What Is a CSR SSL Certificate? Understanding Certificate Signing Requests and SSL

If you've ever set up HTTPS for a website, you've almost certainly encountered a CSR — even if the term felt like alphabet soup at the time. Understanding what a CSR is, how it connects to an SSL certificate, and what happens during the process demystifies a part of web security that confuses even experienced developers.

CSR and SSL: Two Parts of the Same Process

A CSR (Certificate Signing Request) is not an SSL certificate itself — it's the file you generate and submit before you receive one. Think of it as a formal application form. When you want an SSL/TLS certificate for your website, you can't simply download one and install it. A trusted authority needs to verify your identity and vouch for your public key. The CSR is how that process starts.

An SSL certificate (more accurately called a TLS certificate today, though "SSL" remains the common term) is the file installed on your web server that enables encrypted HTTPS connections. It proves to visitors' browsers that they're communicating with the legitimate server and not an imposter.

These two pieces are inseparable in the certificate issuance workflow.

What's Actually Inside a CSR?

A CSR is a block of encrypted text generated on your server. It contains three categories of information:

Identity information (Distinguished Name fields):

  • Common Name (CN) — the domain name the certificate will protect (e.g., example.com)
  • Organization (O) — your company or entity name
  • Organizational Unit (OU) — department, if applicable
  • Locality (L) — city
  • State/Province (ST)
  • Country (C) — two-letter ISO code

The public key — a cryptographic key your server generates as part of a matched pair. The private key stays on your server and is never shared. The public key goes into the CSR.

A digital signature — the CSR itself is signed using your private key, which lets the CA verify that whoever submitted it actually controls the corresponding private key.

The output looks like a wall of Base64-encoded characters wrapped in -----BEGIN CERTIFICATE REQUEST----- headers.

How the CSR and SSL Certificate Workflow Fits Together 🔐

The process follows a clear sequence:

  1. Generate a key pair — your server creates a private key and a corresponding public key
  2. Create the CSR — you fill in your domain and organization details; the server bundles them with the public key and signs the package
  3. Submit to a Certificate Authority (CA) — you send the CSR to a trusted CA (like DigiCert, Sectigo, Let's Encrypt, or others)
  4. Validation — the CA verifies your identity at a level matching the certificate type you applied for
  5. Certificate issuance — the CA signs your public key and identity information with their own private key, creating the SSL certificate
  6. Installation — you install the issued certificate on your server alongside your private key

The private key never leaves your server at any point. That's by design — it's what makes the system secure.

Validation Levels Change What the CA Verifies

Not all CSRs lead to identical certificates. The information in your CSR is the same regardless of certificate type, but what the CA does with it differs significantly:

Certificate TypeValidation LevelWhat Gets Verified
DV (Domain Validated)MinimalControl of the domain only
OV (Organization Validated)ModerateDomain + business existence
EV (Extended Validation)RigorousDomain + legal entity + physical address + more

A Let's Encrypt certificate is DV — it's free, automated, and verifies domain control only. An EV certificate from a commercial CA requires documentation proving your organization is a legitimate registered entity. The CSR is identical in structure across all three types; the difference is entirely in the CA's verification process.

Key Size and Algorithm: Variables That Matter

When generating your CSR, two technical choices affect security and compatibility:

Key size: RSA keys of 2048-bit are the current baseline considered secure. 4096-bit offers stronger protection at a modest performance cost. Some modern setups use ECDSA (Elliptic Curve) keys instead — typically 256-bit or 384-bit — which provide comparable or better security with smaller key sizes and faster handshakes.

Hashing algorithm: The CSR and resulting certificate use a hashing algorithm for the signature. SHA-256 is the current standard. SHA-1 is deprecated and rejected by modern browsers and CAs.

Your server software, hosting environment, and the CA's requirements all influence which options are available and appropriate.

Where CSRs Get Generated

CSRs can be generated in several ways depending on your environment:

  • Command line via OpenSSL — the most common method on Linux servers, giving full control over every field
  • Web server control panels — cPanel, Plesk, and similar tools have built-in CSR generators
  • CA websites — some certificate authorities provide online tools to generate the CSR on their platform (though this means the private key is generated outside your environment, which carries its own security considerations)
  • Cloud platforms — AWS Certificate Manager, Google Cloud, and Azure have their own certificate provisioning workflows that abstract much of this process

The Variables That Determine Your Specific Path 🛠️

What "right" looks like for a CSR and SSL setup shifts considerably depending on several factors:

  • Hosting environment — shared hosting, VPS, dedicated server, and cloud platforms all have different workflows and levels of access
  • Number of domains — a single domain, a wildcard certificate covering subdomains, or a multi-domain (SAN) certificate covering several distinct domains all start from different CSR configurations
  • Organization type — a personal project, a small business, and a financial institution have different validation requirements and trust expectations from visitors
  • Automation needs — high-volume or frequently-renewed environments may use the ACME protocol (used by Let's Encrypt) to automate the entire CSR-and-issuance cycle without manual steps
  • Compliance requirements — certain industries have specific certificate standards that dictate which CA and validation level is acceptable

The CSR process itself is standardized. Everything around it — which CA to use, which key algorithm to choose, which validation level to pursue, how renewal is managed — depends on the specifics of your infrastructure and purpose.