?
Solved

SSL Providers: Independent Compatibility

Posted on 2011-09-20
1
Medium Priority
?
322 Views
Last Modified: 2012-05-12
I am trying to determine which SSL certificate would have the best reach, without being rejected by browsers.

I must choose from of of the following:
 - Comodo
 - GeoTrust
 - Thawte
 - Trustwave

They ALL claim 99% browser compatibility, however it is possible that they all define browser compatibility differently.

Do you know of any INDEPENDENT comparisons?

0
Comment
Question by:hankknight
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 12

Accepted Solution

by:
freshcontent earned 2000 total points
ID: 36568401
hankknight - I don't know of any independent comparisons about SSL certs.

I do know that GeoTrust & Thawte have had their root CAs in browsers since around the year 2000.

I don't know how long Trustwave & Comodo have had their root CAs in browsers.

Can you look at your traffic logs for your website(s), and then base your decision on the 99% of browsers that you have coming to you?
If you have 99% of your users coming from InternetExplorer, Chrome, and Firefox, you should be good with Thawte & GeoTrust.

I just looked in the list of Certificate Authorities for Google Chrome, and I found Thawte, GeoTrust, & Comodo.  I didn't find Trustwave, but perhaps it is under another name?

On Chrome -> they are under Preferences -> Under The Hood -> Manage Certificates -> System Roots.

Hope this level of detail helps.

0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

#SSL #TLS #Citrix #HTTPS #PKI #Compliance #Certificate #Encryption #StoreFront #Web Interface #Citrix XenApp
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question