Archives: FAQs
What is a Site Seal?
Discover SSL.com Smart Seal: A free, innovative site seal offering real-time reports and validated documents. Enhance your website’s security and build visitor trust today.
Read More »
eSigner FAQ
Frequently asked questions about SSL.com’s eSigner cloud document and code signing service.
Read More »
How Do I Revalidate an Expired Domain?
How to revalidate an expired domain name, so you can continue ordering certificates for it from SSL.com.
Read More »
FAQ: Extended Validation (EV) Process
Frequently asked questions about the process of validating and issuing Extended Validation (EV) certificates from SSL.com
Read More »
What if my EV Code Signing token is blank?
Steps you should take to install your certificate if you received a blank EV Code Signing token.
Read More »
Underscores Not Allowed in Domain Names
Following CA/B Forum Ballot SC12, publicly trusted CAs cannot issue SSL/TLS certificates for subdomains containing underscore (_) characters.
Read More »
Which ACME Challenge Type Should I Use? HTTP-01 or DNS-01?
Not sure if you should use the HTTP-01 or DNS-01 ACME challenge? This FAQ outlines the advantages and disadvantages of both DV methods.
Read More »
What Is the ACME Protocol?
Automated Certificate Management Environment (ACME) is a standard protocol for automated management of X.509 certificates.
Read More »
FAQ: Expired Document Signing Certificates
Frequently asked questions about expired document signing certificates.
Read More »
FAQ: Expired Code Signing Certificates
Frequently asked questions about expired code signing certificates.
Read More »
FAQ: Expired S/MIME Certificates
Frequently asked questions about how expired S/MIME certificates affect signed and encrypted email.
Read More »
FAQ: Network Attacks and Security Issues
FAQ on network attacks and securitity issues, especially as they pertain to SSL/TLS, PKI, and digital certificates.
Read More »
What is HTTPS?
HTTPS (Hypertext Transfer Protocol Secure) is a secure version of the HTTP protocol that uses the SSL/TLS protocol to encrypt data sent between a web browser and a website.
Read More »
FAQ: Digital Certificate Revocation
FAQ covering common methods for communicating information about digital certificate revocation: CRL, OCSP, OCSP Stapling and Must-Staple, and CRLite.
Read More »
FAQ: Compromised Private Keys
Think your key might be compromised? This might be an emergency, but it might just be a chance to re-key your certificate. Find out how to move forward here.
Read More »
What is a Digital Certificate?
A digital certificate is a type of file used to associate cryptographic key pairs with identities such as websites, individuals, or organizations.
Read More »
FAQ: Getting Started With Your Code Signing Certificate
This FAQ answers common questions about getting started signing files with your SSL.com EV Code Signing certificate and YubiKey FIPS token.
Read More »
FAQ: Kernel-Mode Code Signing Certificates
This FAQ answers common questions developers may have about getting started with kernel-mode code signing in Windows.
Read More »
What is the “unique value” used in domain validation (DV)?
The “unique value” used in domain validation (DV) is a random or user-supplied value used to ensure the uniqueness of the DV request.
Read More »
FAQ: Getting Started With Your Business Identity Certificate
This FAQ answers common questions about getting started signing documents and email with SSL.com’s Business Identity Certificate and YubiKey FIPS token.
Read More »
What is a Wildcard SSL Certificate?
A Wildcard SSL/TLS certificate from SSL.com offers convenience, affordability, and saves time when protecting multiple subdomains.
Read More »
What is a chain of trust?
A chain of trust is a linked validation path from a root CA that serves as a trust anchor to an end-entity certificate, via any intermediate certificates.
Read More »
What Is the Difference Between Electronic and Digital Signatures?
Certificate-based digital signatures offer guarantees of authenticity, integrity, and non-repudiation that are not offered by simple electronic signatures.
Read More »
What is Public-Key Cryptography?
Public-key cryptography, also known as asymmetric cryptography, is a system that uses pairs of public and private keys for encryption and authentication.
Read More »