File-Based Authentication for SSL Certificates

The Trustico® validation system will provide you with a unique verification file containing specific content after you place your order.

You'll need to upload this file to your web server in a specific location :

/.well-known/pki-validation/

This directory path is an industry standard location for domain validation files. Most web servers are configured to serve files from this location by default, making it an ideal place for domain validation files.

Implementation Steps

First, create the required directory structure on your web server using :

mkdir -p /var/www/your-domain/.well-known/pki-validation/

The -p flag ensures that all necessary parent directories are created if they don't already exist. This command will create the full directory path in a single step, saving you time and ensuring proper directory structure.

Next, create the verification file using the unique content provided in your order confirmation :

echo "TRUSTICO_PROVIDED_CONTENT" > /var/www/your-domain/.well-known/pki-validation/verification-file.txt

This command creates a new text file with your unique verification content. The content must match exactly what we provided in your order confirmation - even a single character difference will cause the validation to fail.

The greater than symbol (>) is used to write the content to a new file, overwriting any existing file with the same name.

Set the correct file permissions :

chmod 644 /var/www/your-domain/.well-known/pki-validation/verification-file.txt

The permission setting 644 ensures that the file is readable by everyone but only writable by the owner.

This is the recommended permission setting for web-accessible files as it allows the web server to read and serve the file while maintaining security.

Server Configuration

Some web servers require additional configuration to serve files from the /.well-known/ directory. If you're using Apache, add :

<Directory "/var/www/your-domain/.well-known">
    Allow from all
</Directory>

This Apache configuration ensures that your validation files are accessible to our validation system.

The Directory directive specifically allows access to the .well-known folder while maintaining your other security settings.

If you're using Nginx, add :

location /.well-known {
    allow all;
}

This Nginx configuration block explicitly permits access to the .well-known directory. It's important to add this to your server block configuration to ensure proper validation.

Troubleshooting

If you're experiencing issues with validation, here are some helpful commands to check your setup. First, verify your file permissions :

ls -la /var/www/your-domain/.well-known/pki-validation/

This command displays a detailed list of files in your validation directory, showing permissions, ownership, and file sizes.

Ensure the verification file has the correct permissions (644) and is owned by the appropriate user.

To check your web server logs for any access issues :

tail -f /var/log/apache2/error.log   # For Apache
tail -f /var/log/nginx/error.log    # For Nginx

These commands will show you real-time log entries as our system attempts to validate your domain.

This can be particularly helpful in identifying any permission or configuration issues that might prevent successful validation.

You can test file accessibility using :

curl -v http://your-domain/.well-known/pki-validation/verification-file.txt

The curl command will show you exactly what our validation system sees when attempting to access your verification file.

A successful response should show HTTP/1.1 200 OK and display the file contents.

Security Best Practices

After we've validated your domain and issued your SSL Certificate, we recommend removing the verification file :

rm /var/www/your-domain/.well-known/pki-validation/verification-file.txt

Removing the verification file after successful validation is a security best practice.

While the file contents are not sensitive, maintaining a clean server environment is always recommended.

Alternative Validation Methods

While file-based validation is one of a few recommended methods for domain validation, your Trustico® SSL Certificate can also be validated using DNS-based or e-mail validation methods. More Information 🔗

Ask Trustico® Assistant

For Instant Answers - Start Here When You Have a Question or Need Help

Securing Your Online Store with SSL Certificates

Securing Your Online Store with SSL Certificates

Trustico® provides the SSL Certificate solutions that online retailers need to establish secure connections, protect customer data, and build the trust that drives conversions.

Securing Your Online Store with SSL Certificates

Trustico® provides the SSL Certificate solutions that online retailers need to establish secure connections, protect customer data, and build the trust that drives conversions.

Trustico® Monitoring Protects Your Search Ranking - SEO and SSL Certificates

Trustico® Monitoring Protects Your Search Ranki...

By detecting issues before search engines encounter them, Trustico® Monitoring maintains the consistent security signals that protect and enhance your SEO investment.

Trustico® Monitoring Protects Your Search Ranki...

By detecting issues before search engines encounter them, Trustico® Monitoring maintains the consistent security signals that protect and enhance your SEO investment.

Trustico® Monitoring : Automatic SSL Certificate Expiration Protection

Trustico® Monitoring : Automatic SSL Certificat...

Trustico® Monitoring is specifically designed to prevent SSL Certificate expiration through an intelligent, multi-tier alert system that gives your business the time and information needed to renew SSL Certificates before...

Trustico® Monitoring : Automatic SSL Certificat...

Trustico® Monitoring is specifically designed to prevent SSL Certificate expiration through an intelligent, multi-tier alert system that gives your business the time and information needed to renew SSL Certificates before...

How GREASE from Google Protects the Future of Secure Connections and SSL Certificate Compatibility

How GREASE from Google Protects the Future of S...

By randomly injecting unknown values into Transport Layer Security (TLS) connections, GREASE ensures that servers and network devices properly handle new protocol features rather than rejecting them.

How GREASE from Google Protects the Future of S...

By randomly injecting unknown values into Transport Layer Security (TLS) connections, GREASE ensures that servers and network devices properly handle new protocol features rather than rejecting them.

Delegated Credentials : The New Standard for Securing SSL Certificate Private Keys at Scale

Delegated Credentials : The New Standard for Se...

Delegated Credentials provide an elegant solution to the private key distribution problem by separating the long-lived SSL Certificate from the short-lived credentials used to actually terminate Transport Layer Security (TLS)...

Delegated Credentials : The New Standard for Se...

Delegated Credentials provide an elegant solution to the private key distribution problem by separating the long-lived SSL Certificate from the short-lived credentials used to actually terminate Transport Layer Security (TLS)...

How Time Synchronization Affects SSL Certificate Validation : Why Incorrect Clocks Cause Certificate Errors

How Time Synchronization Affects SSL Certificat...

When a browser or application connects to a server over HTTPS, it compares these timestamps against the current system time to verify that the SSL Certificate is within its valid...

How Time Synchronization Affects SSL Certificat...

When a browser or application connects to a server over HTTPS, it compares these timestamps against the current system time to verify that the SSL Certificate is within its valid...

1 / 6