Submitting a TLS Certificate

This article is only applicable if you would like to leverage a previously purchased TLS certificate to serve HTTPS traffic over the CDN. The recommended approach for HTTPS support is to allow CDN personnel to acquire a TLS certificate on your behalf.
Learn more.

A prerequisite for submitting a TLS certificate is to contact your CDN account manager. Your CDN account manager will enable the SSL Certificate Submission page (Tools menu | SSL Certificate Submission). Use this page to submit a TLS certificate by providing the following items:

Item Description

Intermediate Certificate

An intermediate certificate is provided by a CA.

More Information:

An intermediate certificate proves ownership over a public key and establishes a chain of trust through which the requester's device can verify that the TLS certificate can be traced back to a trusted source (i.e., Root CA). In other words, it proves that your chosen CA is trusted by one of the root CAs.

The use of an intermediate certificate is one of the security measures taken by CAs to ensure the integrity of the keys used by root certificates.

Public Key

A certificate containing a public key is provided by a CA. A public key allows a requester to verify the TLS certificate's digital signature.

Private Key

A private key should be stored on the server where the CSR was generated. This private key allows the server to encrypt/decrypt communication with the client.

PEM Format

Please provide certificate and keys in PEM format.

Key information:

To submit a TLS certificate

  1. Gather the following items:

    • Intermediate certificate
    • Public key
    • Private key
  2. Perform the following:

    • Verify that the PEM-encoded public key certificate matches the private key.

      Learn how.

    • Verify that the CA signed the public key certificate.

      Learn how.

  3. Open the intermediate certificate provided by the CA in a text editor.
  4. Navigate to the SSL Certificate Submission page. If this page is unavailable, please contact your CDN account manager. ClosedHow?From the main menu, navigate to Tools | SSL Certificate Submission.

  5. Copy and paste the intermediate certificate into the Intermediate Certificate option.

  6. Open the public key certificate provided by the CA in a text editor.
  7. Copy and paste the public key certificate into the Public Key option.

  8. Open the private key in a text editor.
  9. Copy and paste the private key into the Private Key option.
  10. Click Submit.

To verify that the public key certificate and the private key match

  1. Run the following two OpenSSL commands.

    openssl x509 -noout -modulus -in CertificateName.crtReplace this term with the public key certificate's file name. | openssl md5

    openssl rsa -noout -modulus -in private.keyReplace this term with the private key's file name. | openssl md5

  2. Verify that the above two commands generate the same result.

To verify that the CA signed the public key certificate

Run the following command:

Consider the public key certificate verified when the above command returns OK. All other results indicate that the public key certificate has not been properly signed.

To verify the public key certificate's attributes

Run the following command to verify the certificate's common name and issue\expire

openssl x509 -noout -text -in CertificateName.crtReplace this term with the public key certificate's file name. | grep -E "Subject:" && openssl x509 -noout -text -in CertificateName.crtReplace this term with the public key certificate's file name. | grep -E "Validity" -A 2 && openssl x509 -noout -text -in CertificateName.crtReplace this term with the public key certificate's file name. | grep -E "DNS:" -B 1