Select the product you need help with
- Internet Explorer
- Windows Phone
- More products
Accepted wildcards used by server certificates for server authentication
Article ID: 258858 - View products that this article applies to.
This article was previously published under Q258858
Implementation of SSL/TLS in the SCHANNEL security provider allows for the use of wildcard characters in server certificates in all operating systems except in Microsoft Windows 2000 with service packs installed. When you install Windows 2000 Service Pack 1 or later, this functionality is already present.
When SCHANNEL is used to authenticate a server during an HTTPS session, the server presents a certificate. This certificate has a common name that is compared against the server name extracted from the remote resource request. For example, if you point your browser to https://www.e-commerce.example.com/, SCHANNEL ensures that the server presents a certificate with the common name www.e-commerce.example.com; otherwise it informs the application that the server authentication failed.
A variation on this certificate-matching scheme has been documented in RFC 2595 and draft RFC specs for other protocols. This functionality allows the server certificate to have a wildcard (*) in the common name (CN). With the wildcard, you may have a single certificate (or only one CN in the certificate) installed on a group of servers with somewhat similar names. The implementation is designed so that multiple servers are given duplicates of the same wildcarded certificate that authenticates a set of servers. For instance, a company may have three SSL e-commerce servers with the following names:
www.e-commerce.example.comFor this example, the company may buy a single certificate containing the name *.e-commerce.example.com.
The following are some examples of how wildcards should and should not be used for maximum interoperability.
Accepted wildcard examples
Nonaccepted wildcard examples
Article ID: 258858 - Last Review: January 22, 2010 - Revision: 8.0