SSL (TLS) Certificates

Protect data exchanges in your organization website

SSL Certificates are fundamental resources and should be managed using the best tools

SSL Certificates are a fundamental tool for the security of any company or organization website. Installing an SSL Server Certificate on your website means you can enable the TLS protocol (Transport Layer Security), a standard solution for guaranteeing the security of online transactions. Using TLS enables two key security mechanisms:

  • Secure channel: all the data transferred between the website and the end user is encrypted (the session is fully encrypted);
  • Server authentication: the user can check the website's authenticity and the identity of the organization managing it.

Actalis not only offers a comprehensive range of SSL Certificates, but also provides its enterprise customers with centralized, automated management solutions.

Find out more about our solutions

The benefits of Actalis SSL Certificate solutions

The range of SSL Certificates offered by Actalis includes all 3 categories (DV, OV and EV) and types (Single Domain, SAN and Wildcard). Whichever category is used, installing and activating the certificate encrypts the communication channel between the end user and the website, displaying the padlock symbol in the browser address bar and removing security warnings while browsing the website. For OV and EV certificates, the identity of the company or organization that manages the website is also certified and, for EV certificates only, company image is improved as the company name is shown in the certificate details.

I vantaggi dell'offerta di Certificati SSL Actalis

Actalis solutions for SSL Certificates

Centralized management of SSL Certificates and MPKI with Enterprise RA


Enterprise customers also have access to the handy Enterprise RA control panel, allowing them to manage all the organization's SSL Certificates on a Managed PKI basis. With Enterprise RA, you can in fact request certificates and start issuing them yourself by providing the Certificate Signing Request (CSR), as well as being notified when the certificate has been issued, downloading the certificates that have been issued and much more.

SSL Certificates can be automated thanks to the ACME protocol


The ACME protocol (Automated Certificate Management Environment) allows servers to get certificates completely automatically. Using ACME clients, via an open interface, offers greater interoperability and facilitates integration with the use of the company's SSL Certificates, going so far as automating the entire life cycle, from installation to renewal.

Tell a tech specialist what you need

Is the SSL certificate just the first step in a complex IT project? Actalis can provide all the technological tools and expertise needed to help companies design and implement custom solutions on a large scale.

Ask us to get in touch with you

Documentation

Find below the platforms and browsers currently supported by Actalis SSL Server certificates (root: “Actalis Authentication Root CA”).

Desktop platforms (for PCs)

  • Windows: XP SP3 (for SSL certs only), Windows Vista, Windows 7, Windows 8 e 8.1, Windows 10, Windows 11
  • Apple OS X: 10.6.8 and newer
  • Linux: all main distributions (e.g. Ubuntu, Fedora, etc.)

Tablet/Smartphone platforms

  • Android 4.4.3 and newer
  • Apple iOS 7 and newer
  • Windows RT, Windows Phone v8+
  • BlackBerry OS v10
  • Chrome OS
  • Firefox OS

Desktop browsers

  • Microsoft Internet Explorer v8+ (Windows)
  • Microsoft Edge (Windows 10)
  • Mozilla Firefox v17+ for Windows, OSX, Linux
  • Google Chrome for Windows, OS X, Linux
  • Apple Safari for OS X
  • Opera for Windows, OS X, Linux, Solaris
  • Konqueror (Linux)

Mobile browsers

  • Android: native browser, Chrome, Firefox, Opera, Dolphin, …
  • iOS: Safari, Chrome, Dolphin, …
  • Windows Phone: Internet Explorer
  • BlackBerry: native browser, Opera

Browser for Java phones

  • Opera mini

Server platforms

  • Windows Server 2008 and newer
  • Linux: all main distributions (e.g. Red Hat, CentOS, Debian, etc.)

Java run-times

  • Oracle JRE/JDK v1.8.0_51 and newer
  • OpenJDK v1.6.0_33 (IcedTea) and newer
  • Apple Java 6 for OSX v1.6.0_65 and newer

Other run-times

  • Node.js

Tools and guides

We provide our customers with application and analysis tools useful for generating CSR and decoding certificates.

Use the tools

Problem reporting


To report problems related to SSL Server or Code Signing certificates issued by Actalis, you may:

  • send an email to [email protected] (we commit to timely read that mailbox during working hours only),
  • or - IN EMERGENCY ONLY - call our telephone number 0575-050.376 (please keep in mind that we do not provide technical support at that number: we only take charge of problems related to already issued certificates).

By "problems" we mean events or situations that - if confirmed - justify an urgent action by Actalis, such as the compromise of the owner's private key, a court order, the criminal use of the certificate (e.g. for phishing, or malware distribution), and so on. Depending on the problem severity, Actalis may decide to revoke the certificate, as provided for in the CPS.

You must provide at least the following information, when reporting a problem to Actalis, or your alert will be ignored:

  • your full name
  • your phone number
  • description of the alleged problem
  • enough information to identify the offending certificate

If the problem reporter claims to represent the certificate holder organization, he/she must prove that by answering some questions.

Warning: customer support is not provided through the phone number and the email address mentioned above. Support requests received via those channels will be ignored and will not receive an answer.

Reminder: if you are the certificate owner, you can at any time revoke your own certificate, by yourself, via the web interface at https://extwebra.actalis.it/portal/, after logging in with the credentials that have been sent to you at certificate issuance time.


Frequently asked questions

SSL (Secure Sockets Layer) is the name of the protocol used to establish secure communication between a Server and a Client, without data (such as passwords, personal details and credit card numbers) being intercepted, tampered with or falsified. To ensure secure browsing, where the data is protected, the appropriate SSL Server certificate needs to be installed, issued by a trusted third party (Certification Authority).
SSL Certificates are available in 3 categories (Domain Validation, Organization Validation and Extended Validation), with different types of validation (Single Domain, Wildcard and SAN).
The Domain Validation SSL Certificate (DV) validates ownership or control of the domain by the applicant. A DV SSL Certificate contains the domain's common name and can be issued on a Single Domain, Wildcard, and SAN basis.
The Organization Validation (OV) SSL Certificate requires the same checks as for the DV Certificate, plus verification of the company that owns the domain. The OV SSL Certificate also contains information about the applicant's organization and can be issued on a Single Domain, Wildcard, and SAN basis.
The Extended Validation SSL Certificate (EV) is the certificate offering the highest level of reliability. In addition to the checks carried out for the OV, for an EV SSL certificate, the Certification Authority carries out more in-depth checks, ensuring, for example, that the request comes from a person authorized to represent the organization. It can be issued on a Single Domain and SAN basis.
An SSL Certificate with Single Domain validation is valid for just 1 domain name (for example "domainname.TLD").
An SSL Certificate with Wildcard validation is valid for 1 domain name (for example "domainname.TLD") and all of its subdomains, usually in the format *.domainname.TLD (for example "shop.domainname.TLD", "login.domainname.TLD", etc.).
An SSL Certificate with SAN validation (Subject Alternative Name) is valid for a maximum of 5 different domain names (for example "domainname.TLD", "domainname1.TLD", "domainname2.TLD", etc.).