Exchange 2010 Exchange 2013 / 2016 Exchange 2010 Once you have your PFX file created, you can install it on an Exchange 2010 server in a few steps: Open up the Exchange Management Console (EMC); Click on Server Configuration located in the left-hand menu; On the right side, select the server you wish to secure; ..
Category : General Questions
Helpdesk We offer support via email and live chat—bubble in the bottom right-hand corner of your screen. Our customer service team is here 24/7 and responds promptly—within 10 minutes for chat and 2 hours for email. General questions – support@ssls.com Submit SSL installation request – tech@ssls.com GDRP concerns – dpa@ssls.com Affiliate questions – affiliates@ssls.com Speed ..
In this article: What is CAA record? Add CAA record on cPanel Add CAA record on CloudFlare Add CAA record on Windows Server 2016 Add CAA record on GoDaddy CAA record and CNAME What is CAA record? There are many organizations known as certificate authorities (CAs) that are responsible for issuing identity-confirmation certificates for websites, ..
The SSLCertificate.com store has been shut down. If you were an SSLCertificate.com customer, don’t worry – your SSLs are safe. They just have a new home at SSLs.com. Welcome! Your SSLCertificate.com account, along with all your SSL certificates, were securely transferred to SSLs.com. You can log in to your fresh SSLs.com account using your SSLCertificate.com ..
A Certification Authority (or Certification Authority) is a trusted agency that is authorized to issue, renew and revoke SSL certificates after verifying the identity and legitimacy of the requesting party. Comodo (now Sectigo CA) is the trusted certificate ..
A critical vulnerability nicknamed “Heartbleed” was discovered in OpenSSL, the most popular SSL module used on Linux / cPanel servers. This exploit allows a third party to steal information that would otherwise be secured and encrypted with the SSL/TLS protocol, and to steal the private keys from the certificate pair itself. Here’s a great site ..
Our prices are incredibly low even when compared to our competitors and the retail price of the Certificate Authorities for the same product. This is because we buy certificates in bulk from Comodo (now Sectigo) and resell them to you at discounted prices. This keeps everyone h..
SSLs.com always strives to be on the cutting edge of Web security. We believe that modern trends toward more universal encryption of Internet traffic is a positive factor for all users and leads to increased safety and development. You may have heard about a recent initiative to introduce free SSL certificates, and while this may ..
SSL, or Secure Sockets Layer, is a data security tool that was designed to keep communication over the internet safe. Data sent via an SSL connection is protected by a mechanism called encryption that scrambles the data in transit to prevent theft and tampering. All SSL provide same encryption, however mechanisms of obtaining a certificate varies ..
The certificate encryption strength is a measure of number of bits in the key used to encrypt data during an SSL session. The bigger the number, the longer it takes for computer(s) to decrypt enciphered data. The strength of encryption depends solely on the web-browser and the web-server it requests the connection to. It is ..
At SSLs.com we accept the following payment methods: Visa Master Card American Express Discover PayPal Bitcoin JCB Diners Club B..
Minimum amount that can be deposited to funds is $5.00. SSLs.com account funds can be used to make purchases at SSLs.com. You may add funds to your account in 2 ways: During Checkout Using ‘add funds’ option in user area During Checkout When you place a product in your shopping cart, you may either: click ..
How Is Certificate Transparency Implemented? Advantages of Certificate Transparency (CT) How to Check for Certificate Transparency (CT) Compliance? Certificate Transparency is a relatively new framework that’s designed to fix some structural flaws within the existing system of SSL certificates, in return making it more open to the public. It was first announced by Google Inc. ..
Provided the certificate is installed properly, the padlock is to appear in the address bar and can be seen by anyone who visits your site on any browser that they may use. Note: From September 2023, the new version of the Chrome browser will replace the padlock symbol with a tune icon. This update is occurring ..
In order to download a receipt from your account, click on the arrow near your username on the top of the dashboard and select Order history from the drop-down menu. You will get on the page with all your orders listed. Click on the necessary order ID (8-digit code in the first column) in order ..
