About The Validation Procedure

The validation procedure is a fundamental requirement for all SSL Certificates issued by publicly trusted Certificate Authorities (CAs). Before any SSL Certificate can be issued, the Certificate Authority (CA) must verify that the applicant has legitimate control over the domain and, in some cases, that the organization behind the request is a verified legal entity. This process protects the integrity of the internet by preventing unauthorized parties from obtaining SSL Certificates for domains they do not own.

Trustico® offers three types of SSL Certificates, each with a different level of validation : Domain Validation (DV), Organization Validation (OV), and Extended Validation (EV). The type of SSL Certificate you purchase determines the validation process that must be completed before issuance. Domain Validation (DV) SSL Certificates require only proof of domain control, while Organization Validation (OV) and Extended Validation (EV) SSL Certificates require additional business verification steps.

Select the validation type that applies to your SSL Certificate order.

DV Validation OV Validation EV Validation

The following sections provide an overview of each validation type, the methods available, and the requirements involved.

Domain Validation (DV) Requirements

Domain Validation (DV) SSL Certificates are authenticated by verifying that the applicant has control over the domain for which the SSL Certificate is being requested. This process is known as Domain Control Validation (DCV) and is an automated procedure that can typically be completed within minutes. Domain Validation (DV) SSL Certificates do not require any business verification, telephone calls, or documentation.

Trustico® supports four Domain Control Validation (DCV) methods for Domain Validation (DV) SSL Certificates : Approver E-Mail, Domain Name System (DNS) CNAME record, Domain Name System (DNS) TXT record, and HTTP or HTTPS file based verification. Once you complete one of the validation methods, your SSL Certificate is issued automatically by the Certificate Authority (CA). Discover Domain Validation (DV) SSL Certificates 🔗

Approver E-Mail Verification Method

E-Mail verification is the most widely used Domain Control Validation (DCV) method. When you order a Domain Validation (DV) SSL Certificate, an approver e-mail address is chosen during the ordering process. The Certificate Authority (CA) sends an Approver E-Mail to the designated address containing a confirmation link and a verification code.

The following pre-approved e-mail addresses can be used for Domain Control Validation (DCV) : admin@yourdomain.com, administrator@yourdomain.com, hostmaster@yourdomain.com, webmaster@yourdomain.com, and postmaster@yourdomain.com. These addresses are defined by the Certificate Authority / Browser Forum (CA/Browser Forum) as acceptable for Domain Control Validation (DCV) purposes.

Important : Applicants must choose one of the five pre-approved e-mail addresses listed above to prove that they administer the domain name for which the SSL Certificate is being ordered. E-Mail addresses at other domains or personal e-mail addresses cannot be used for Domain Control Validation (DCV).

The recipient must follow the instructions in the e-mail, typically by clicking the confirmation link and entering the verification code provided. Since Domain Validation (DV) does not require extensive documentation or manual review, the process can often be completed within minutes of receiving the Approver E-Mail.

If none of the standard pre-approved e-mail addresses are available for your domain, you may be able to configure a _validation-contactemail Domain Name System (DNS) TXT record for your domain. This record allows the Certificate Authority (CA) to send the validation e-mail to an alternative address that you specify within your Domain Name System (DNS) settings. Learn About E-Mail Address Handling for SSL Certificates 🔗

Warning : WHOIS-based e-mail validation is being deprecated in accordance with Ballot SC-80v3. After June 15, 2025, only the five pre-approved e-mail addresses or a contact listed in the _validation-contactemail Domain Name System (DNS) record for the domain will be accepted for e-mail based Domain Control Validation (DCV).

Domain Name System (DNS) CNAME Record Verification Method

Domain Name System (DNS) CNAME record verification is an alternative Domain Control Validation (DCV) method that does not require access to any of the pre-approved e-mail addresses. This method requires you to create a specific CNAME record in your domain's Domain Name System (DNS) settings, which proves your control over the domain and allows the SSL Certificate issuance process to proceed.

