A TLS certificate (also called an SSL certificate) is a digital certificate that proves a website is secure and trustworthy. It enables HTTPS, which encrypts the data between a user's browser and the server.
When you visit a website with HTTPS (like https://example.com), your browser checks the TLS certificate to make sure:
- It's valid
- It's issued by a trusted Certificate Authority (CA)
- It's not expired
- It matches the domain name
Real Example
Let's look at the TLS certificate for https://www.google.com
Using CLI, you can get a certificate details:
echo | openssl s_client -showcerts -servername google.com -connect google.com:443 2>/dev/null | openssl x509 -inform pem -noout -text
You will get decoded certificate, which looks like this:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
9a:59:e3:69:20:54:81:cc:09:2f:9e:71:4d:cf:0b:42
Signature Algorithm: ecdsa-with-SHA256
Issuer: C=US, O=Google Trust Services, CN=WE2
Validity
Not Before: Mar 20 11:18:50 2025 GMT
Not After : Jun 12 11:18:49 2025 GMT
Subject: CN=*.google.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:81:de:88:48:63:00:73:1b:60:b7:5f:7a:d1:93:
a1:a8:50:ea:59:f0:eb:f8:3d:aa:41:7e:48:e3:1d:
f1:16:57:c9:cf:41:c5:b0:c7:3e:4b:bc:00:c9:75:
25:91:b7:eb:e6:a3:03:73:cf:25:59:98:5f:76:d7:
3c:06:5e:9e:26
ASN1 OID: prime256v1
NIST CURVE: P-256
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature
X509v3 Extended Key Usage:
TLS Web Server Authentication
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Subject Key Identifier:
92:E6:2F:BA:C3:C2:DF:E6:3F:94:AE:58:48:6C:BB:B5:80:ED:AF:91
X509v3 Authority Key Identifier:
75:BE:C4:77:AE:89:F6:44:37:7D:CF:B1:68:1F:1D:1A:EB:DC:34:59
Authority Information Access:
OCSP - URI:http://o.pki.goog/we2
CA Issuers - URI:http://i.pki.goog/we2.crt
X509v3 Subject Alternative Name:
DNS:*.google.com, DNS:*.appengine.google.com, DNS:*.bdn.dev, DNS:*.origin-test.bdn.dev, DNS:*.cloud.google.com, DNS:*.crowdsource.google.com, DNS:*.datacompute.google.com, DNS:*.google.ca, DNS:*.google.cl, DNS:*.google.co.in, DNS:*.google.co.jp, DNS:*.google.co.uk, DNS:*.google.com.ar, DNS:*.google.com.au, DNS:*.google.com.br, DNS:*.google.com.co, DNS:*.google.com.mx, DNS:*.google.com.tr, DNS:*.google.com.vn, DNS:*.google.de, DNS:*.google.es, DNS:*.google.fr, DNS:*.google.hu, DNS:*.google.it, DNS:*.google.nl, DNS:*.google.pl, DNS:*.google.pt, DNS:*.googleapis.cn, DNS:*.googlevideo.com, DNS:*.gstatic.cn, DNS:*.gstatic-cn.com, DNS:googlecnapps.cn, DNS:*.googlecnapps.cn, DNS:googleapps-cn.com, DNS:*.googleapps-cn.com, DNS:gkecnapps.cn, DNS:*.gkecnapps.cn, DNS:googledownloads.cn, DNS:*.googledownloads.cn, DNS:recaptcha.net.cn, DNS:*.recaptcha.net.cn, DNS:recaptcha-cn.net, DNS:*.recaptcha-cn.net, DNS:widevine.cn, DNS:*.widevine.cn, DNS:ampproject.org.cn, DNS:*.ampproject.org.cn, DNS:ampproject.net.cn, DNS:*.ampproject.net.cn, DNS:google-analytics-cn.com, DNS:*.google-analytics-cn.com, DNS:googleadservices-cn.com, DNS:*.googleadservices-cn.com, DNS:googlevads-cn.com, DNS:*.googlevads