We have tried to cover most common questions which you might have on the spot. Of course, we understand, that there are cases which cannot be covered with an F.A.Q. and require additional consultation. Our team is ready to look into your particular case 24/7. Contact us via Live Chat that you can start by ..
SSLs.com stopped providing Symantec certificates on December 1, 2016. Unused certificates Issued certificates Expiring certificates Unused certificates When you click on the “New” button and choose the “Activate” option from the drop-down menu, you will get error messages. You have two options: Go ahead with a Comodo (now Sectigo) SSL Claim a refund If you opt ..
Whois is a protocol used to find information about networks, domains and hosts. The whois records normally include data on the organizations and the contacts associated with these networks and domains. Whois services operate through a whois server. Anyone can connect to a whois server and send a query. The whois server will then respond ..
Browser ubiquity (also known as browser recognition or browser compatibility) indicates an estimated percentage of Internet users who will inherently trust an SSL certificate. The lower the browser ubiquity, the less people will trust a certificate. As a general rule, any SSL certificate with over 95% browser ubiquity is a..
A multi-domain certificate is designed to secure many domain and/or subdomain names. These certificates are mostly used to secure the services of Microsoft Exchange Server (versions 2003, 2007, 2010, 2013), Office Communications Server 2007 or Mobile Device Manager. These certificates can secure the combination of completely unique domains and subdomains with different TLDs (Top Level ..
How it worked prior to SNI implementation SNI as a solution Applications that support SNI How to configure SNI SNI stands for Server Name Indication and is an extension of the TLS protocol. It indicates which hostname is being contacted by the browser at the beginning of the handshake process. This technology allows a server ..
Overview Advantages Disadvantages OCSP stapling setup and test Overview Most applications that depend on X.509 certificates need to validate the status of the certificates used when performing authentication, signing, or encryption operations. This certificate validity and revocation check are performed for all certificates in a certificate chain, up to the root one. If any of ..
CA Bundle file contains root and intermediate certificates. These certificates build the chain of trust for your domain certificate. The Bundle files differ by the validation level of your certificate and the key type in the CSR you used to activate your certificate. The CA Bundle file can be downloaded from your SSLs.com account. The ..
When an SSL certificate is issued, it is sent to the email address specified by you during the activation process. Your certificate’s status should be changed to Active under your account within 10-15 minutes. The option to download your certificate becomes available in your account once the certificate is issued. To download the certificate: 1. ..
What is a Certificate Signing Request? What details are included in the CSR code? What is the format of the CSR code? How can I check the details included in the CSR code? How can I generate a CSR code? What is a Certificate Signing Request? A Certificate Signing Request (CSR code) is a block ..
Usually a dedicated IP address is a technical requirement for the SSL installation. For proper SSL functionality it is recommended to have a separate dedicated IP for each certificate. However, nowadays it is possible to install multiple SSL certificates using a shared IP address thanks to the SNI (Server Name Indication) technology. A mandatory use ..
There is a multitude of server and device types out there. Ones that allow an SSL to be installed and configured require the digital certificate file to be encoded and formatted in a certain way. All you need to know is that there are several file extension types and encoding formats. Plus, in order to ..
Simply add the desired certificate at SSLs.com to the cart clicking on the Buy button: Click on the Checkout button on the right: After choosing the payment method and filling out the required details, confirm the purchase. Once the checkout is complete, you can find the purchased certificate in My SSL list in the top-right ..
Our in-browser CSR code generator (which can be used for all SSL Certificates except Multi-Domains), supports a wide range of IDN for these top level domains: AC AR AS AT BIZ BR BV CAT CH CL CN COM DE DK EE ES EU FI GR HK HR HU IL INFO IO IS IT JP KR ..
Yes. Wildcard Certificates allow you to secure multiple subdomains on the same domain name. So with a single certificate issued to *.yourdomain.com you can protect www.yourdomain.com, secure.yourdomain.com, info.yourdoma..