The CNAME record is constructed using cryptographic hashes derived from the Certificate Signing Request (CSR) associated with your SSL Certificate order. Specifically, an MD5 hash and a SHA-256 hash are generated from the DER-encoded Certificate Signing Request (CSR). The host portion of the CNAME record is an underscore followed by the MD5 hash at your domain, and the target is the SHA-256 hash split into two 32-character labels followed by sectigo.com as the canonical name. A unique value may also be included in the record for one-time use verification.

After placing your SSL Certificate order, you can switch to CNAME validation by logging into the Trustico® tracking system and changing the validation preference from Approver E-Mail to CNAME within your order details. Trustico® will provide the exact CNAME record values that need to be added to your Domain Name System (DNS) configuration.

Access the tracking system to change your validation method or check your order status.

Tracking & Management

Your Certificate Authority (CA) Reference number is required to access the tracking system. Learn About The Trustico® Tracking System 🔗

Domain Name System (DNS) TXT Record Verification Method

Domain Name System (DNS) TXT record verification is another Domain Name System (DNS) based Domain Control Validation (DCV) method supported by the Certificate Authority (CA). With this approach, a unique random value token is provided at the time of your SSL Certificate order. You must then create a Domain Name System (DNS) TXT record with the host set to _pki-validation at your domain and the TXT value set to the random token provided.

The token provided for Domain Name System (DNS) TXT validation is valid for 30 days from the date of issuance and may only be used once per SSL Certificate order. If the token expires before the record is verified by the Certificate Authority (CA), a new token will need to be generated by resubmitting the validation request through the Trustico® tracking system.

Important : Each Domain Name System (DNS) TXT validation token is unique to a specific SSL Certificate order. Reusing a token from a previous order will not work. Always use the exact token value provided for your current order through the Trustico® tracking system.

HTTP and HTTPS File Based Verification Method

File based verification requires the domain owner to upload a specific verification file to a designated directory on the web server. The Certificate Authority (CA) will then check for the presence of this file at a known location to confirm domain ownership. This method is commonly used by web administrators who have direct access to their website's file system.

To complete file based validation, you will need to create a text file named using the MD5 hash value derived from your Certificate Signing Request (CSR). The contents of this file must include the SHA-256 hash of your Certificate Signing Request (CSR) on the first line, the text "sectigo.com" on the second line, and optionally a unique value on the third line. The file must be placed at the following path on your web server : http://yourdomain.com/.well-known/pki-validation/ or the HTTPS equivalent at https://yourdomain.com/.well-known/pki-validation/ using port 80 or port 443 respectively.

The verification file must be plain ASCII text without a Byte Order Mark (BOM). Both CRLF and LF line endings are acceptable. The web server must be publicly accessible on port 80 for HTTP or port 443 for HTTPS at the time the Certificate Authority (CA) performs the validation check. Discover File Based Authentication for SSL Certificates 🔗

Warning : File based validation cannot be used for Wildcard SSL Certificates. If you are ordering a Wildcard SSL Certificate, you must use either Approver E-Mail or a Domain Name System (DNS) based validation method instead.

Request Tokens and Uniqueness Requirements

Every Domain Control Validation (DCV) request uses a request token to verify domain ownership. This request token is composed of the SHA-256 hash derived from the DER-encoded Certificate Signing Request (CSR), the string "sectigo.com" as an identifier, and optionally a unique value of up to 20 alphanumeric characters.

Request tokens must be unique for each SSL Certificate order. If you reuse a Certificate Signing Request (CSR) from a previous order, the validation may fail unless a unique value or distinguishing attribute is included in the new request. Trustico® recommends generating a fresh Certificate Signing Request (CSR) for each new SSL Certificate order to avoid potential issues with token uniqueness. Learn About Certificate Signing Requests (CSR) 🔗

Organization Validation (OV) Requirements

Organization Validation (OV) SSL Certificates provide a higher level of trust than Domain Validation (DV) by requiring strict authentication of the organization behind the domain. In addition to completing Domain Control Validation (DCV) using one of the methods described above, the Certificate Authority (CA) must also verify that the organization is a legitimate legal entity.

