Tutorial

SSL Certificate Types Explained: DV, OV, EV, Wildcard, SAN

May 17, 2026

Back to Blog
Managing servers the hard way? Panelica gives you isolated hosting, built-in Docker and AI-assisted management.
Start free

The Foundation: What SSL/TLS Actually Does

Before diving into certificate types, it is important to understand what SSL/TLS certificates actually accomplish. When a visitor connects to your website over HTTPS, the SSL certificate serves three critical functions: encryption (protecting data in transit from eavesdroppers), authentication (proving that the server is who it claims to be), and integrity (ensuring that data has not been tampered with during transmission).

The term "SSL" is technically outdated. SSL (Secure Sockets Layer) was superseded by TLS (Transport Layer Security) years ago. Modern servers use TLS 1.2 or TLS 1.3. However, the industry still commonly uses "SSL certificate" as the umbrella term, and we will follow that convention here.

Browser Request
TLS Handshake
Certificate exchange
Certificate Validation
CA chain verified
Encrypted Connection
AES-256-GCM

All SSL certificates, regardless of type, provide the same level of encryption. A free Let's Encrypt DV certificate uses the same cryptographic algorithms as a $500 EV certificate. The difference between certificate types lies in the validation process — how thoroughly the Certificate Authority (CA) verifies the identity of the certificate requester.

Domain Validation (DV) Certificates

Domain Validation is the simplest and most common type of SSL certificate. The CA only verifies that you control the domain — nothing more. No business identity checks, no phone calls, no paperwork. Validation typically takes seconds to minutes.

How DV Validation Works

1
HTTP Challenge: The CA asks you to place a specific file at http://yourdomain.com/.well-known/acme-challenge/TOKEN. If the CA can retrieve it, you control the domain.
2
DNS Challenge: The CA asks you to create a specific TXT record (e.g., _acme-challenge.yourdomain.com). This method is required for wildcard certificates.
3
Email Challenge: The CA sends a verification email to a standard address like [email protected] or [email protected].
Let's Encrypt — The DV Revolution: Let's Encrypt, launched in 2016, fundamentally changed the SSL landscape by offering free, automated DV certificates. Today, over 300 million websites use Let's Encrypt, making HTTPS the default rather than a premium feature. Certificates are valid for 90 days and can be renewed automatically.

When to Use DV Certificates

  • Personal blogs and portfolio websites
  • Small business websites without e-commerce
  • Development and staging environments
  • Internal tools and APIs
  • Any website where domain-level trust is sufficient

DV Certificate Providers

ProviderCostValidityAutomation
Let's EncryptFree90 daysACME protocol (fully automated)
ZeroSSLFree (3 certs)90 daysACME + REST API
CloudflareFree (proxy)Auto-renewedAutomatic via proxy
Comodo/Sectigo$8-50/year1 yearManual or API
DigiCert$200+/year1-2 yearsCertCentral API

Organization Validation (OV) Certificates

Organization Validation certificates add a layer of identity verification beyond domain control. The CA verifies that the organization requesting the certificate is a legitimate, registered business entity. This involves checking business registration documents, verifying the physical address, and sometimes making a phone call to confirm.

The OV Validation Process

1
Domain Validation: Same as DV — prove you control the domain.
2
Organization Verification: The CA checks your business against government databases, Dun & Bradstreet, or other authoritative sources to confirm the organization exists.
3
Address Verification: The CA confirms the physical address of the organization matches records.
4
Phone Verification: A callback to a verified phone number associated with the organization may be required.

OV certificates typically take 1-3 business days to issue. The organization name appears in the certificate details (viewable by clicking the padlock icon in the browser), but it is not displayed prominently in the address bar like EV certificates were.

Who Sees the OV Difference? Honestly, very few visitors. Modern browsers display the same padlock icon for both DV and OV certificates. The organization name is only visible if a user manually inspects the certificate details. OV's value is more about compliance and regulatory requirements than visual trust indicators.

When to Use OV Certificates

  • Business websites that handle customer data
  • E-commerce stores (mid-tier)
  • Organizations required by compliance standards (PCI DSS, HIPAA)
  • Government and educational institutions
  • SaaS applications where business identity matters for B2B trust

Extended Validation (EV) Certificates

Extended Validation represents the highest level of identity verification in the SSL ecosystem. The CA performs an extensive vetting process that includes legal existence, operational existence, physical existence, and the authority of the person requesting the certificate.

The Rigorous EV Process

Verification StepWhat the CA ChecksTypical Duration
Legal existenceGovernment registration databases, articles of incorporation1-2 days
Operational existenceBusiness has been active for 3+ years or has a D&B listing1-2 days
Physical existenceVerified address through third-party databases1 day
Domain ownershipStandard domain validationMinutes
AuthorizationConfirm the applicant has authority to request the certificate1-2 days
Final reviewHuman review of all verification documents1-3 days
The EV Green Bar is Gone: Chrome (version 77, September 2019), Firefox, Safari, and Edge have all removed the green address bar and organization name display for EV certificates. The padlock icon now looks identical for DV, OV, and EV. This significantly reduced the visual value proposition of EV certificates. Google's reasoning was that research showed users did not actually check or understand the green bar.

Is EV Still Worth It?

The honest answer is: for most organizations, no. The primary selling point of EV was the green bar, which no longer exists. However, there are still valid reasons to consider EV:

Arguments For EV

  • Compliance requirements (some regulations mandate EV)
  • Certificate transparency logs show verified org name
  • Some security-focused users do check certificate details
  • Insurance and warranty (up to $1.75M for some EV certs)

Arguments Against EV

  • Green bar removed from all major browsers
  • Costs $200-$1000+ per year
  • Takes 1-2 weeks to issue
  • Same encryption as free DV certificates
  • No evidence of improved conversion rates

Wildcard Certificates

A wildcard certificate secures a domain and all its first-level subdomains using a single certificate. Instead of buying separate certificates for www.example.com, mail.example.com, api.example.com, and blog.example.com, a single wildcard certificate for *.example.com covers them all.

# Wildcard certificate covers: *.example.com www.example.com ✔ mail.example.com ✔ api.example.com ✔ anything.example.com ✔ example.com ✘ (root domain NOT covered automatically) sub.api.example.com ✘ (second-level subdomain NOT covered)
Wildcard Limitations: Wildcards only cover ONE level of subdomain. *.example.com does NOT cover sub.sub.example.com. You would need a separate *.sub.example.com certificate or a SAN certificate for that. Also, most wildcard certificates include the root domain (example.com) as a SAN entry, but verify this with your CA.

Wildcard with Let's Encrypt

Let's Encrypt supports wildcard certificates, but they require DNS-01 challenge validation (not HTTP-01). This means you need API access to your DNS provider to automate renewals.

# Issue wildcard cert with certbot $ certbot certonly --manual --preferred-challenges dns \ -d "*.example.com" -d "example.com" Please deploy a DNS TXT record under the name: _acme-challenge.example.com with the following value: kW3mB9xK8rT2pZ5qN7... # With Cloudflare DNS plugin (automated) $ certbot certonly --dns-cloudflare \ --dns-cloudflare-credentials /root/.cloudflare.ini \ -d "*.example.com" -d "example.com"

SAN / Multi-Domain Certificates (UCC)

Subject Alternative Name (SAN) certificates, also known as Multi-Domain or Unified Communications Certificates (UCC), allow you to secure multiple different domain names with a single certificate. Unlike wildcards, which cover subdomains of one domain, SAN certificates can cover completely unrelated domains.

# SAN certificate covers multiple unrelated domains: CN: example.com SAN: example.com SAN: www.example.com SAN: example.org SAN: myotherdomain.net SAN: shop.mybrand.com

SAN certificates are particularly useful for organizations that manage multiple brands or services. Microsoft Exchange and Office 365 environments frequently use SAN certificates because the server needs to respond to multiple hostnames (autodiscover, mail, OWA, etc.).

Certificate Type Comparison

FeatureDVOVEVWildcardSAN
Validation LevelDomain onlyOrganizationExtendedVariesVaries
Issuance TimeMinutes1-3 days1-2 weeksMinutes-daysMinutes-days
CostFree-$50$50-200$200-1000+Free-$300$50-500
Browser DisplayPadlockPadlockPadlockPadlockPadlock
Subdomain CoverageSingle domainSingle domainSingle domainAll subdomains (1 level)Listed domains only
Org Name in CertNoYesYesDepends on DV/OV/EV baseDepends
Let's Encrypt SupportYesNoNoYes (DNS-01)Yes (up to 100 SANs)

Self-Signed vs CA-Signed Certificates

Self-signed certificates are generated locally without any Certificate Authority involvement. They provide the same encryption as CA-signed certificates but lack the trust chain that browsers need to validate them.

Self-Signed Certificates

Not trusted by browsers (shows warning)

  • Free, instant generation
  • Good for development/testing
  • Internal services (with CA pinning)
  • Never for public-facing websites

CA-Signed Certificates

Trusted by all browsers

  • CA verifies identity (DV/OV/EV)
  • Part of the public trust chain
  • Required for HTTPS on public sites
  • Automatic renewal available
# Generate a self-signed certificate (for development only) $ openssl req -x509 -newkey rsa:4096 -sha256 -days 365 \ -nodes -keyout server.key -out server.crt \ -subj "/CN=localhost" \ -addext "subjectAltName=DNS:localhost,IP:127.0.0.1"

The Certificate Chain of Trust

Understanding the chain of trust is essential for troubleshooting SSL errors. When a browser receives your SSL certificate, it does not trust it directly. Instead, it follows a chain of signatures back to a Root CA that is pre-installed in the operating system or browser.

Root CA
Pre-installed in OS/browser
Intermediate CA
Signed by Root CA
Your Certificate
Signed by Intermediate
Common Error: Incomplete Chain — One of the most frequent SSL errors is a missing intermediate certificate. Your server must send both your certificate AND the intermediate certificate(s). If you only send your certificate, browsers may not be able to trace the chain back to the Root CA and will show a security warning.
# Verify certificate chain $ openssl s_client -connect example.com:443 -showcerts Certificate chain 0 s:CN=example.com i:C=US, O=Let's Encrypt, CN=R3 1 s:C=US, O=Let's Encrypt, CN=R3 i:C=US, O=Internet Security Research Group, CN=ISRG Root X1 # Check expiration date $ echo | openssl s_client -connect example.com:443 2>/dev/null | openssl x509 -noout -dates notBefore=Jan 15 00:00:00 2026 GMT notAfter=Apr 15 23:59:59 2026 GMT

Certificate Renewal and Automation

Certificate expiration is one of the leading causes of website outages. Automating certificate renewal is not optional — it is essential.

Let's Encrypt Auto-Renewal

# Test renewal (dry run) $ certbot renew --dry-run Simulating renewal of an existing certificate for example.com Congratulations, all simulated renewals succeeded # Set up cron for auto-renewal $ crontab -e 0 3 * * * certbot renew --quiet --deploy-hook "systemctl reload nginx"

Common SSL Errors and Fixes

ErrorCauseFix
NET::ERR_CERT_DATE_INVALIDCertificate has expiredRenew the certificate
NET::ERR_CERT_AUTHORITY_INVALIDSelf-signed or missing chainUse CA-signed cert, include intermediates
ERR_SSL_PROTOCOL_ERRORTLS version mismatch or misconfigCheck ssl_protocols in nginx.conf
NET::ERR_CERT_COMMON_NAME_INVALIDCertificate does not match domainReissue certificate with correct domain/SAN
SSL_ERROR_RX_RECORD_TOO_LONGHTTP served on HTTPS portCheck port 443 has ssl directives
Mixed Content warningsHTTP resources on HTTPS pageUpdate all resource URLs to HTTPS

Choosing the Right Certificate

With the green bar gone from EV certificates and Let's Encrypt providing free, automated DV certificates, the decision tree has become simpler than ever:

1
Personal site, blog, small business: Let's Encrypt DV. Free, automated, trusted by all browsers. There is zero reason to pay for a basic DV certificate when Let's Encrypt exists.
2
Multiple subdomains: Let's Encrypt Wildcard (free) or a paid wildcard from Sectigo/DigiCert if you need OV validation.
3
Multiple unrelated domains: Let's Encrypt SAN certificate (up to 100 domains, free) or a paid SAN cert.
4
Business with compliance needs: OV certificate from DigiCert, Sectigo, or GlobalSign. Required by some regulatory frameworks.
5
Enterprise with strict regulatory requirements: EV certificate — but only if compliance explicitly demands it.

How Panelica Handles SSL

Panelica provides automatic Let's Encrypt SSL for all domains with one-click issuance. When you add a domain to Panelica, you can enable SSL with a single toggle. The ACME challenge is handled automatically — Panelica configures the Nginx challenge response, communicates with Let's Encrypt, installs the certificate, and sets up auto-renewal. No command-line interaction is needed.

  • One-click Let's Encrypt SSL issuance for any domain
  • Automatic certificate renewal before expiration
  • Wildcard SSL support via DNS-01 challenge with Cloudflare integration
  • Force HTTPS with a single toggle — automatic HTTP to HTTPS redirect
  • Custom SSL certificate upload for OV/EV certificates
  • SSL certificate status monitoring in the domain dashboard

The combination of free automated SSL and built-in Cloudflare DNS management means you can secure even wildcard domains without touching the command line. For organizations that require OV or EV certificates from commercial CAs, Panelica supports custom certificate upload — simply paste your certificate and private key, and Panelica handles the Nginx configuration.

Key Takeaways

The SSL certificate landscape has been dramatically simplified by Let's Encrypt. For the vast majority of websites, a free DV certificate with automated renewal is the right choice. The encryption strength is identical across all certificate types — you are not getting "better security" by paying more. What you are paying for with OV and EV is identity verification, which matters for compliance but is invisible to most visitors since the green bar was removed.

Whatever certificate type you choose, the most important thing is to have one and keep it renewed. An expired certificate is worse than no certificate at all, because it actively warns visitors away from your site. Automate your renewals, monitor your certificate expiration dates, and your HTTPS infrastructure will take care of itself.

Security-first hosting panel

Hosting management, the modern way.

Panelica is a modern, security-first hosting panel — isolated services, built-in Docker and AI-assisted management, with one-click migration from any panel.

Zero-downtime migration Fully isolated services Cancel anytime
Share:
One license. Lifetime.