Blog | G5 Cyber Security

EV Certificates & Private CAs: Benefits

TL;DR

Using Extended Validation (EV) certificates with a privately hosted Certificate Authority (CA) gives you greater control over your security, reduces reliance on public CAs, and can lower costs in the long run. However, it requires significant technical expertise to set up and maintain correctly.

1. Understanding EV Certificates

EV certificates are the highest level of SSL/TLS certificate validation. They require a more rigorous identity verification process than standard Domain Validated (DV) or Organization Validated (OV) certificates. This means browsers display extra information about the organisation, typically in the address bar – for example, showing the company name.

2. Why Use a Private CA?

Traditionally, you get EV certificates from public Certificate Authorities like Let’s Encrypt, DigiCert or Sectigo. A private CA is one you run yourself. Here’s why you might choose this route:

3. Setting Up Your Private CA

This is the most complex part. You’ll need to choose a CA software package (e.g., OpenSSL, EJBCA, Smallstep) and set up a secure infrastructure.

3.1 Choosing CA Software

OpenSSL is powerful but requires significant manual configuration. EJBCA and Smallstep offer more user-friendly interfaces and automation features.

3.2 Infrastructure Requirements

3.3 Generating Root Certificate

This is the foundation of your trust chain. Protect this key *extremely* carefully.

openssl req -x509 -newkey rsa:4096 -keyout ca.key -out ca.crt -days 3650

4. Issuing EV Certificates

Once your CA is set up, you can issue EV certificates.

4.1 Identity Verification

You must perform rigorous identity verification according to the EV guidelines (defined by the CA/Browser Forum). This typically involves:

4.2 Certificate Signing Request (CSR)

The applicant generates a CSR on their server.

openssl req -new -key private.key -out csr.pem

4.3 Signing the CSR

Your CA signs the CSR to create the EV certificate.

openssl ca -signkey ca.key -cert ca.crt -in csr.pem -out ev_certificate.pem -days 365

5. Deployment and Trust

Deploying your EV certificate is similar to deploying any other SSL/TLS certificate, but you also need to ensure clients trust your private CA.

5.1 Certificate Installation

Install the EV certificate on your web server (e.g., Apache, Nginx).

5.2 Trust Store Distribution

Clients must trust your root certificate. This can be achieved by:

Exit mobile version