* Prices do not apply to entities located in Japan. Please contact us for pricing.
Keep online transactions secure by enabling every web site visitor to experience the strongest SSL encryption available to them. Most SSL certificates are capable of strong encryption (128-bit or higher), however, certain older browsers and operating systems cannot step-up to 128-bit encryption unless an SSL certificate with SGC technology is used.
Secure Sockets Layer (SSL) is a protocol for enabling data encryption on the Internet and for helping web site users confirm the owner of the web site. SSL is most commonly used to protect communications between web browsers and servers. However, it is increasingly used for server to server communications and for web-based applications.
EV SSL products. Extended Validation (EV) authentication is the highest level of authentication available with an SSL Certificate. Any Web site with an established brand reputation should consider the benefits of an SSL Certificate with EV authentication.
A signed acknowledgement of agreement from the corporate contact listed on any order for an EV SSL Certificate. A company registration document may also be required if the we are unable to confirm the organization's details through a government database. A legal opinion letter may also be requested to confirm the following details about the organization applying for the Extended Validation SSL Certificate:
Organization authentication, also known as business identity authentication, is a high assurance level of authentication. SSL Certificates with this level of authentication require verification of an organization’s existence through a government issued business credential. Usually VeriSign, Thawte or GeoTrust will get this independent verification by searching one of many government or private databases to which they have access.
The certificate provider will confirm domain control by sending an email to the administrator listed with the registrar for the domain. If the authorized administrator does not reply, a second email will be sent to an email address at the domain such as [email protected] or [email protected] (You may select a secondary email address during the enrollment process.) In addition to validation by email, you will be asked to provide a telephone number where you can be reached immediately after submitting your enrollment. If everything checks out, the SSL certificate is issued.
Encryption is a mathematical process of coding and decoding information. The number of bits (40-bit, 56-bit, 128-bit, 256-bit) tells you the size of the key. Like a longer password, a larger key has more possible combinations. When an encrypted session is established, the encryption level is determined by the capability of the web browser, SSL certificate, web server, and client computer operating system.
When a browser connects to a secure site it retrieves the site's SSL certificate and checks that it has not expired, that it has been issued by a Certificate Authority the browser trusts and that it is being used by the web site for which it has been issued. If it fails on any one of these checks the browser will display a warning to the end user. If it succeeds, several security indicators are built into modern browsers to indicate that SSL is enabled.
In addition, a trust mark may be added to web pages on a secure site.
When a browser or operating system encounters an SSL certificate, it checks to make sure that the certificate is valid and trusted. An SSL certificate is trusted if it is signed by a trusted or pre-installed root certificate. If a browser that does not contain the root CA certificate used to issue the SSL certificate, a security warning will alert them.
A CSR is a public key that you generate on your server according to your server software instructions. (If you do not have access to your server, your web host or Internet service provider will generate it for you.) The CSR is required during the SSL certificate enrollment process because it validates the specific information about your web server and your organization.
SSL uses unique cryptographic key pairs: each key pair consists of a secret private key and a related public key. Information encrypted with a public key can only be decrypted with the corresponding private key, and vice-versa.
Most SSL Certificates are compatible with the following browsers:
Any server that supports SSL v2 or v3 technology can use our SSL Certificates:
These include popular names such as Apache, IIS, Plesk, Exchange, ISA2004/2006, Lotus Dominos, Tomcat, Helm, DotNetPanel, and many more!