Premium Installation Information Collection

To ensure the highest level of security during your SSL Certificate installation, we recommend generating temporary access credentials through your hosting provider.

This industry standard approach keeps your primary account credentials completely secure while allowing our technical team to complete your installation.

Most major hosting providers offer simple tools to create time-limited access credentials specifically for third-party services. These temporary credentials automatically expire after a set period, providing an additional layer of security.

Creating temporary credentials means you'll maintain full control throughout the process and can monitor or revoke access at any time through your hosting control panel.

If you can specify exactly which permissions to grant, we additionally recommend limiting access to only the necessary functions for SSL Certificate installation.

We offer this online form to provide temporary credentials, though if preferred, you can securely share them with our team via any of our available contact methods.

Our team can provide guidance for generating temporary credentials on all major hosting platforms, including cPanel, Plesk, AWS, and other popular providers.

This information collection form is optional - we understand that providing this sensitive information can be worrisome. If you prefer to provide temporary access and the required information via another method, let us now.

Most Popular Questions

Learn how to securely provide temporary access credentials to the Trustico® technical team for premium SSL Certificate installation services.

Why does Trustico® recommend using temporary credentials for SSL Certificate installation?

Temporary credentials keep your primary account login details completely secure while allowing the Trustico® technical team to complete your installation. These credentials automatically expire after a set period and can be revoked at any time through your hosting control panel.

How do I create temporary access credentials for my hosting account?

Most major hosting providers including cPanel, Plesk, and AWS offer simple tools to create time-limited access credentials for third-party services. The Trustico® team can provide guidance for generating temporary credentials on your specific hosting platform.

What permissions should I grant for SSL Certificate installation?

Trustico® recommends limiting access to only the necessary functions required for SSL Certificate installation. If your hosting provider allows you to specify exact permissions, restrict the temporary credentials to SSL-related functions only.

Can I provide my temporary credentials through a different method instead of the online form?

Yes, the online information collection form is optional. If you prefer an alternative method, you can securely share your temporary access credentials with the Trustico® team via any of the available contact methods.

Ask Trustico® Assistant

For Instant Answers - Start Here When You Have a Question or Need Help

SSL Certificate Validity Periods Are Changing to 200 Days

SSL Certificate Validity Periods Are Changing t...

The reduction in SSL Certificate validity periods is driven by the need to regularly confirm that the Certificate holder is still entitled to use the SSL Certificate. No new Certificate...

SSL Certificate Validity Periods Are Changing t...

The reduction in SSL Certificate validity periods is driven by the need to regularly confirm that the Certificate holder is still entitled to use the SSL Certificate. No new Certificate...

SSL Certificate Works on WWW but Not Root Domain : Troubleshooting Guide

SSL Certificate Works on WWW but Not Root Domai...

Several server configuration problems can cause SSL Certificates to work on the www version but fail on the non-www version of a domain. Understanding these causes helps identify the specific...

SSL Certificate Works on WWW but Not Root Domai...

Several server configuration problems can cause SSL Certificates to work on the www version but fail on the non-www version of a domain. Understanding these causes helps identify the specific...

Understanding SSL Certificate File Formats and Extensions

Understanding SSL Certificate File Formats and ...

SSL Certificate files can be broadly categorized into three main types based on how the data is encoded and stored. Understanding these categories will help you identify which format you...

Understanding SSL Certificate File Formats and ...

SSL Certificate files can be broadly categorized into three main types based on how the data is encoded and stored. Understanding these categories will help you identify which format you...

Understanding the AutoCSR Service for SSL Certificate Orders

Understanding the AutoCSR Service for SSL Certi...

Learn how AutoCSR works, compare it to hosting company practices, find out when automated credential generation is appropriate versus generating your own CSR. Covers security considerations including the Trustico® non-retention...

Understanding the AutoCSR Service for SSL Certi...

Learn how AutoCSR works, compare it to hosting company practices, find out when automated credential generation is appropriate versus generating your own CSR. Covers security considerations including the Trustico® non-retention...

What Is Encrypted Server Name Indication (ESNI)? How Encrypted Client Hello (ECH) Protects Your Privacy

What Is Encrypted Server Name Indication (ESNI)...

The limitations of Encrypted Server Name Indication (ESNI) led to its evolution into Encrypted Client Hello (ECH) in 2020. Encrypted Client Hello (ECH) addresses the shortcomings of its predecessor while...

What Is Encrypted Server Name Indication (ESNI)...

The limitations of Encrypted Server Name Indication (ESNI) led to its evolution into Encrypted Client Hello (ECH) in 2020. Encrypted Client Hello (ECH) addresses the shortcomings of its predecessor while...

Transport Layer Security (TLS) and Cybersecurity

Transport Layer Security (TLS) and Cybersecurity

Every time a browser connects to a website using Hypertext Transfer Protocol Secure (HTTPS), Transport Layer Security (TLS) encrypts the connection to protect data from interception and tampering.

Transport Layer Security (TLS) and Cybersecurity

Every time a browser connects to a website using Hypertext Transfer Protocol Secure (HTTPS), Transport Layer Security (TLS) encrypts the connection to protect data from interception and tampering.

1 / 6