{"id":1498,"date":"2020-09-22T13:45:00","date_gmt":"2020-09-22T13:45:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=1498"},"modified":"2020-09-22T19:46:22","modified_gmt":"2020-09-22T19:46:22","slug":"what-is-an-x-509-certificate-what-to-know-about-pki-certificates","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/","title":{"rendered":"What Is an X.509 Certificate? What to Know About PKI Certificates"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">X.509 certificates are the bricks and pavers that help to create the public key infrastructure that internet security is built upon\u2026<\/h2>\n\n\n\n<p>If you\u2019re looking for the answer to the question \u201cwhat is an X.509 certificate?\u201d then you\u2019ve just hit gold. An X.509 certificate is a type of digital certificate that\u2019s used across the internet in many different ways. In fact, you\u2019re using one right now while visiting our website!<\/p>\n\n\n\n<p>In a nutshell, X.509 certificates help to protect organizations and individuals from those who wish to impersonate them or spy on them. They do this through the use of asymmetric keys and third-party validation \u2014 which we\u2019ll explain more in depth shortly.<\/p>\n\n\n\n<p>Alright, so, let\u2019s get right to it. In this article, we\u2019ll cover key items to know about X.509 and X.509 certificates:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>What an X.509 certificate is,<\/li><li>Who issues these types of certificates,<\/li><li>The different types of X.509 certificates are and how they\u2019re used, and<\/li><li>What the X.509 public key infrastructure (PKI) standards are that they use.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What Is an X.509 Certificate?<\/h2>\n\n\n\n<p>An X.509 certificate allows websites, users, businesses and other organizations to prove their identities on the internet. In other words, they use an X.509 certificate like a passport to prove who they are. To put it in more technical terms, an X.509 certificate is a type of digital certificate that offers third-party <em><a href=\"https:\/\/sectigostore.com\/blog\/the-difference-between-authentication-and-authorization-explained-in-detail-by-a-security-expert\/\">authentication<\/a><\/em> to websites, users, businesses and other organizations across the internet. This is known as third-party authentication.<\/p>\n\n\n\n<p>But if you have an X.509 certificate for your business, couldn\u2019t someone just steal the certificate and use it as a fake ID? Heh, not very easily. And that\u2019s thanks to something that\u2019s known as <a href=\"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/\">public key infrastructure<\/a>, or PKI for short.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><img loading=\"lazy\" decoding=\"async\" width=\"251\" height=\"154\" src=\"\">X.509 Certificates and PKI<\/h3>\n\n\n\n<p>X.509 certificates are an integral part of the <a href=\"https:\/\/www.itu.int\/rec\/T-REC-X.509\" target=\"_blank\" rel=\"noreferrer noopener\">international X.509 public key infrastructure (PKI) standards<\/a>. These standards were first released back in 1988 and have been updated every few years since. The most recent release of the X.509 PKI standards was in October 2019. So, \u00a0X.509 certificates are also known as public key certificates (or <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-pki-certificate\/\">PKI certificates<\/a>) because they\u2019re created and managed according to these formatting standards.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/public-private-key-pair.png\" alt=\"An example of a public-private key pair that X.509 certificates use\" class=\"wp-image-1500\" width=\"349\" height=\"214\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/public-private-key-pair.png 447w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/public-private-key-pair-300x184.png 300w\" sizes=\"auto, (max-width: 349px) 100vw, 349px\" \/><\/figure><\/div>\n\n\n\n<p>The reason why someone can\u2019t just easily steal and use your certificate as their own is because an X.509 certificate ties information about you (your organization) to a cryptographic public key and by making that key available to third parties. A public key is part of an asymmetric key pair that consists of a public and private key.<\/p>\n\n\n\n<p>An illustration of how public key encryption (asymmetric encryption) works using public-private key pairs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A Quick Look at the X.509 Certificate Format<\/h3>\n\n\n\n<p>X.509 certificate contains identifying information about your organization, your public key, and the digital signature of the entity that issued your certificate. More specifically, each certificate contains the following information as part of its X.509 certificate format:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Your distinguished name.<\/li><li>Your public key.<\/li><li>The distinguished name of the issuing entity (typically a public certificate authority, which we\u2019ll talk about shortly, but there are also self-signed certificates).<\/li><li>The issuing entity\u2019s digital signature (which is signed by their private key).<\/li><li>Certificate issuance and expiration dates.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"945\" height=\"624\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/x-509-ssl-cert.png\" alt=\"Two screenshots of X.509 certificate data for an SSL\/TLS certificate\" class=\"wp-image-1505 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/x-509-ssl-cert.png 945w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/x-509-ssl-cert-300x198.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/x-509-ssl-cert-560x370.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/x-509-ssl-cert-940x621.png 940w\" sizes=\"auto, (max-width: 945px) 100vw, 945px\" \/><\/figure><\/div>\n\n\n\n<p>Screenshot of the SSL\/TLS certificate that we use to secure SectigoStore.com.