During the ordering process you must ensure the organization name you specify is an active entity and can be confirmed by the government authority responsible for registering entities within the specific jurisdiction. An exact match between the organization name specified during the order process and the name recorded with the relevant government authority is required.

Organization Validation (OV) SSL Certificates require manual verification by the Certificate Authority (CA), including verification of business registration documents and a telephone call to confirm the order. The validation process typically takes several business days depending on the availability of the required documentation and the responsiveness of the administrative contact. Discover Organization Validation (OV) SSL Certificates 🔗

View the Organization Validation (OV) information page or the detailed validation guide for complete requirements.

OV Information OV Detailed Validation Guide

The detailed validation guide explains exactly what documentation and verification steps are required for Organization Validation (OV) SSL Certificates.

Extended Validation (EV) Requirements

Extended Validation (EV) SSL Certificates achieve the highest level of consumer trust through the strictest authentication standards of any SSL Certificate. The Extended Validation (EV) verification guidelines require the Certificate Authority (CA) to obtain and verify multiple pieces of identifying information about the organization, including its legal, physical, and operational existence.

An Extended Validation (EV) SSL Certificate offers more than just encryption. It enables the organization behind the website to present a validated identity to website visitors, demonstrating that the entity has been thoroughly verified by the Certificate Authority (CA). This level of verification provides the strongest assurance that the website is operated by a legitimate organization.

The use of an Extended Validation (EV) SSL Certificate prevents fraudulent activity because the Certificate Authority (CA) will only issue an Extended Validation (EV) SSL Certificate to a legitimate entity after thorough verification of legal standing, physical address, and operational status. To ensure your SSL Certificate request is processed quickly, you will be required to provide authentication documents promptly when requested. Discover Extended Validation (EV) SSL Certificates 🔗

View the Extended Validation (EV) information page or the detailed validation guide for complete requirements.

EV Information EV Detailed Validation Guide

The detailed validation guide explains exactly what documentation and verification steps are required for Extended Validation (EV) SSL Certificates.

Manual Verification for Organization Validation (OV) and Extended Validation (EV)

Organization Validation (OV) and Extended Validation (EV) SSL Certificates require manual verification by the Certificate Authority (CA). When an SSL Certificate product requires manual verification, certain requirements must be met and will be stated within the product information pages on the Trustico® website.

Sample documents that may be required to support the SSL Certificate application include Articles of Incorporation, Fictitious Name or Doing Business As documents, Business Licensing, and other official documentation proving the organization's legal existence. The administrative contact of the order will be contacted for further information if documentation is required.

A verification telephone call with the administrative contact will usually be required before issuance. The telephone number must be publicly listed in an approved telephone directory or verifiable through a third-party source such as Dun and Bradstreet.

Tip : It is recommended that the organization be listed at Dun and Bradstreet, as it is one of the world's leading sources of commercial information and insight on businesses. Certificate Authorities (CAs) rely on Dun and Bradstreet to verify organization details during the Organization Validation (OV) and Extended Validation (EV) process.

The detailed validation guides explain exactly what is required for successful verification of Organization Validation (OV) and Extended Validation (EV) SSL Certificates.

OV Detailed Validation Guide EV Detailed Validation Guide

Following the detailed validation guides will help ensure your SSL Certificate is issued as quickly as possible.

Validation for Multi-Domain and Wildcard SSL Certificates

All SSL Certificate types, including Single Domain SSL Certificates, Wildcard SSL Certificates, and Multi-Domain SSL Certificates or Unified Communications Certificates (UCC), require Domain Control Validation (DCV). For Multi-Domain SSL Certificates, each Fully Qualified Domain Name (FQDN) included on the SSL Certificate must be validated individually. Different Domain Control Validation (DCV) methods can be used for different domains within the same Multi-Domain SSL Certificate order.

