NET::ERR_CERTIFICATE_TRANSPARENCY_REQUIRED — since October 2017 Chrome requires every public SSL cert to be logged in Certificate Transparency (CT). Cert without an SCT (Signed Certificate Timestamp) is rejected. Causes: issued before 2017, commercial CA did not submit to CT log, corporate proxy swapping cert. Fix: reissue via Let's Encrypt/DigiCert (all mainstream CAs write to CT automatically).
Below: causes, fixes, FAQ.
openssl x509 -in cert.pem -text | grep -A1 SCTSSL/TLS is the encryption protocol that protects data between the browser and server. Our tool analyzes the certificate, chain of trust, TLS version, and knownvulnerabilities.
Issuer, validity period, signature algorithm, covered domains (SAN), and validation type (DV/OV/EV).
Full chain verification: from leaf certificate through intermediates to root CA.
Protocol version (TLS 1.2/1.3), cipher suites, Perfect Forward Secrecy (PFS) support.
Set up a monitor — get Telegram and email alerts 30/14/7 days before expiration.
SSL certificate monitoring
TLS config audit
HTTPS as ranking factor
customer trust
www and subdomains.Strict-Transport-Security header forces browsers to always use HTTPS.SSL certificate monitoring, check history and alerts 30 days before expiry.
Sign up freeSigned Certificate Timestamp — cryptographic proof that the cert was logged in a public CT log (Google Argon, Cloudflare Nimbus, etc). Embedded in the cert extension, presented during TLS handshake, or stapled via OCSP.
Yes, automatically since 2018. The ISRG Root X1 cert has an SCT in the embedded CT extension.
<a href="/en/ssl">Enterno SSL Checker</a> shows CT compliance in its report. Or <code>openssl x509 -in cert.pem -text | grep -A5 "SCT List"</code>.
CT compliance required by Chrome, Safari, Edge (Firefox not yet). Browser share ~85% — without SCT you lose most users.