Terminology

  • Cryptograpic algorithms are being used to encrypt and decrypt messages. This enables two parties to communicate safely, without someone reading along. What is an algorithm? In essence, an algorithm consists of instructions...

    More

  • The CAA record is a DNS record type that allows domainname owners extra control over SSL certificates that can be issued for their domains. You define which CA is allowed...

    More

  • A CA provides services in the field of certificate issuing and electronic signatures, where it acts as a Trusted Third Party. A CA is responsible for the validation of certificate...

    More

  • A Certificate Revocation List (CRL) is a list of certificate serial numbers that have been revoked, no longer valid and can not be trusted anymore by users. A CRL will be...

    More

  • When requesting an SSL Certificate, a CSR (Certificate Signing Request) is required. The CSR is encrypted text containing information about the certificate that needs to be requested. For each certificate...

    More

  • Certificate transparency is a Google initiative. Google Chrome uses Certificate transparency to check if a SSL certificate has been issued legitimately. How does Certificate Transparency work? Certificate Transparency (CT) is a...

    More

  • DNSSEC is an extension of the current DNS protocol, which adds security to the use of domain names. All domain names can make use of this technology, but have to...

    More

  • ECC
    What is ECC (Elliptic Curve Cryptography)? Elliptic Curve Cryptography (ECC) is an algorithm which can be used as an alternative for RSA (RSA is currently the most used...

    More

  • An EV certificate gives websites a professional and trustworthy appearance. In addition, it gives websites an increasing conversion rate. Because of the green address bar, visitors are able to see...

    More

  • HTTP Strict Transport Security (HSTS) is a server setting that enforces a secured connection. By the use of HSTS the browser will will check wether a secure connection via HTTPS to...

    More

  • With a Multi Domain Certificate it's possible to secure multiple domain names and subdomains in one certificate. This type of certificate is also known as an SAN- or UCC (Unified...

    More

  • For safe use of digital certificates, a careful check on the validity of the certificates is very important. This validity check can be made using a Certificate Revocation List...

    More

  • To be able to safely use digital certificates, it is vitally important they are carefully checked for validity. This check can be done using a CRL or an OCSP. How does...

    More

  • Reissuing a certificate means the certificate is issued again, (well) before its expiration date, using a new CSR. The expiration date of the certificate will remain the same after it...

    More

  • A root certificate identifies a Certificate Authority. With this root certificate a CA signs one or more subordinate certificates, that sign the SSL certificates of end-users. A webbrowsers contains a...

    More

  • Server Name Indication is an extension of SSL and TLS which indicates which host name the client wishes to establish a connection with at the start of the handshaking process....

    More

  • The National Institute of Standards and Technology (NIST) adviced to change to SHA-2 for issuing digital certificates. The¬†SHA-family is developed by the NIST and is used by Certificate Authorities...

    More

  • Many applications need passwords for logging in, and the number of applications is steady growing. People tend to use either one password for all applications, or a separate password per...

    More

  • A Wildcard Certificate secures every subdomain on a root domain. When using a Single Domain certificate, it will be connected with a specific (sub)domain, for example www.yourdomain.com. A Wildcard Certificate...

    More

SSLCheck

Our SSLCheck will examine your website's root and intermediate certificates for correctness and report any potential issues