Important : The Certificate Authority (CA) no longer considers proof of control of www.yourdomain.com as also proving control of yourdomain.com. Each subdomain must be validated individually. However, validating control of the base domain yourdomain.com is sufficient for the validation of an SSL Certificate to contain both yourdomain.com and www.yourdomain.com.

For Wildcard SSL Certificates, file based validation is not available. Wildcard SSL Certificate orders must use either Approver E-Mail or a Domain Name System (DNS) based validation method. The Trustico® tracking system provides detailed status information for each domain on a Multi-Domain SSL Certificate, allowing you to monitor which domains have been validated and which still require action. Discover Our Multi-Domain SSL Certificate Options 🔗

Order Queuing and Fraud Prevention

In the event an authentication procedure fails, or the system suspects possible fraudulent activity, the SSL Certificate order may be queued for manual review. Occasionally, orders are also randomly queued for manual review as part of the Certificate Authority's quality assurance procedures.

Authentication engines are programmed to automatically flag certain orders for a quality review before issuance. The system evaluates specific information within new and reissuance orders, and orders from certain countries or containing certain keywords may be flagged for additional scrutiny. This process helps to protect both the applicant and the wider internet community from fraudulent SSL Certificate issuance. Learn About Fraud Prevention for SSL Certificates 🔗

Best Practices for the Validation Process

Following best practices during the validation process helps to ensure a smooth and timely SSL Certificate issuance. Generating a unique Certificate Signing Request (CSR) for each SSL Certificate order prevents token reuse issues and ensures that Domain Control Validation (DCV) proceeds without complications. If you are using a Domain Name System (DNS) based validation method, verifying that your Domain Name System (DNS) records have propagated correctly before submitting the validation request will help avoid unnecessary delays.

Configuring Certification Authority Authorization (CAA) records in your Domain Name System (DNS) is also recommended. Certification Authority Authorization (CAA) records allow you to specify which Certificate Authorities (CAs) are permitted to issue SSL Certificates for your domain, adding an additional layer of security against unauthorized issuance.

Tip : Completing Domain Control Validation (DCV) promptly after placing your order helps to avoid delays. For Organization Validation (OV) and Extended Validation (EV) SSL Certificates, preparing your business documentation in advance and ensuring your organization's telephone number is publicly listed will help the Certificate Authority (CA) complete verification as quickly as possible.

Trustico® provides all the tools and guidance needed to complete the validation process efficiently through the Trustico® order tracking system. If you need assistance at any point during the validation process, the Trustico® support team is available to help. Explore Our Reasons to Choose Trustico® for SSL Certificates 🔗

Most Popular Questions

Understand the different SSL Certificate validation types offered by Trustico® and learn what requirements must be met for Domain Validation (DV), Organization Validation (OV), and Extended Validation (EV) SSL Certificates, including all available Domain Control Validation (DCV) methods.

What Types of SSL Certificate Validation Does Trustico® Offer?

Trustico® offers three types of SSL Certificate validation : Domain Validation (DV), Organization Validation (OV), and Extended Validation (EV). Domain Validation (DV) is the quickest to obtain and requires only proof of domain control. Organization Validation (OV) requires verification of the business entity behind the domain. Extended Validation (EV) provides the highest level of consumer confidence through the strictest authentication standards of any SSL Certificate.

What Domain Control Validation (DCV) Methods Are Available for Domain Validation (DV) SSL Certificates?

Trustico® supports four Domain Control Validation (DCV) methods : Approver E-Mail verification, Domain Name System (DNS) CNAME record verification, Domain Name System (DNS) TXT record verification, and HTTP or HTTPS file based verification. The process is automated and can typically be completed within minutes without any business documentation or telephone calls. Once you complete one of the validation methods, your SSL Certificate is issued automatically by the Certificate Authority (CA).

Which E-Mail Addresses Can Be Used for Approver E-Mail Validation?

The Certificate Authority (CA) accepts five pre-approved e-mail addresses : admin@yourdomain.com, administrator@yourdomain.com, hostmaster@yourdomain.com, webmaster@yourdomain.com, or postmaster@yourdomain.com. If none of these are available, you may configure a _validation-contactemail Domain Name System (DNS) TXT record for your domain to specify an alternative address. WHOIS-based e-mail validation is being deprecated in accordance with Ballot SC-80v3 after June 15, 2025.

