What Is an SSL Certificate?
An SSL certificate is a digital credential that does two things at once: it enables encrypted HTTPS communication between a user's browser and a web server, and it verifies the server's identity. Without it, any data sent between browser and server — passwords, payment details, session tokens — travels as plain text that anyone on the network could intercept and read.
When you see https:// in the address bar and a padlock icon, you're looking at a connection protected by an SSL certificate. Every major browser shows a warning — a "Not Secure" label or a full-page block — when a site's certificate is missing, expired, or misconfigured.
💡 A note on naming: "SSL" stands for Secure Sockets Layer, the original protocol from the 1990s. It was replaced by TLS (Transport Layer Security) in 1999. All versions of SSL have known security vulnerabilities and are disabled in modern servers. But the industry still calls them "SSL certificates" — you'll hear both terms used interchangeably. For the full story, see SSL vs TLS: What's the Difference and Why It Matters.
How an SSL/TLS Connection Works
When your browser connects to a site over HTTPS, a process called the TLS handshake happens in milliseconds — before any part of your request is sent:
- Your browser says hello — it tells the server which TLS versions and encryption algorithms (cipher suites) it supports.
- The server sends its certificate — the certificate includes the server's public key and is digitally signed by a Certificate Authority (CA).
- Your browser validates the certificate — it checks the expiration date, the domain name, and that the certificate was signed by a CA it trusts.
- A shared encryption key is established — using asymmetric cryptography, browser and server negotiate a one-time session key that encrypts all further communication.
- Data flows securely — from this point on, everything is encrypted using the session key and is unreadable to anyone in between.
The certificate itself doesn't encrypt the data. Its job is to provide a trusted cryptographic identity so the encrypted channel can be established safely.
The 3 Types of SSL Certificates
SSL certificates differ in how thoroughly the issuing Certificate Authority (CA) has verified the identity behind them. There are three levels:
Which type do you need? For most web applications and developer projects, a DV certificate from Let's Encrypt is sufficient. It provides the same encryption strength as OV or EV. The difference is in identity verification, not security level. Let's Encrypt (DV, free, auto-renewing every 90 days) is the right choice for the vast majority of use cases.
What's Inside an SSL Certificate?
SSL certificates use the X.509 standard format. When you inspect one, you'll see several structured fields:
You can inspect all of these fields for any domain — expiration date, issuer, SANs, chain status, and more — using the Authgear SSL Checker. Just enter any domain and click Inspect.
Subject Alternative Names (SANs): Why They Matter
The SANs field defines every domain and subdomain that the certificate covers. A single certificate can include:
- An exact domain:
authgear.com - A wildcard:
*.authgear.com(coverswww,api,docs, and any other subdomain) - Multiple unrelated domains on the same certificate
If your app makes API calls to a subdomain not listed in the certificate's SANs, you'll get an SSL error even if the certificate itself is perfectly valid. Always check the SANs when debugging SSL errors on subdomains or after adding new subdomains to your infrastructure.
What Happens When an SSL Certificate Expires?
The moment a certificate's validity period ends, browsers show a full-page block: "Your connection is not private." Most users won't proceed. The site is effectively down for real-user traffic.
This happens without warning and with no grace period. A certificate that was valid at 11:59 PM is expired at midnight.
⚠️ A common production incident: Your Let's Encrypt auto-renewal script runs via cron. You update your server firewall and accidentally block port 80 — required for the HTTP-01 challenge. Renewal silently fails. 90 days later, your certificate expires at 3 AM, and users start hitting SSL errors. This is one of the most preventable — and most common — causes of HTTPS downtime.
The industry is moving toward shorter certificate lifetimes. Apple and Google are pushing the CA/Browser Forum toward 90-day maximums for all certificate types. Auto-renewal isn't optional — it's table stakes.
How to Check Your SSL Certificate
Option 1: Authgear SSL Checker (no setup needed)
Visit the Authgear SSL Checker, enter your domain, and get a full breakdown: certificate fields, expiration date, SANs, issuer, and full certificate chain status — all in one view, no login required.
🔒 Pro Tip: Run the SSL Checker before every production deployment to confirm your certificate is valid, the chain is complete, and all subdomains are covered by the SANs. For more on chains, see our guide on SSL certificate chains and how to fix a broken one.
Option 2: OpenSSL (command line)
SSL/TLS in Authentication Systems
SSL certificates aren't just about the padlock on a marketing site. In authentication systems, they form a foundational security layer:
- Login pages must be HTTPS — submitting credentials over plain HTTP exposes them to network interception. Modern browsers mark HTTP login forms as "Not Secure."
- OAuth requires HTTPS redirect URIs — Google, Apple, GitHub, and most OAuth providers reject redirect URIs that aren't HTTPS. Your auth flow will fail without a valid certificate.
- API clients reject invalid certificates by default — modern HTTP libraries in every major language will refuse connections to servers with expired or misconfigured certificates. This affects server-to-server API calls, not just browser requests.
- mTLS (mutual TLS) — an advanced pattern where both client and server present certificates to each other. Used in zero-trust architectures, internal service meshes, and high-security API endpoints.
Authgear handles HTTPS enforcement automatically across all authentication endpoints. If you're building your own auth layer, properly configured SSL certificates are your starting point. Next, learn about SSL certificate chains — the leading cause of silent SSL misconfigurations that pass local testing but break in production.
SSL Certificate Checklist
- Certificate is from a trusted CA (Let's Encrypt, DigiCert, Sectigo, etc.)
- Certificate has not expired — check expiry date
- Domain in the Subject field matches the domain you're serving
- SANs cover all subdomains you're using
- Certificate chain is complete (intermediate CA certificates are served)
- Signature algorithm is SHA-256 or higher (not MD5 or SHA-1)
- Auto-renewal is configured and monitored