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who Issues X.509 Certificates?<\/h2>\n\n\n\n<p><a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-certificate-authority-certification-authorities-explained\/\">Certificate authorities<\/a> (CAs) \u2014 originally called certification authorities \u2014 are the entities who are responsible for issuing X.509 digital certificates. They do this to ensure that each certificate they issue adheres to specific authentication standards and meets specific validation requirements.<\/p>\n\n\n\n<p>Typically, when people talk about CAs, they\u2019re specifically referring to public certificate authorities. However, there are also private CAs, which can issue and self-sign certificates for use within their own organizations and intranets. (Self-signed certificates should never be used for public-facing applications.)<\/p>\n\n\n\n<p>Sectigo is an example of such a publicly trusted certificate authority. Although there are a few hundred CAs in existence around the world, only a handful or so of them issue the majority of certificates used globally.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Roles That CAs Play in X.509 Certificates<\/h3>\n\n\n\n<p>So, what is it exactly that CAs do? According to the X.509 standards that were published in 2016:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cIn order for a relying party to be able to trust a public-key of another entity, for instance to authenticate the identity of that entity, the public key shall be obtained from a trusted source. Such a source, called a certification authority (CA), certifies a public key by issuing a public-key certificate which binds the public-key to the entity which holds the corresponding private key.\u201d<\/em><\/p><\/blockquote>\n\n\n\n<p>OK, that was a bit dense. Let\u2019s unpack it\u2026<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">CAs Validate Organizational Identities to Ensure They\u2019re Legitimate<\/h4>\n\n\n\n<p>Before a certificate authority issues a public key certificate to anyone, they first validate that the requestor (your organization) is genuine. For example, if you\u2019re requesting an X.509 certificate for your company website, there are three ways they can do this:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Domain validation (DV)<\/strong> \u2014 This process involves the CA using automation to verify that an organization controls the domain in question. This typically involves either:<ol><li>Sending an email to a registered email address for that domain, or<\/li><\/ol><ol><li>Sending an email with files that need to be uploaded to a specific folder of that domain.<\/li><\/ol><\/li><li><strong>Organizational validation (OV)<\/strong> \u2014 This mid-level validation process involves the CA performing basic business validation. This verifies that you not only own or control the domain, but that your organization is legitimate. This helps to establish trust by showing that CA has verified your organization identity and that you\u2019re, therefore, trustworthy.<\/li><li><strong>Extended validation (EV)<\/strong> \u2014 This process is the most in-depth of the three validation types. It requires multiple verifications checks using documents that are provided by the certificate requestor as well as other third-party sources.<\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\">CAs Bind Unmodifiable Public Keys to Organizational Identities<\/h4>\n\n\n\n<p>Now, after validating the organization in question, the CA binds the verified identity to the organization\u2019s public keys. Think of this like the official seal on your passport. This helps to prove that your identity is genuine and verified.<\/p>\n\n\n\n<p>So, what makes this public key so great? Basically, when a key is generated using secure cryptographic algorithms and appropriate entropy (randomness), these keys are essentially \u201cunforgeable.\u201d This means that they can\u2019t be altered or modified in any way without those changes being detected. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Are the 4 Types of X.509 Certificates?<\/h2>\n\n\n\n<p>It may surprise you to know that there\u2019s actually more than just one type of X 509 certificate. There are many, and they\u2019re used for different purposes. To help you understand the differences between them, we\u2019ll go through each individual X.509 certificate example to breakdown what they are and why they\u2019re useful.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. TLS Certificates (SSL Certificates)<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"495\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/x509-certificate-example-sectigostore-1024x495.png\" alt=\"A screenshot of the security padlock icon that appears in the browser when a website uses an SSL\/TLS digital certificate. \" class=\"wp-image-1504 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/x509-certificate-example-sectigostore-1024x495.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/x509-certificate-example-sectigostore-300x145.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/x509-certificate-example-sectigostore-560x271.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/x509-certificate-example-sectigostore-940x454.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/x509-certificate-example-sectigostore.png 1157w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"656\" height=\"334\" src=\"\">Let\u2019s start off with the most popular and commonly used X.509 certificate. A TLS certificate, also known as a website security certificate, allows your browser to connect and securely exchange data with a website\u2019s server. See that padlock in your browser\u2019s web address bar? Yeah, that means your browser is sending and receiving data from our website\u2019s server via a secure, encrypted connection. This is known as data-in-transit encryption.