How Does Domain Name System (DNS) CNAME Record Validation Work?

Domain Name System (DNS) CNAME validation requires you to create a CNAME record constructed using cryptographic hashes derived from the Certificate Signing Request (CSR) associated with your SSL Certificate order. The host portion uses an MD5 hash and the target uses a SHA-256 hash split into two 32-character labels followed by sectigo.com. After placing your order, you can switch to CNAME validation through the Trustico® tracking system by changing the preference from Approver E-Mail to CNAME.

How Does Domain Name System (DNS) TXT Record Validation Work?

The Certificate Authority (CA) provides a unique random value token at the time of your SSL Certificate order. You create a Domain Name System (DNS) TXT record with the host set to _pki-validation at your domain and the TXT value set to the provided token. The token is valid for 30 days and may only be used once per SSL Certificate order. If the token expires before verification is completed, a new token must be generated through the Trustico® tracking system.

Can File Based Validation Be Used for Wildcard SSL Certificates?

No. File based validation cannot be used for Wildcard SSL Certificates. If you are ordering a Wildcard SSL Certificate, you must use either Approver E-Mail or a Domain Name System (DNS) based validation method such as CNAME or TXT record verification. This restriction is enforced by the Certificate Authority (CA) and applies to all Wildcard SSL Certificate orders.

Why Must Request Tokens Be Unique for Each SSL Certificate Order?

Every Domain Control Validation (DCV) request uses a request token composed of the SHA-256 hash from the Certificate Signing Request (CSR) and the identifier sectigo.com. These tokens must be unique for each SSL Certificate order. Reusing a Certificate Signing Request (CSR) from a previous order may cause validation to fail. Trustico® recommends generating a fresh Certificate Signing Request (CSR) for each new SSL Certificate order to avoid potential issues with token uniqueness.

What Are the Requirements for Organization Validation (OV) SSL Certificates?

Organization Validation (OV) SSL Certificates require Domain Control Validation (DCV) plus strict authentication of the organization behind the domain. The organization must be an active registered entity confirmed by the relevant government authority, with an exact name match required. The Certificate Authority (CA) will verify business registration documents and conduct a telephone call with the administrative contact to confirm the order before issuance.

How Does Extended Validation (EV) Differ from Other SSL Certificate Types?

Extended Validation (EV) SSL Certificates require the strictest authentication standards, including verification of the organization's legal, physical, and operational existence. The Certificate Authority (CA) must obtain and verify multiple pieces of identifying information. This thorough verification process provides the highest level of consumer trust and prevents fraudulent entities from obtaining Extended Validation (EV) SSL Certificates.

What Documents Might Be Required for Organization Validation (OV) or Extended Validation (EV) SSL Certificates?

Documents that may be required include Articles of Incorporation, Fictitious Name or Doing Business As documents, Business Licensing, and other official documentation proving the organization's legal existence. A verification telephone call with the administrative contact is usually required, and the telephone number must be publicly listed in an approved telephone directory or verifiable through a third-party source such as Dun and Bradstreet.

How Can the Validation Method Be Switched After Placing an Order?

Log into the Trustico® tracking system after submitting your order to change your validation preference. You can switch between Approver E-Mail, Domain Name System (DNS) CNAME, and Domain Name System (DNS) TXT validation methods within your order details. Your Certificate Authority (CA) Reference number is required to access the tracking system.

Must Both www and Non-www Versions of a Domain Be Validated Separately?

Validating control of yourdomain.com is sufficient for an SSL Certificate containing both yourdomain.com and www.yourdomain.com. However, validating only www.yourdomain.com no longer proves control of the base domain. The Certificate Authority (CA) treats each subdomain as a separate entity, so if you only validate the www version, you will also need to validate the base domain separately.

Why Might an SSL Certificate Order Be Queued for Manual Review?

