Customer Service | mail Send Email


Help & Support


Kindly contact us


Secure Hash Algorithm 2 ( SHA-2 )

Secure Hash Algorithm 2 ( SHA-2 ) is a set of cryptographic hash functions which includes SHA-224, SHA-256, and SHA-512. The 256 in SHA-256 represents the bit size of the hash output or digest when the hash function is performed. Not all software supports every digest size within the SHA-2 family.

Most browsers, platforms, mail clients, and mobile devices already support SHA-2. However, some older operating systems such as Windows XP pre-SP3 do not support SHA-2 encryption.

Below is the SHA-2 Compatibility table:

General CSR Creation Guidelines

Before you can order an SSL Certificate, you must first generate a CSR (Certificate Signing Request) for your server.

A CSR is an encoded file that provides you with a standardized way to send us your public key along with some information that identifies your company and domain name. When you generate a CSR, most server software asks for the following information: common name (i.e., organization name and location (country, state, city), key type (currently RSA), and key size (currently 2048 bit minimum).

Popular Platforms & Operating Systems

On-site Support Available

Problem to generate your CSR or install the SSL certificate? Get a quotation from our sales representative.

If any of the documentation is not clear or you need more explanation, you can email us at to get free support.

SSL Certificate Installation Instructions & Tutorials

After you create your CSR, purchase your certificate, and the SSL Certificate validation and processing are complete, you are ready to install your SSL Certificate(s).

Your certificate will be provided via email or will be available to download in your Entrust account. The SSL Certificate is a text file with encrypted data that your server will use once the certificate is installed.

In addition to your SSL Certificate, you will need to download two more certificates. These are known as intermediate certificates and are required by browsers so that they know to trust your SSL Certificate. The intermediate certificates link to Entrust's root certificate. Registered Certificate Authorities like Entrust must provide a known root certificate before their SSL Certificate will be trusted by SSL-enabled applications. Note that for some servers (such as Microsoft) the intermediate certificates are bundled with the SSL Certificate. Please refer to the guide to install chain certificate.

( RATING: 3  /  VOTES: 8 )