-cn.com, DNS:googleapis-cn.com, DNS:*.googleapis-cn.com, DNS:googleoptimize-cn.com, DNS:*.googleoptimize-cn.com, DNS:doubleclick-cn.net, DNS:*.doubleclick-cn.net, DNS:*.fls.doubleclick-cn.net, DNS:*.g.doubleclick-cn.net, DNS:doubleclick.cn, DNS:*.doubleclick.cn, DNS:*.fls.doubleclick.cn, DNS:*.g.doubleclick.cn, DNS:dartsearch-cn.net, DNS:*.dartsearch-cn.net, DNS:googletraveladservices-cn.com, DNS:*.googletraveladservices-cn.com, DNS:googletagservices-cn.com, DNS:*.googletagservices-cn.com, DNS:googletagmanager-cn.com, DNS:*.googletagmanager-cn.com, DNS:googlesyndication-cn.com, DNS:*.googlesyndication-cn.com, DNS:*.safeframe.googlesyndication-cn.com, DNS:app-measurement-cn.com, DNS:*.app-measurement-cn.com, DNS:gvt1-cn.com, DNS:*.gvt1-cn.com, DNS:gvt2-cn.com, DNS:*.gvt2-cn.com, DNS:2mdn-cn.net, DNS:*.2mdn-cn.net, DNS:googleflights-cn.net, DNS:*.googleflights-cn.net, DNS:admob-cn.com, DNS:*.admob-cn.com, DNS:googlesandbox-cn.com, DNS:*.googlesandbox-cn.com, DNS:*.safenup.googlesandbox-cn.com, DNS:*.gstatic.com, DNS:*.metric.gstatic.com, DNS:*.gvt1.com, DNS:*.gcpcdn.gvt1.com, DNS:*.gvt2.com, DNS:*.gcp.gvt2.com, DNS:*.url.google.com, DNS:*.youtube-nocookie.com, DNS:*.ytimg.com, DNS:android.com, DNS:*.android.com, DNS:*.flash.android.com, DNS:g.cn, DNS:*.g.cn, DNS:g.co, DNS:*.g.co, DNS:goo.gl, DNS:www.goo.gl, DNS:google-analytics.com, DNS:*.google-analytics.com, DNS:google.com, DNS:googlecommerce.com, DNS:*.googlecommerce.com, DNS:ggpht.cn, DNS:*.ggpht.cn, DNS:urchin.com, DNS:*.urchin.com, DNS:youtu.be, DNS:youtube.com, DNS:*.youtube.com, DNS:music.youtube.com, DNS:*.music.youtube.com, DNS:youtubeeducation.com, DNS:*.youtubeeducation.com, DNS:youtubekids.com, DNS:*.youtubekids.com, DNS:yt.be, DNS:*.yt.be, DNS:android.clients.google.com, DNS:*.android.google.cn, DNS:*.chrome.google.cn, DNS:*.developers.google.cn, DNS:*.aistudio.google.com
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.1
X509v3 CRL Distribution Points:
Full Name:
URI:http://c.pki.goog/we2/xuzt3PU9F_w.crl
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : CF:11:56:EE:D5:2E:7C:AF:F3:87:5B:D9:69:2E:9B:E9:
1A:71:67:4A:B0:17:EC:AC:01:D2:5B:77:CE:CC:3B:08
Timestamp : Mar 20 12:18:56.618 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:44:02:20:3A:82:2A:9B:01:F1:18:46:DA:4F:C8:74:
83:8E:07:93:86:AD:FF:DE:E8:49:E4:C2:68:D4:C0:85:
76:ED:9A:D3:02:20:0B:6A:90:A0:FE:FB:C4:DA:CF:61:
C0:EC:62:EE:76:73:EF:C0:96:1D:63:F9:B5:3C:A0:3E:
35:0A:BC:C1:B0:17
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : E6:D2:31:63:40:77:8C:C1:10:41:06:D7:71:B9:CE:C1:
D2:40:F6:96:84:86:FB:BA:87:32:1D:FD:1E:37:8E:50
Timestamp : Mar 20 12:18:57.585 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:DA:4A:51:5F:E0:D9:3F:7B:BA:DE:8F:
F7:1D:67:79:83:13:68:D8:40:F6:80:6A:2D:C5:2C:AE:
A1:26:40:BA:C6:02:20:61:24:F1:2F:0D:66:23:88:4A:
13:CB:AA:F9:84:77:72:7F:CF:23:7D:7A:81:52:59:7A:
83:7D:E5:C5:25:C5:26
Signature Algorithm: ecdsa-with-SHA256
Signature Value:
30:45:02:20:19:91:27:bb:9e:cd:0b:d5:18:c4:67:2e:70:43:
59:b0:79:39:4b:1e:ec:ad:03:81:10:15:b9:bd:78:af:c8:4f:
02:21:00:cb:c0:0a:81:91:00:73:d6:31:54:d3:7f:28:eb:ec:
60:e6:7f:7d:1d:9e:b4:5f:f0:98:7b:25:ca:de:1f:2c:5d
Main details of Google's TLS certificate
Common Name (CN): *.google.com
→ This is a wildcard certificate that covers all Google subdomains (like mail.google.com, docs.google.com, etc.).
Issued By: Google Trust Services, CN=WE2
→ The certificate was issued by Google’s own trusted Certificate Authority.
Validity Period:
Start: March 20, 2025
End: June 12, 2025
→ The certificate is valid for about 3 months.
Signature Algorithm: ECDSA with SHA-256
→ A modern, secure digital signature algorithm.
Public Key Type: Elliptic Curve (P-256) with a 256-bit key
→ Efficient and secure cryptography.
Key Usage: Digital Signature
Extended Key Usage: TLS Web Server Authentication
→ The certificate is used for authenticating secure web servers.
Subject Alternative Names (SAN):
→ Covers hundreds of domains and subdomains, including:
*.google.com, *.youtube.com, *.gstatic.com, *.android.com, google.com, youtu.be, etc.
(Also includes many .cn domains for Chinese services.)
Certificate Policies: Standard public certificate policy OID: 2.23.140.1.2.1
🧾 OCSP & CRL URLs:
→ For real-time revocation checks and CRL (Certificate Revocation List)
Certificate Transparency (CT) Logs:
→ Contains signed timestamps from two CT logs, proving the certificate was publicly logged.
How to Know if an Issuer is Trustable
When you see something like this:
Issuer: C=US, O=Google Trust Services, CN=WE2
You're looking at the Certificate Authority (CA) that signed the certificate. But how do you know it's legit?
Here’s how to check.
Check If It’s in the Trusted Root Store
Operating systems (like Windows, macOS, Linux) and browsers (Chrome, Firefox) have a built-in list of trusted CAs, called a trusted root store.
If the issuer’s root or intermediate certificate is in that list, it's considered trustworthy.
How to check:
- Open your browser.
- Go to the website using the cert (e.g., https://www.google.com).
- Click the padlock icon → View certificate details.
- Check the certificate chain — if it says “trusted”, your browser already trusts the issuer.
In this case, Google Trust Services (CN=WE2) is trusted because:
- It chains up to a trusted root certificate.
- Google Trust Services is a publicly recognized Certificate Authority.
Look Up the CA in the Certificate Transparency Logs
You can search for Google Trust Services / WE2 in public Certificate Transparency (CT) logs:
crt.sh
Google Certificate Transparency
This shows how many certificates the CA has issued and confirms it’s active and used widely.
Verify on CA’s Official Site
You can check the issuer by name:
Google Trust Services CA info:
pki.goog
This is Google's official site for their public CAs, including WE2.
Get Notified with a Telegram Bot
Want to automate TLS monitoring and get notified before a certificate expires? Use Telegram Bot that can monitor TLS certificate expiration for you.