On this page you will find a glossary of basic terms, you might run into in connection with SSL certificates and our services. If you cannot find any terms you require here, then please contact us and we will explain it and add it here.
Certificate Authority (CA)
Certificate Authority (CA) is an entity that issues digital certificates (electronically signed public key). The Authority confirms the authenticity of the data entered in the certificate prior to release. We offer a range of certificates from Symantec , Thawte GeoTrust a RapidSSL . These CAs are fully trusted, so their certificates do not pose any security warnings on your browser as self-signed certificates do.
If you do not know, which certificate authority to choose , use our SSL certificate Selection Guide.
Common Name (CN)
The Common Name in the SSL certificate indicates the domain for which the certificate is issued. A Common name such as www.domena.co.uk . In Code Signing certificate for signing applications in the field of Common name given authenticated name of the organization for which the certificate.
Certificate Revocation List (CRL)
Certificate Revocation List (CRL) is a list of certificates that have been revoked during the validity and are no longer credible. The reason for early termination is usually a compromised private key. Each CA publishes this list on its website and CRL is used to verify the validity of the certificate.
Public Key (CSR request)
As a CSR request is called a request for a certificate generated on the server where the future SSL certificate function. The CSR contains an information request for the certificate. For examples of correct CSR requests visit support a separate article on CSR.
An Intermediate certificate is a certificate authority, which is necessary for full credibility of your SSL certificate. If the intermediate is not installed on a server, the browser will display a warning about the unknown issuer and security risks.
Intermediate certificates are always sent with the client certificate. You do not have to look for it.
For the SSL certificate to operate correctly, each certificate must be dedicated to a separate IP address on the server and the IP assigned to the domain for which the certificate is issued. The IP address can be changed during operation SSL certificate changed since the certificate is not bound to an IP address.
If you need to secure multiple domains, we recommend SAN certificates which will secure up to 100 domains with one IP address.
The issued certificate can only be used with the correct private key. The private key is created on the server during the development of the request for a certificate (CSR, public key). This is the most important file that must not at any price leave the server to be compromised. With the private key, anyone can use your SSL certificate, so you may obtain the aim of attackers and hackers.
If you delete the private key or it is compromised, do not hesitate to contact customer support a free certificate to rebuild with a new pair of keys.
SAN (Subject Alternative Name)
SAN stands for alternative name on the SSL certificate extending the validity of the other domain names. These names may not be related to the main domain (Common name) and can be an internal server names or priváte IP addresses. More about SAN certificates, refer to the separate page, which also contains examples of the use of SAN names.
certificate SGC (Server Gated Cryptography)
SGC certificates (discontinued!) guarantee a minimum depth of 128-bit encryption for all web browsers and operating systems support only 40 or 56-bit SSL encryption. The technology also allows older browsers to use strong 128-bit encryption which a normal certificate can not reach
SNI (Server Name Indication)
SNI (Server Name Indication) is a method that allows multiple domains and SSL certificates on one web server and IP address. With SNI the server is able to connect the client to determine which virtual server the client wants to see, and send them the correct SSL certificate for the correct domain. Without SNI support browser will receive random certificate.
When you establish a connection with the server browser through HTTPS protocol, it is necessary to arrange the conditions of communication, especially the depth of encryption. This "dating" process is referred to as the so-called. "SSL handshake". While it is sent to the visitor´s SSL certificate encryption, and the depth of communication is determined.
TLS (Transport Security Layout)
TLS is a communication protocol which is replacing the old SSL protocol. Both protocols work similarly, but using the TLS protocol is more secure.
UC (Unified Communication) multi-domain SSL certificate
The UC (Unified Communication) certificate is a synonymum for a SAN certificate ; This name is used mainly by software manufacturers. The function is the same as a SAN certificate.
Public Key (CSR)
The public key (CSR) is required by CA for issue an SSL certificate. The public key is generated on your server by administrator (or web hosting company). CA sign this public key in SSL certificate before issuing.
Wildcard (star) certificate
A Wildcard SSL Certificate allows you to secure all subdomains under one main domain. A Wildcard certificate contains the name before the asterisk key domains (eg. *.sslmarket.co.uk) and covers all subdomains on the asterisk spot (subdomains of superior domain).