You are here: Administration > Tools - database, server-command scripting, and APIs (Advanced) > Generate an SSL/HTTPS key > Use a certificate signed by a trusted authority

Use a certificate signed by a trusted authority

The advantage of a signed certificate is that it eliminates the browser warning, "The security certificate presented by this website was not issued by a trusted certificate authority."

Large organizations might want to use their own SSL keyIn typical public key infrastructure (PKI) arrangements, a digital signature from a certificate authority (CA) attests that a particular public key certificate is valid (i.e., contains correct information). An SSL key can be either a public key (can be disseminated publicly) or a private key (known only to the owner).. This key can be either

  • signed by a commercial certificate authority (CA) that is recognized by all popular web browsers. A complete list is in Windows under Control Panel > Internet Options > Content > Certificates > Trusted Root Certification Authorities.
  • created by an organization that operates its own certificate authority that is recognized by their users' web browsers by way of a root certificate that is installed into all users' web browsers.

The process to use a certificate signed by a trusted authority depends on whether you want tor:

Note:

This is a technically complex area and there is an assumed level of experience with SSL certificates in general.