<\/p>\n\n\n\n<p>This is why there\u2019s \u201c<a href=\"https:\/\/sectigostore.com\/page\/how-does-https-work\/\">HTTPS<\/a>\u201d in the URL instead of just \u201cHTTP.\u201d Basically, HTTPS = the secure hyper text transport protocol. HTTP = insecure hyper text transport protocol. A protocol is a set of rules that dictate how devices exchanges data across networks and the internet. There are a wide variety of different protocols that are useful for different applications.<\/p>\n\n\n\n<p>Whenever an organization has a TLS certificate installed on its servers, it means that the data exchanges that take place on the site use the transport layer security (TLS) protocol. TLS certificates are also known as SSL certificates because website certificates previously used the secure sockets layer (SSL) protocol to exchange data. (SSL is now a deprecated protocol.) The <a href=\"https:\/\/sectigostore.com\/blog\/ssl-vs-tls-decoding-the-difference-between-ssl-and-tls\/\">TLS replaced SSL<\/a> as the go-to protocol for secure data transmissions.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">SSL vs TLS Certificates<\/h4>\n\n\n\n<p>So, why do people sometimes call them SSL certificates instead of TLS certificates? Frankly, it\u2019s because people are slow to change \u2014 particularly when it comes to the terms they use. So, you\u2019ll still often hear people calling them SSL certificates instead of TLS certificates.<\/p>\n\n\n\n<p>No matter. Just know that we\u2019re talking about SSL\/TLS certificates, we\u2019re really talking about TLS certificates.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Types of SSL\/TLS Certificates<\/h4>\n\n\n\n<p>SSL\/TLS certificates are X.509 certificates that are typically categorized by 1) validation, and 2) functionalities. They can be issued with DV, OV or EV validation. There are several types of certificates that are available depending on the functions you need them to fill:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Single domain SSL\/TLS certificates<\/strong> \u2014 These certificates are great for securing both the WWW and non-WWW versions of a domain that you control.<\/li><li><strong>Multi-domain SSL\/TLS certificates<\/strong> \u2014 These certificates allow you to secure multiple domains on one certificate by listing additional domains as subject alternative name (SAN) domains.<\/li><li><strong>Wildcard SSL\/TLS certificates<\/strong> \u2014 These certificates enable you secure an unlimited number of subdomains on a single level.<\/li><li><strong>Multi-domain wildcard SSL\/TLS certificates<\/strong> \u2014 These are your jack-of-all-trades type of SSL\/TLS certificates. I say that because they allow you to secure an unlimited number of subdomains on all levels for multiple domains and SANs.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2. Code Signing Certificates<\/h3>\n\n\n\n<p>The next type of X.509 certificate we\u2019ll cover is known as a code signing certificate. These certificates serve as a way for software developers and publishers to assert their publisher identity. This helps to protect the integrity of the software and its code.<\/p>\n\n\n\n<p>The way the certificate aids in the effort is by allowing the software creator to affix a digital signature to their code, script, or executable.<\/p>\n\n\n\n<p>You know these types of warning screens that pop up from Microsoft Windows?<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"457\" height=\"370\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/UnknownPublisher.png\" alt=\"A Microsoft Windows warning message for software not signed by an X.509 certificate\" class=\"wp-image-1503 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/UnknownPublisher.png 457w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/UnknownPublisher-300x243.png 300w\" sizes=\"auto, (max-width: 457px) 100vw, 457px\" \/><\/figure><\/div>\n\n\n\n<p>This warning message is a great way to drive away potential customers and users. A code signing certificate makes it so that your verified publisher information populates in the publisher field. This way, it doesn\u2019t just say \u201cUnknown\u201d or \u201cUnverified\u201d anymore.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Email Signing Certificates<\/h3>\n\n\n\n<p>These X.509 certificates, which are also known as S\/MIME certificates or personal authentication certificates (PACs), are a great way to securely send emails and to authenticate yourself to servers and other devices. They allow you to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Authenticate yourself to your recipients<\/strong> \u2014 This proves to your recipient that it was you who sent it (and that you\u2019re not an imposter).<\/li><li><strong>Digitally sign emails<\/strong> \u2014 This proves to your recipient that the data and content within your email hasn\u2019t been modified in any way since it was sent. It includes information showing how the certificate was cryptographically signed and at what time and date you signed it.<\/li><li><strong>Encrypt your email data<\/strong> \u2014 the message and any attachments within the email before you hit \u201csend.\u201d This is known as data at rest encryption. In order to send an encrypted email, however, both you and your recipient must be using an email signing certificate. This is necessary because you must get a copy of the recipient\u2019s public key prior to sending an encrypted email. (You can get this by having the recipient send you a digitally signed email ahead of time.)<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"561\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/digital-signature-email-group-example-1024x561.png\" alt=\"A series of screenshots of how an email signing certificate displays\" class=\"wp-image-1502 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/digital-signature-email-group-example-1024x561.