当前位置:网站首页>How to verify the domain name after applying for SSL digital certificate?
How to verify the domain name after applying for SSL digital certificate?
2022-07-24 13:39:00 【Ssldun certificate】
In order to prevent the domain name from being falsely applied SSL Domain name of certificate , It is required to verify the ownership of this domain name first , Although the system automatically approves , But it still needs the cooperation of the applicant . Configure the domain name verification information correctly as required , wait for CA After the system center passes the review , Certificate will be issued . Currently available domain name verification SSL There are three ways of certificate : Domain name resolution verification (DNS verification ), Website control verification ( Document validation ), Mailbox validation . You only need to meet the verification of one of them to pass the verification .
Email verification means that the domain name verification email will be sent to the application “ Administrator mailbox ”, Alternative “ Administrator mailbox ” Options include :
1. Mailbox validation
Only the following mailboxes can be verified , If not , You need to create this enterprise mailbox in the mailbox system , It is not supported to specify a specific mailbox for verification ( With ssldun.com For example )
The certificate will send an email with a verification link or a verification button to the verification mailbox selected by the user , Users only need to click to complete the domain name verification SSL certificate .
2. Domain name resolution verification
Set specific txt or cname Record the value to verify the validity of the domain name .
SSL The certificate will give the type of resolution and record value ( In the mailbox TXT value ), Users need to add a record that meets the certification requirements in the domain name control panel . Different certificates will give different analysis records ,RapidSSL The certificate of will need to be added by the user TXT analysis , and Sectigo Users are required to cname analysis , When you add parsing , The system will automatically verify , This process usually occurs in 2 Hour or so , Please be patient .Text Value of and set TXT Value consistent . Finally, click the verification link in the email , Click on verify, The following illustration appears , Indicates that the verification passed , otherwise , Please contact your exclusive customer service .
3. Website control verification
The user will verify the document provided by the certificate provider , Upload it to the root directory of the website applying for the domain name to complete the verification of domain name ownership . If you choose Website control verification , Verify the email received , Put it in the root directory of the website .well-known\pki-validation\ Under the table of contents , Access path :http:// domain name /.well-known/pki-validation/fileauth.txt or :http:// domain name /.well-known/pki-validation/ Random name .txt
边栏推荐
- Analysis of abnormal problems of embedded SD card
- Simple use and difference of symmetric res, AES and asymmetric RSA (JWT)
- Why are there "two abstract methods" in the functional interface comparator?
- Chinese character style transfer --- unsupervised typesetting transmission
- Recommended idling tools | comprehensive comparison of 10 spatial transcriptome deconvolution tools
- On node embedding
- Overview of multi view learning methods based on canonical correlation analysis
- Atcoder beginer contest 261 f / / tree array
- 网络安全——使用Evil Maid物理访问安全漏洞进行渗透
- 深入浅出边缘云 | 2. 架构
猜你喜欢

LeadTools 22 kit LeadTools super set

Outdoor billboards cannot be hung up if you want! Guangzhou urban management department strengthens the safety management of outdoor advertising

Vscode configuration user code snippet (including deletion method)

Exploration of sustainable learning ability to support the application of ecological evolution of Pengcheng series open source large models

EAS environment structure directory

Network security - Web information collection

Kunyu(坤舆) 安装 详解

WSDM 22 | 基于双曲几何的图推荐

WSDM 22 | graph recommendation based on hyperbolic geometry

Paper notes: swing UNET: UNET like pure transformer for medicalimage segmentation
随机推荐
Common doc commands
【论文阅读】Mean teachers are better role models
Data + AI summit 2022 PPT download
Icml2022 | branch reinforcement learning
Simple order management system small exercise
LeadTools 22 kit LeadTools super set
申请了SSL数字证书如何进行域名验证?
Go deadlock problem
网络安全——文件上传竞争条件绕过
Question 10: find numbers in an array with rows and columns in order
网络安全——中间人攻击渗透测试
Implementation of dynamic columns in EAS BOS doc list
C code specification
网络安全——文件上传白名单绕过
Win10 log in with Microsoft account and open all programs by default with administrator privileges: 2020-12-14
CSDN垃圾的没有底线!
网络安全——使用Exchange SSRF 漏洞结合NTLM中继进行渗透测试
Aike AI frontier promotion (7.24)
vscode配置用户代码片段(包括删除方法)
How to generate expected data? Emory University and others' latest "deep learning controllable data generation" review, 52 page PDF, covering 346 documents, comprehensively expounds the controllable g