Orders may be queued for manual review if an authentication procedure fails, the system suspects possible fraudulent activity, or as part of random quality assurance reviews. Authentication engines are programmed to automatically flag certain orders based on specific information within the request. Orders from certain countries or containing certain keywords may trigger additional scrutiny before issuance.

What Best Practices Should I Follow During the Validation Process?

Trustico® recommends generating a unique Certificate Signing Request (CSR) for each SSL Certificate order to prevent token reuse issues. If using Domain Name System (DNS) based validation, verify that your records have propagated correctly before submitting the validation request. Configuring Certification Authority Authorization (CAA) records adds an additional layer of security. For Organization Validation (OV) and Extended Validation (EV) orders, preparing business documentation in advance and ensuring the organization's telephone number is publicly listed will help the Certificate Authority (CA) complete verification quickly.

Ask Trustico® Assistant

For Instant Answers - Start Here When You Have a Question or Need Help

DNSSEC Validation Enforcement for SSL Certificate Issuance - March 2026

DNSSEC Validation Enforcement for SSL Certifica...

Starting in March 2026, the way Certificate Authorities (CA) handle Domain Name System Security Extensions (DNSSEC) during SSL Certificate issuance is changing significantly.

DNSSEC Validation Enforcement for SSL Certifica...

Starting in March 2026, the way Certificate Authorities (CA) handle Domain Name System Security Extensions (DNSSEC) during SSL Certificate issuance is changing significantly.

SSL Certificate Validity Periods Are Changing to 200 Days

SSL Certificate Validity Periods Are Changing t...

The reduction in SSL Certificate validity periods is driven by the need to regularly confirm that the Certificate holder is still entitled to use the SSL Certificate. No new Certificate...

SSL Certificate Validity Periods Are Changing t...

The reduction in SSL Certificate validity periods is driven by the need to regularly confirm that the Certificate holder is still entitled to use the SSL Certificate. No new Certificate...

SSL Certificate Works on WWW but Not Root Domain : Troubleshooting Guide

SSL Certificate Works on WWW but Not Root Domai...

Several server configuration problems can cause SSL Certificates to work on the www version but fail on the non-www version of a domain. Understanding these causes helps identify the specific...

SSL Certificate Works on WWW but Not Root Domai...

Several server configuration problems can cause SSL Certificates to work on the www version but fail on the non-www version of a domain. Understanding these causes helps identify the specific...

Understanding SSL Certificate File Formats and Extensions

Understanding SSL Certificate File Formats and ...

SSL Certificate files can be broadly categorized into three main types based on how the data is encoded and stored. Understanding these categories will help you identify which format you...

Understanding SSL Certificate File Formats and ...

SSL Certificate files can be broadly categorized into three main types based on how the data is encoded and stored. Understanding these categories will help you identify which format you...

Understanding the AutoCSR Service for SSL Certificate Orders

Understanding the AutoCSR Service for SSL Certi...

Learn how AutoCSR works, compare it to hosting company practices, find out when automated credential generation is appropriate versus generating your own CSR. Covers security considerations including the Trustico® non-retention...

Understanding the AutoCSR Service for SSL Certi...

Learn how AutoCSR works, compare it to hosting company practices, find out when automated credential generation is appropriate versus generating your own CSR. Covers security considerations including the Trustico® non-retention...

What Is Encrypted Server Name Indication (ESNI)? How Encrypted Client Hello (ECH) Protects Your Privacy

What Is Encrypted Server Name Indication (ESNI)...

The limitations of Encrypted Server Name Indication (ESNI) led to its evolution into Encrypted Client Hello (ECH) in 2020. Encrypted Client Hello (ECH) addresses the shortcomings of its predecessor while...

What Is Encrypted Server Name Indication (ESNI)...

The limitations of Encrypted Server Name Indication (ESNI) led to its evolution into Encrypted Client Hello (ECH) in 2020. Encrypted Client Hello (ECH) addresses the shortcomings of its predecessor while...

1 / 6