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/digital-signature-email-group-example-300x164.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/digital-signature-email-group-example-560x307.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/digital-signature-email-group-example-940x515.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/digital-signature-email-group-example.png 1109w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>These certificates are also known as personal authentication certificates because they\u2019re useful for authenticating users (or, more specifically, the clients on their applicable devices) via two-way authentication. This type of authentication allows you to gain access to specific applications, sites, servers, or devices. &nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><img loading=\"lazy\" decoding=\"async\" width=\"418\" height=\"191\" src=\"\">4. Document Signing Certificates<\/h3>\n\n\n\n<p>These X.509 digital certificates enable users to digitally sign the documents they create (Word docs, PDFs, etc.). What this does it allow the document creator to prove that they created the document and that it hasn\u2019t been altered or modified in any way. Basically, you\u2019re validating the document\u2019s integrity so that people know it\u2019s safe to use.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"803\" height=\"368\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/document-signing-screenshot-pdf.png\" alt=\"A screenshot example of a document signing certificate status\" class=\"wp-image-1501 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/document-signing-screenshot-pdf.png 803w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/document-signing-screenshot-pdf-300x137.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/document-signing-screenshot-pdf-560x257.png 560w\" sizes=\"auto, (max-width: 803px) 100vw, 803px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What Is the X.509 Public Key Infrastructure Set of Standards?<\/h2>\n\n\n\n<p>Public key infrastructure (PKI) is the foundation of global internet security as we know it today. The X.509 international standards is a document that defines the format, processes and entities that are involved with the creation, management, and revocation of public key digital certificates. It also covers asymmetric cryptographic techniques and how identities are paired with cryptographic key pairs.<\/p>\n\n\n\n<p>Back in 1988, two international standards organizations set up committees to collaborate and create a set of standards for dealing with the technical aspects of public key certificates. This set of standards is known as the <a href=\"https:\/\/www.itu.int\/rec\/T-REC-X.509\" target=\"_blank\" rel=\"noreferrer noopener\">X.509 public key infrastructure standards<\/a>, and there have been multiple versions of these standards that have been released over the past three decades.<\/p>\n\n\n\n<p>The two organizations that were involved in creating the standards are:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>The <strong>International Standards Organization (ISO)<\/strong>, and<\/li><li>The <strong>International Telegraph and Telephone Consultative Committee<\/strong> (Comit\u00e9 Consultatif International T\u00e9l\u00e9phonique et T\u00e9l\u00e9graphique, or <strong>CCITT<\/strong>), which later became the <strong>International Telecommunication Uninion Telecommunication<\/strong> (<strong>ITU-T<\/strong>) standardization sector.&nbsp;<\/li><\/ol>\n\n\n\n<p>The process also now involves the <strong>International Electrotechnical Commission (IEC)<\/strong>, who has a joint committee with ISO. (The IEC joined the collaborative effort for the version of the X.509 standards that were released in 1993.) Together, these three organizations develop the international standards that businesses and technologies worldwide use today. \u00a0<\/p>\n\n\n\n<p>There have been about 30 updates made to the X.509 public key infrastructure standards since they were first released since 1988. The <a href=\"https:\/\/www.itu.int\/rec\/T-REC-X.509-201910-I\/en\" target=\"_blank\" rel=\"noreferrer noopener\">latest version of the X.509 standards document<\/a> was released in October 2019.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Summary of X.509 Certificates<\/h2>\n\n\n\n<p>To summarize the point of this entire article, X.509 certificates (aka public key certificates) are integral to the security of data and authentication of communications over networks and the internet. Many types of data exchanges and their applicable protocols rely on X.509 certificates. They come with different validation levels and have different functionalities as well.<\/p>\n\n\n\n<p>Today, X.509 certificates are useful for many tasks, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Authenticating clients, servers, and other devices as well as individuals and organizations.<\/li><li>Ensuring the integrity of emails, software and code, digital documents, and various data transmissions.<\/li><li>To secure data exchanges for websites and email communications using encryption. This helps to protect data both while it\u2019s in transit and at rest (depending on the application).