Перейти к содержимому
Skip to content
← All articles

How to Check a Website's SSL Certificate: Step-by-Step Guide

An SSL certificate is a digital document that verifies a website's identity and encrypts data between the browser and server. Checking an SSL certificate helps ensure the connection is secure, the certificate is valid, and it's properly configured.

Why SSL Certificate Checks Matter

An expired or misconfigured certificate is more than a technical issue:

What to Check in an SSL Certificate

1. Expiration Date

The most common issue is an expired certificate. Even with automatic renewal via Let's Encrypt, things can go wrong: DNS changed, cron broke, disk filled up.

It's recommended to check expiration regularly and set up alerts for 30, 14, and 7 days before expiry. The enterno.io SSL checker shows the exact expiration date and remaining days.

2. Certificate Chain

An SSL certificate only works when the browser can verify the entire chain: your certificate → intermediate CA → root CA. If the intermediate certificate is not installed on the server, some clients (especially mobile) will show an error.

Common chain issues:

3. Domain Name (Common Name / SAN)

The certificate must be issued for your exact domain. Check that:

4. TLS Protocol and Ciphers

A modern site should support TLS 1.2 and TLS 1.3. Older protocols are insecure:

ProtocolStatusAction
SSL 2.0 / 3.0Vulnerable (POODLE, DROWN)Must disable
TLS 1.0Deprecated (PCI DSS prohibits)Disable
TLS 1.1DeprecatedDisable
TLS 1.2SecureSupport
TLS 1.3RecommendedEnable when possible

5. Certificate Type

There are three validation levels:

Methods for Checking SSL Certificates

Online Tools

The most convenient method is to use the enterno.io SSL checker. Enter the domain name, and the tool will show:

Via Browser

Click the padlock icon in the address bar → "Connection is secure" → "Certificate is valid". You can see basic information here, but not all technical details.

Command Line (OpenSSL)

For deep analysis, use openssl:

# Show certificate
openssl s_client -connect example.com:443 -servername example.com < /dev/null 2>/dev/null | openssl x509 -text -noout

# Check expiration
openssl s_client -connect example.com:443 -servername example.com < /dev/null 2>/dev/null | openssl x509 -dates -noout

# Check chain
openssl s_client -connect example.com:443 -servername example.com -showcerts < /dev/null

Common Issues and Solutions

ERR_CERT_DATE_INVALID

Certificate has expired. Renew it through your hosting panel or manually via certbot:

sudo certbot renew --force-renewal

ERR_CERT_AUTHORITY_INVALID

The browser cannot verify the chain of trust. Make sure intermediate certificates are installed. For nginx, concatenate the files:

cat certificate.crt intermediate.crt > fullchain.crt

ERR_SSL_VERSION_OR_CIPHER_MISMATCH

Server and browser cannot agree on a protocol. Update TLS configuration:

ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256;

NET::ERR_CERT_COMMON_NAME_INVALID

The domain doesn't match the one in the certificate. Reissue the certificate with the correct domain.

Automatic Certificate Renewal

Let's Encrypt issues certificates for 90 days. Set up automatic renewal:

# Add to crontab
0 3 * * * certbot renew --quiet --post-hook "systemctl reload nginx"

Even with auto-renewal, regularly check your certificate via the enterno.io SSL checker — it helps detect issues that certbot doesn't track: outdated ciphers, incomplete chains, and approaching expiration.

SSL Check Checklist

Check your website right now

Check now →
More articles: SSL/TLS
SSL/TLS
TLS 1.3: What Changed and Why It Matters
16.03.2026 · 13 views
SSL/TLS
SSL Pinning: What It Is and When to Use It
16.03.2026 · 18 views
SSL/TLS
Wildcard SSL Certificates: When and How to Use Them
16.03.2026 · 11 views
SSL/TLS
Certificate Transparency Logs: Detecting Rogue Certificates and Monitoring Your Domain
16.03.2026 · 14 views