see the warnings about “Untrusted Certificate”
SAN certificates pricing can fluctuate, depending on:
Caution: Be aware of potential vendor lock-in and unexpected renewal costs. Some CAs offer low initial prices but charge significantly higher fees during renewal or when adding new SAN entries. Always review the full pricing model and renewal terms before committing.
Why it matters: Scalability can be affected by pricing, especially if many domains are managed simultaneously.
CAs offer three types of validation:
Validation Type | Verification Level | Trust Indicators | Best For |
---|---|---|---|
DV (Domain Validation) | Verifies domain ownership only | Padlock in browser | Internal sites, personal blogs, low-risk applications |
OV (Organization Validation) | Verifies domain + organization identity | Padlock + organization details in certificate info | Business websites, APIs, public-facing apps |
EV (Extended Validation) | Extensive vetting of business + legal existence | Padlock + organization name in browser address bar (in some browsers) | Financial services, eCommerce, regulated industries |
For handling sensitive data, running public services, or aiming for high trust, you should choose OV or EV.
Look for CAs offering:
Why it matters: Efficient and simplified management reduces overhead and helps in cert expiration issue.
Consider:
Note: Not all Certificate Authorities (CAs) support combining wildcard domains and SAN entries in the same certificate. Some impose restrictions or may require a different product tier. Be sure to verify this capability if your use case includes both.
Why it matters: Some CAs may need special configurations or offer limited support for internal names, IP addresses, or complex wildcard/SAN setups—understanding these limits helps avoid deployment issues.
When evaluating a Certificate Authority (CA), prioritize those that offer:
Time-to-issue matters: Some CAs can issue Domain Validation (DV) certs within minutes, while OV/EV may take hours or days depending on verification processes.
Reissuance downtime should also be considered—delays in replacing expired or compromised certificates can lead to service disruptions or security warnings for users.
Why it matters: Timely support is essential when facing outages or renewals.
Managing SAN certificates for multiple domains, subdomains, and IPs can quickly become a challenge—especially at scale. That’s where Encryption Consulting’s CertSecure Manager steps in.
Our Certificate Lifecycle Management (CLM) solution automates and streamlines the entire process—from discovery and issuance to renewal and revocation. Whether you’re securing internal services, cloud workloads, or complex multi-domain environments, CertSecure Manager offers:
Integrations supported: CertSecure Manager seamlessly integrates with major CA platforms like DigiCert, Sectigo, and others via their APIs. It also supports ACME protocol-based clients (e.g., Let’s Encrypt) and can connect with infrastructure tools such as Microsoft CA, AWS, Azure Key Vault.
With CertSecure Manager, organizations can confidently manage SAN SSL certificates with efficiency, visibility, and control—all from a single platform.
Subject Alternative Name (SAN) certificates offer a smart, scalable solution for securing multiple domains, subdomains, and services with a single certificate. Whether you’re managing a complex infrastructure or just looking to simplify SSL management, SAN certificates provide flexibility, cost-efficiency, and strong security—making them essential for modern digital environments.