Support

  • eIDAS Regulation

    Since July 2016, the eIDAS Regulation (Regulation N910/2014) on electronic identification and trust services for electronic transactions is applicable for all member states of the EU. This means that...

    More

  • Electronic signature

    The law recognizes different levels of electronic signatures, which can be used as a replacement for the handwritten signature. According to European Law, a qualified electronic signature (QES) is as...

    More

  • Hardware Signing Module (HSM)

    What is a Hardware Security Module? Hardware Security Modules (HSM) offer reliable protection for applications, transactions and information through encryption. A Hardware Security Module is a secured piece of hardware in...

    More

  • Installation Code Signing Certificate or Client Certificate

    When requesting an Email certificate (client certificate) or Code Signing certificate your browser can automatically create the CSR. It is also possible to specify the CSR manually, but in this...

    More

  • Request Code Signing Certificate or Client Certificate

    For requesting an email or code signing certificate a CSR is required. This can be generated during the request of the certificate with Internet Explorer or Firefox. The functionality is...

    More

  • Timestamping

    A digital signature proves who has signed a file. A time stamp shows when the file was signed. This is comparable to signing a document in the presence of a...

    More

  • USB tokens

    What is a USB-Token? A USB-token, also called a PKI token is used to store a digital signature which is subsequently used to sign or log in. Due to the use...

    More

SSLCheck

Our SSLCheck will examine your website's root and intermediate certificates for correctness and report any potential issues