Quick Answer
A Common Name (CN) is a field within a digital certificate that identifies the specific domain name or entity the certificate is issued to. For SSL/TLS certificates, it typically matches the website’s domain name (e.g., www.example.com).
Understanding Common Name
The Common Name is a crucial component of X.509 digital certificates that serves as the primary identifier for the certificate holder. Its purpose and usage vary depending on the certificate type. For SSL/TLS certificates, it must exactly match the website’s domain name. In client certificates, it contains the individual’s name, while code signing certificates display the organization or developer name.
Modern Usage and SAN
While Common Name was historically the primary identifier, modern certificates now rely more heavily on the Subject Alternative Name (SAN) field. This evolution addresses previous limitations and provides better security and flexibility.
Historical Context
Common Name originally served as the only field browsers checked for domain validation. This created limitations, as certificates could only secure a single domain and couldn’t effectively handle multiple subdomains. The process was manual and often prone to errors, particularly when dealing with complex domain structures.
Current Standards
Modern certificate usage has evolved significantly. Browsers now primarily validate against SAN entries, allowing multiple domains to be secured under a single certificate. Common Name remains present but is gradually being deprecated in favor of SAN. This shift enables more flexible certificate management and better security practices.
Common Name Requirements
Website Certificates
Your Common Name must follow strict formatting rules. It must exactly match the domain name and maintain case-insensitive matching. Protocol prefixes such as http:// or https:// are not allowed, and IP addresses should not be used in the Common Name field. The name must use standard ASCII characters to ensure compatibility across all systems.
Examples of correct and incorrect formats:
- Correct: www.example.com
- Incorrect: https://www.example.com
- Incorrect: Example Website
- Personal/Client Certificates
For individual certificates, the Common Name should contain the person’s name in a standardized format. Acceptable formats include “FirstName LastName” or “LastName, FirstName.” The name should be consistent with official documentation and avoid special characters or numbers.
Best Practices
Domain Configuration
When configuring your certificate’s Common Name, always use the fully qualified domain name (FQDN) and ensure exact character-for-character matching. While most systems are case-insensitive, maintaining consistent capitalization is recommended for clarity and troubleshooting purposes.
Wildcard Certificates
Wildcard certificates use the format *.example.com in their Common Name field. This format allows the certificate to secure single-level subdomains under the main domain. However, it’s important to understand that wildcard certificates won’t secure multiple subdomain levels, such as sub.sub.example.com.
Common Issues and Solutions
Certificate Name Mismatch
When browsers display certificate errors, the issue often stems from a mismatched Common Name. Check that your domain name exactly matches the Common Name on the certificate. Verify that the certificate is installed on the correct domain and look for any typing errors or extra characters that might cause validation failures.
Multiple Domain Requirements
For websites requiring multiple domain security, using a SAN certificate is the recommended approach. Rather than relying solely on the Common Name, list all required domains in the SAN field. If your needs include multiple subdomains, consider whether a wildcard certificate might be appropriate for your use case.
Security Considerations
Certificate Validation
Certificate validation is a comprehensive process that includes checking both the Common Name and SAN fields. Any mismatch between these fields and the actual domain will trigger security warnings in browsers. Regular certificate audits and proper domain validation form the foundation of a robust security strategy.
Monitoring and Maintenance
Effective certificate management requires ongoing monitoring and maintenance. Establish regular certificate audits, implement expiration monitoring, and maintain thorough documentation of your certificate inventory. These practices help prevent unexpected certificate failures and security issues.
Future Trends
The industry is moving decisively toward complete Common Name deprecation, with SAN becoming the universal standard. Organizations should prepare for this transition by implementing automated certificate management systems, following enhanced validation requirements, and maintaining strong encryption standards throughout their infrastructure.
Implementation Checklist
Before deploying your certificate:
- Verify domain requirements
- Choose appropriate certificate type
- Validate Common Name format
- Include domain in SAN field
- Test certificate before deployment
- Conclusion
Understanding Common Name remains important for certificate management, even as the industry transitions to SAN-based validation. Focus on proper implementation and stay current with evolving security standards to maintain secure and compliant certificate deployments. Regular monitoring, proper documentation, and adherence to best practices will ensure successful certificate management in your organization.