SSL Checker
Verify SSL certificates, check expiration dates, and analyze the complete certificate chain.
Command Line
Understanding SSL/TLS Certificates
SSL/TLS certificates are the foundation of secure communication on the internet. They establish an encrypted connection between a web server and a browser, ensuring that all data passed between them remains private and tamper-proof. When you see a padlock icon in your browser's address bar, it means the site has a valid SSL/TLS certificate and your connection is encrypted.
Our SSL checker tool connects to any domain on port 443 and analyzes the complete SSL/TLS configuration. It verifies the certificate's validity, checks the entire certificate chain from the leaf certificate through intermediates to the root CA, identifies the supported TLS protocol versions, and assigns an overall security grade based on the configuration.
SSL/TLS Concepts Explained
Certificate Validity
A certificate is valid when it hasn't expired, is issued by a trusted certificate authority, and the domain name matches. Expired or mismatched certificates trigger browser security warnings.
Certificate Chain
The chain of trust links your server's certificate to a root CA through intermediate certificates. A broken chain causes browsers to reject the certificate even if the leaf cert is valid.
TLS 1.3
The latest TLS version with faster handshakes, stronger encryption, and improved privacy. It removes legacy algorithms and reduces connection setup from two round trips to one.
TLS 1.2
Still widely supported and considered secure when configured properly. Supports a broader range of cipher suites than TLS 1.3 but requires careful configuration to avoid weak algorithms.
Security Grading
SSL grades evaluate protocol support, certificate validity, chain completeness, and cipher strength. An A+ grade requires modern TLS, a valid chain, and no support for deprecated protocols.
Subject Alternative Names
SANs allow a single certificate to cover multiple domain names and subdomains. Wildcard certificates (*.example.com) use SANs to secure all subdomains under a domain.