Skip to main content
uta
uta

Information Security Office

U-Secure

Digital Certificates (CERT) Requests

Certificate Requests | Digital ID 

Easily Renew SSL Certificates here if they are not expired yet.

The ISO issues credentials for SSL certificate creation to those who have a need for it. To create a certificate, log in using these credentials at https://cert-manager.com/customer/InCommon

  • If necessary, you may research the status of certificates for a host by typing the host's domain into the search fields near the top of the page.
  • To create a new certificate, click the 'add' button.
  • If you are generating this certificate for another person to install, enter their email address in the "external requester" field and the certificate will be emailed to them.
  • The following choices of "Server Software" are most commonly appropriate:
    • "Apache/ModSSL" for Apache servers
    • "Microsoft IIS 5.x and later" for Microsoft servers.
  • Use the following guidelines to determine how long the cert should be valid:

Type

Term

Comment

single domain SSL

1, 2, or 3 years

3 years preferred

multiple domain SSL

1, 2, or 3 years

3 years preferred, allows up to 100 hostnames on a single certificate

wildcard SSL

1 year

additional requirements for requester

  • Paste your 2048-bit CSR text in the CSR field and press the Get CN button to minimize the possibility of typing error in the Common Name field
  • Press OK
  • Once the certificate has been create, you will need to approve it. An "approve" button will shortly appear in the search results table, corresponding to your certificate.

 

Digital Certificates are used to prove that you are really who you say you are and more importantly that the content of your Web site, email or server is truly the content that you created and not content that was somehow manipulated or mirrored by unauthorized persons.

The Internet is full of criminals trying to trick unsuspecting people into filling out online forms, responding to emails, or downloading applications that will ultimately lead to loss of sensitive data, infection by malicious code (such as viruses) or denial of services that can cause disruption to servers or applications. That is why it is important to not only identify that the content or services you are viewing online are authentic but to provide a method for others to check the authenticity and integrity of content and systems that you make available online.

Proving your Online Identity can be accomplished by implementing a Digital Certificate, which is a viewable electronic document that conforms to the International Telecommunications Union X.509 specification. It contains the owner's name, public key, expiration date and a serial number as well as digital signature of the owner and issuing organization. However, because of stringent controls on the distribution of Digital Certificates and strict policy in place for those who provide them you will have to complete several tasks to obtain one depending on the kind for which you are applying. Learn more about the different Digital Certificates available please visit the links listed above. Note: Before implementing a Digital Certificate be sure to backup your computer files, especially any work related files, browser favorites or bookmarks and any files saved in the My Documents directory. Once a Digital Certificate is implemented there is no reasonable expectation of retrieving your data should the Digital Certificate be lost without a current data backup. It is recommended that the Digital Certificate also be backed up once it is implemented so that if there is ever a hard drive failure or the computer needs to be serviced then the Digital Certificate will be intact for reinstall.