Skip to main content
banner image
venafi logo

What Is an SSL/TLS X.509 Certificate?

What Is an SSL/TLS X.509 Certificate?

what is an ssl certificate
August 6, 2020 | David Bisson

SSL/TLS X.509 certificates are digital files that are used for Secure Sockets Layer (SSL) or Transport Layer Security (TLS). An SSL/TLS certificate is one of the most popular types of X.509 certificates, or a type of public key certificate which uses the X.509 standard. X.509 certificates contain a public key and the identity of a hostname, organization, or individual.
 

The SSL/TLS certificate fulfills two functions as machine identities: Authentication and Data Encryption.

  1. First, the certificate can assist with authenticating and verifying the identity of a host or site. The SSL Certificate has information about the authenticity of details around the identity of a host or site. So, when you click on the padlock displayed or check the trust mark the certificate chain details prove where the certificate is generated from.
     
  2. Second, it enables the encryption of information exchanged via a website. When you encrypt data in transit, it that the sensitive information exchanged via the web site cannot be intercepted and read by anyone other than the intended recipient.
     

An SSL/TLS certificate is most reliable when issued by a trusted Certificate Authority (CA). The CA has to follow very strict rules and policies about who may or may not receive an SSL Certificate. So, when you have a valid SSL Certificate from a trusted CA, there is a higher degree of trust. When a certificate authority (CA) signs them or another entity validates them, the owner of that certificate can leverage the public key to establish secure connections with another party or validate documents someone digitally signed using the corresponding private key.
 

Some of X.509 SSL/TLS certificates are self-signed. And these certificates will not be trusted for public-facing applications. Because of this, they are mainly used to encrypt and authenticate data within an organization’s network.


Find unknown and rogue TLS certificates before they expire. Try OutagePREDICT now.

 

SSL/TLS certificates are X.509 certificates with Extended Key Usage: Server Authentication (1.3.6.1.5.5.7.3.1). The "Extended Key Usage" extension lists the "roles" for the entity that uses the certificate. In other words, an entity must use SSL/TLS certificates only for server authentication and nothing else. Otherwise, that entity risks violating the issuing CA's policies.
 

There are also other common types of X.509 certificates, like Client Authentication (1.3.6.1.5.5.7.3.2) and Code Signing (1.3.6.1.5.5.7.3.3). These files form the basis of encryption and authentication schemes.
 

What does the SSL connection process look like for a web page?

As SSL/TLS certificates enable encryption, they are integral to Hyper Text Transfer Protocol Secure(HTTPS), a protocol which encrypts all communication exchanged between a website and your browser.

  • HTTPS starts when a browser requests a secure page.
  • The web server responds with its public key and its certificate.
  • The browser then verifies a trusted authority or CA issued this digital file.
  • Assuming that's the case, the browser uses the web server's public key to encrypt a random symmetric encryption key and sends it to the server with an encrypted URL and other encrypted HTTP data.
  • If the public key is valid, the web server uses its private key to decrypt the symmetric encryption key, URL, and HTTP data before sending over the HTML document and HTTP data now encrypted with the symmetric key.
  • This symmetric key, in turn, allows the browser to decrypt the HTTP data and display it to the user.

ssl-handshake.png

 

How do I check a site for a valid secure connection?

A standard web site without SSL/TLS security displays “HTTP” at the beginning of the web site address in the browser address bar. This stands for “Hypertext Transfer Protocol,” and is the conventional way to transmit information over the Internet. On the other hand, a web site that is secured with an SSL Certificate will have “HTTPS” before the address. This stands for “Hypertext Transfer Protocol Secure”.
 

Every browser has a slightly different way of displaying secure connections. But for all of them, you can check that a website you're visiting is using HTTPS by looking for "HTTPS" in the address bar.
 

Some browsers may also feature a padlock symbol next to the website's address. If you click on that symbol, your web browser should display the name of the organization that owns the SSL/TLS certificate. That symbol turns green when your web browser detects an Extended Validation (EV) SSL certificate. If the information does not match, or the certificate has expired, the browser displays an error message or warning. In addition, many browsers now flag all sites using HTTP as insecure.
 

If the certificate has expired, the web browser will display an error message or warning. These alerts could lead a visitor to navigate away from a website. To prevent this from happening, organizations that own websites and use HTTPS need to manage their certificates and make sure the ones they want to keep don't expire.
 

Read more about how to check SSL/TLS certificates.
 

Are all your machine identities up to-date?

 

 

Related blogs

Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

CIO Study: Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

Machine Identity Protection for Dummies
eBook

Machine Identity Protection for Dummies

About the author

David Bisson
David Bisson

David is a Contributing Editor at IBM Security Intelligence.David Bisson is a security journalist who works as Contributing Editor for IBM's Security Intelligence, Associate Editor for Tripwire and Contributing Writer for Gemalto, Venafi, Zix, Bora Design and others.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat