AutoCSR File Unlock Code

When you submit an order for an SSL Certificate from Trustico® without providing your own Certificate Signing Request (CSR), our staff may be able to assist by generating a Certificate Signing Request (CSR) on your behalf using our AutoCSR service.

AutoCSR is a convenient option that means you will not require technical knowledge to complete your SSL Certificate order as Trustico® handles the technical aspects for you.

It is highly recommended that the Certificate Signing Request (CSR) is generated using the normal processes that are available via your server, control panel or hosting account. An SSL Certificate purchase involves private information (such as the private key) that should remain under your direct control. Learn About Certificate Signing Requests (CSR) 🔗

As part of the process of securing the files provided to you, we secure sensitive files by encrypting and password-protecting them where possible.

We will generate and apply essential security credentials which may be required to successfully unlock sensitive files to subsequently install your SSL Certificate. These credentials are best kept secure at all times.

How We Protect Your Files

For your security, Trustico® delivers sensitive information in a password-protected archive file. The archive cannot be opened without the correct unlock code.

Your file is protected with AES-256 encryption. Windows users can download 7-Zip (free) from 7-zip.org, then right-click the file and select "7-Zip > Extract Here" to open the archive. Mac users can use The Unarchiver (free from App Store) or double-click and enter the unlock code when prompted. The unlock code can be found in your order details.

The unlock code is not included in fulfilment e-mails for security reasons. Instead, you will find your unlock code within your order details in your customer account for a limited period after your order has been processed.

Accessing Your Unlock Code

To retrieve your unlock code, log in to the Trustico® ordering system, navigate to your order history, and select the relevant order. If applicable, your unlock code will be displayed within the order status page.

The unlock code is generally available for seven days from when your order is processed.

After Seven Days

For security reasons, the unlock code is generally only displayed for a limited time. After this period, in most cases reissuing your SSL Certificate will be required.

When credentials have been created and subsequently expired, they cannot be regenerated. This is an essential security measure because credentials should ultimately only exist in your possession. To streamline the installation process, timely action is required when initially placing an order.

If you have lost access to your credentials and the seven-day window has passed, proceed to reissue your SSL Certificate with a new Certificate Signing Request (CSR). Learn About Reissuing Your SSL Certificate 🔗

Best Practices

To avoid any issues, it is strongly recommended to obtain all installation files and credentials as soon as you receive a notification that they are available.

Store credentials and files in a secure location that you control, and to avoid the need to reissue keep a backup in case you need to reinstall your SSL Certificate. Explore Our Installation Instructions 🔗

Your credentials should never be shared with anyone who does not require access to install your SSL Certificate.

Why This Matters

The files generated during the Certificate Signing Request (CSR) process are fundamental to your SSL Certificate security. If the credentials protecting those files were to be compromised, your encrypted communications could be at risk.

The Trustico® delivery process is designed to ensure that only you have access to these sensitive materials.

Need Help?

If you have any questions about accessing your unlock code or installing your SSL Certificate, follow the installation instructions provided by your hosting company or software vendor.

This service is provided as a courtesy. If you lose access to your protected files, or are unable to obtain or unlock them, you will be required to generate a new Certificate Signing Request (CSR) and reissue using standard processes. Learn About Reissuing Your SSL Certificate 🔗

Ask Trustico® Assistant

For Instant Answers - Start Here When You Have a Question or Need Help

Understanding SSL Certificate File Formats and Extensions

Understanding SSL Certificate File Formats and ...

SSL Certificate files can be broadly categorized into three main types based on how the data is encoded and stored. Understanding these categories will help you identify which format you...

Understanding SSL Certificate File Formats and ...

SSL Certificate files can be broadly categorized into three main types based on how the data is encoded and stored. Understanding these categories will help you identify which format you...

Understanding the AutoCSR Service for SSL Certificate Orders

Understanding the AutoCSR Service for SSL Certi...

Learn how AutoCSR works, compare it to hosting company practices, find out when automated credential generation is appropriate versus generating your own CSR. Covers security considerations including the Trustico® non-retention...

Understanding the AutoCSR Service for SSL Certi...

Learn how AutoCSR works, compare it to hosting company practices, find out when automated credential generation is appropriate versus generating your own CSR. Covers security considerations including the Trustico® non-retention...

What Is Encrypted Server Name Indication (ESNI)? How Encrypted Client Hello (ECH) Protects Your Privacy

What Is Encrypted Server Name Indication (ESNI)...

The limitations of Encrypted Server Name Indication (ESNI) led to its evolution into Encrypted Client Hello (ECH) in 2020. Encrypted Client Hello (ECH) addresses the shortcomings of its predecessor while...

What Is Encrypted Server Name Indication (ESNI)...

The limitations of Encrypted Server Name Indication (ESNI) led to its evolution into Encrypted Client Hello (ECH) in 2020. Encrypted Client Hello (ECH) addresses the shortcomings of its predecessor while...

Transport Layer Security (TLS) and Cybersecurity

Transport Layer Security (TLS) and Cybersecurity

Every time a browser connects to a website using Hypertext Transfer Protocol Secure (HTTPS), Transport Layer Security (TLS) encrypts the connection to protect data from interception and tampering.

Transport Layer Security (TLS) and Cybersecurity

Every time a browser connects to a website using Hypertext Transfer Protocol Secure (HTTPS), Transport Layer Security (TLS) encrypts the connection to protect data from interception and tampering.

How to Find Your SSL Certificate Private Key

How to Find Your SSL Certificate Private Key

Private keys are generated simultaneously when you create a Certificate Signing Request (CSR) for your Trustico® SSL Certificate. This process creates a mathematically linked pair consisting of a public key...

How to Find Your SSL Certificate Private Key

Private keys are generated simultaneously when you create a Certificate Signing Request (CSR) for your Trustico® SSL Certificate. This process creates a mathematically linked pair consisting of a public key...

How To Stop “Secure And Nonsecure Items” Warning On Your Site?

How To Stop “Secure And Nonsecure Items” Warnin...

Mixed content warnings occur when a secure Hypertext Transfer Protocol Secure (HTTPS) page includes elements loaded over unsecured Hypertext Transfer Protocol (HTTP) connections.

How To Stop “Secure And Nonsecure Items” Warnin...

Mixed content warnings occur when a secure Hypertext Transfer Protocol Secure (HTTPS) page includes elements loaded over unsecured Hypertext Transfer Protocol (HTTP) connections.

1 / 6