How does SSL certificate work?

Posted on 2006-04-25
Last Modified: 2010-03-19
I built some certificate servers by myself for our exchange2003 webemail and rpc over http purpose. I thought I knew the answer already, but I confused again.

From my understanding, certificate is an encryption method, and also for ensuring the identity of a remote computer. But when I am trying to access an ssl site, there is a security dialog box showing up with ! sign as below:

1): The security certificate was issued by a company you have not chosen to trust. View the certificate to determine whether you want to trust the certifying authority
2): The name on the security certificate is invalid or does not match the name of the site

I'm kind of understand the first one, but what is the second one, I know how to fix it by match the dns name. but what about if I don't do that, but just click OK button to enter the site. looks like I can still access the site without any problem. so my question is what is the purpose of that.

Thank you very much,
Question by:JerryJay
    LVL 15

    Expert Comment

    by:Naser Gabaj
    Greetings JerryJay,

    Can this help:

    Good Luck!

    LVL 27

    Expert Comment

    LVL 26

    Expert Comment

    (2) when you create your the "common name" spot you should put the fully qualified dns name of the server (as you will be referring to it). Meaning... if if your OWA site is '" you should put that in the common name field even if you have other names for that server.  The name mismatch occurs when the hostname of the site in the browser doesnt match the common name field in the cert. They have to match exactly or else use a wildcard cert (*  

    (1) You get a warning about not being from a trusted CA because you created the cert yourself. Anyone can create an ssl certificate for any site. But unless it was issued by a valid, known and trusted certificate authority most browsers will give you that message. The traffic is just as encrypted and secure, the user only has an extra step to proceed.

    Author Comment

    It is great, I very much appreciate for all the helps.

    LVL 15

    Accepted Solution

    >>It is great, I very much appreciate for all the helps
    well, what is that mean, if any answer helped you, then you should accept it, if more than one then split the points.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
    ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now