<\/li><\/ul>\n\n\n\n<p>I hope this article answers your questions about what X.509 certificates are and how websites, businesses, organizations and individuals around the world use them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>X.509 certificates are the bricks and pavers that help to create the public key infrastructure that internet security is built upon\u2026 If you\u2019re looking for the answer to the question&#8230;<\/p>\n","protected":false},"author":8,"featured_media":1506,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[54,129,130],"class_list":["post-1498","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-pki","tag-x-509","tag-x-509-certificate","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is an X.509 Certificate? What to Know About PKI Certificates - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"What is an X.509 certificate? It verifies your identity to third parties over the internet &amp; is a core component of internet security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is an X.509 Certificate? What to Know About PKI Certificates - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"What is an X.509 certificate? It verifies your identity to third parties over the internet &amp; is a core component of internet security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-22T13:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-22T19:46:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/X509-certificate.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Casey Crane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Crane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\\\/\"},\"author\":{\"name\":\"Casey Crane\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"headline\":\"What Is an X.509 Certificate? What to Know About PKI Certificates\",\"datePublished\":\"2020-09-22T13:45:00+00:00\",\"dateModified\":\"2020-09-22T19:46:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\\\/\"},\"wordCount\":2375,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/X509-certificate.jpg\",\"keywords\":[\"pki\",\"X.509\",\"X.509 certificate\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\\\/\",\"name\":\"What Is an X.509 Certificate? What to Know About PKI Certificates - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/X509-certificate.jpg\",\"datePublished\":\"2020-09-22T13:45:00+00:00\",\"dateModified\":\"2020-09-22T19:46:22+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"description\":\"What is an X.509 certificate? It verifies your identity to third parties over the internet & is a core component of internet security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/X509-certificate.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/X509-certificate.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"Businessman working on laptop. Protection network security computer and safe your data concept. Digital crime by an anonymous hacker\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is an X.509 Certificate? What to Know About PKI Certificates\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\",\"name\":\"Casey Crane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"caption\":\"Casey Crane\"},\"description\":\"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is an X.509 Certificate? What to Know About PKI Certificates - InfoSec Insights","description":"What is an X.509 certificate? It verifies your identity to third parties over the internet & is a core component of internet security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/","og_locale":"en_US","og_type":"article","og_title":"What Is an X.509 Certificate? What to Know About PKI Certificates - InfoSec Insights","og_description":"What is an X.509 certificate? It verifies your identity to third parties over the internet & is a core component of internet security.","og_url":"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/","og_site_name":"InfoSec Insights","article_published_time":"2020-09-22T13:45:00+00:00","article_modified_time":"2020-09-22T19:46:22+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/X509-certificate.jpg","type":"image\/jpeg"}],"author":"Casey Crane","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Casey Crane","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/"},"author":{"name":"Casey Crane","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"headline":"What Is an X.509 Certificate? What to Know About PKI Certificates","datePublished":"2020-09-22T13:45:00+00:00","dateModified":"2020-09-22T19:46:22+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/"},"wordCount":2375,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/X509-certificate.jpg","keywords":["pki","X.509","X.509 certificate"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/","url":"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/","name":"What Is an X.509 Certificate? What to Know About PKI Certificates - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/X509-certificate.jpg","datePublished":"2020-09-22T13:45:00+00:00","dateModified":"2020-09-22T19:46:22+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"description":"What is an X.509 certificate? It verifies your identity to third parties over the internet & is a core component of internet security.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/X509-certificate.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/X509-certificate.jpg","width":1600,"height":1000,"caption":"Businessman working on laptop. Protection network security computer and safe your data concept. Digital crime by an anonymous hacker"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is an X.509 Certificate? What to Know About PKI Certificates"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c","name":"Casey Crane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","caption":"Casey Crane"},"description":"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=1498"}],"version-history":[{"count":2,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1498\/revisions"}],"predecessor-version":[{"id":1508,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1498\/revisions\/1508"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/1506"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=1498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=1498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=1498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}