Skip to the content.

Certificates Explained Properly

TLS certificates are often treated as simple configuration files that “make HTTPS work”. In reality they are part of a large and carefully engineered trust system known as the Web Public Key Infrastructure (Web PKI).

A single TLS connection involves multiple layers of validation including:

This article provides a high‑level overview of each component, with links to deeper technical explanations for engineers who want to explore the mechanics in detail.


The Conceptual Model of Certificates

At a conceptual level, an X.509 certificate is a signed binding between an identity and a public key.

Identity + Public Key + Issuer Signature

The certificate authority (CA) verifies the identity of the subject and signs the certificate, allowing clients to trust that the public key belongs to the entity named in the certificate.

➡️ Deep dive: The Conceptual Model of Certificates


ASN.1 — Abstract Syntax Notation One

Certificates are defined using ASN.1, a structured data description language used in many networking protocols.

ASN.1 defines the schema of the certificate, while DER (Distinguished Encoding Rules) defines the exact binary encoding used for transmission and signing.

Because certificate signatures operate on the DER‑encoded bytes, deterministic encoding is essential for cryptographic verification.

➡️ Deep dive: ASN.1 and DER Encoding


Certificate Fields

An X.509 certificate contains multiple fields that influence how TLS clients interpret and validate the certificate.

Common fields include:

These fields define identity information, cryptographic parameters, and policy constraints used during certificate validation.

➡️ Deep dive: Certificate Field Deep Dive


Subject Public Key Info (SPKI)

The Subject Public Key Info (SPKI) section contains the public key associated with the certificate subject.

This public key is used during the TLS handshake to verify signatures produced by the server’s private key.

SPKI also defines the algorithm used by the key, such as:

➡️ Deep dive: Subject Public Key Info (SPKI) Deep Dive


Certificate Extensions

Modern certificates rely heavily on extensions, introduced in X.509 version 3.

Important extensions include:

Incorrect extension configuration is one of the most common causes of TLS validation failures.

➡️ Deep dive: Certificate Extensions Deep Dive


Certificate Chain Building Algorithms

Servers typically present only part of the certificate chain during TLS handshakes.

The client must construct a valid chain from the leaf certificate to a trusted root certificate.

This process may involve:

➡️ Deep dive: Certificate Chain Building Algorithms


RFC 5280 Path Validation Algorithm

Once a chain is constructed, it must be validated according to RFC 5280.

Validation enforces rules including:

➡️ Deep dive: RFC 5280 Path Validation Algorithm


Hostname Validation (RFC 6125)

Certificate validation alone does not prove the identity of the server.

Hostname validation ensures the certificate actually represents the domain the client intended to connect to.

This process compares the requested hostname with entries in the Subject Alternative Name (SAN) extension.

➡️ Deep dive: Hostname Validation (RFC 6125)


Trust Stores and Root Programs

Certificate validation ultimately terminates at a trusted root certificate.

Root certificates are distributed through platform‑specific trust stores maintained by:

These organizations operate root programs that determine which certificate authorities are trusted globally.

➡️ Deep dive: Trust Stores and Root Programs


Revocation Reality

Certificates sometimes need to be invalidated before expiration.

Revocation mechanisms include:

However, revocation has historically been unreliable due to:

➡️ Deep dive: Revocation Reality


The TLS Trust Pipeline

All of these mechanisms combine into a single trust pipeline executed during the TLS handshake.

flowchart TD
A[Client Connects]
A --> B[Receive Certificate Chain]
B --> C[Chain Construction]
C --> D[Path Validation]
D --> E[Hostname Validation]
E --> F[Revocation Checks]
F --> G[Root Trust Verification]
G --> H[Secure TLS Session]

A failure at any stage terminates the connection.

Understanding this pipeline allows engineers to diagnose TLS failures and evaluate the security posture of systems they operate.

➡️ Deep dive: The TLS Trust Pipeline (Conclusion)


Final Thoughts

TLS certificates represent far more than a simple encryption configuration.

They are part of a globally distributed trust architecture built on:

By understanding the mechanics of certificate validation, engineers gain the ability to:

The goal of this series is to make TLS certificate infrastructure transparent and understandable rather than opaque and mysterious.


TLS & Certificate Infrastructure Deep Dive