About FixMyCert
Why This Exists
PKI shouldn't be this confusing.
Certificate management sounds simple until you're staring at a failed deployment at 2 AM, wondering why the chain isn't validating. Or explaining to a security auditor why that wildcard cert is actually a risk. Or trying to figure out why Venafi isn't provisioning to your F5.
The resources that exist are either:
- Too theoretical — Academic explanations that don't help when something's broken
- Too vendor-specific — Marketing disguised as documentation
- Too basic — "What is SSL?" doesn't help someone debugging mTLS
- Behind paywalls — Email gates, "contact sales," premium tiers
FixMyCert exists because I kept building the same internal documentation at every job. The same troubleshooting guides. The same "here's how this actually works" explanations for teammates.
This site is what I wish existed when I started.
What You'll Find Here
Interactive Demos (50+)
Step-through visualizations that show how PKI concepts actually work. Not videos you passively watch — interactive tools where you control the pace and explore the details.
Topics include: Encryption fundamentals, TLS handshake flow, certificate anatomy, cipher suite decoding, revocation mechanisms (CRL vs OCSP vs stapling), file format conversions
Technical Guides (100+)
Practical, in-depth documentation organized by what you're trying to accomplish.
Platform-specific:
- • F5 BIG-IP — SSL profiles, SNI, troubleshooting
- • Microsoft ADCS — Templates, NDES, ESC attacks
- • Venafi — Discovery, agent vs agentless
- • OpenSSL — Key generation, chain verification
- • Web Servers — nginx, Apache, HAProxy, Traefik
- • Kubernetes — cert-manager setup
Conceptual:
- • Certificate lifecycle management
- • DV/OV/EV validation differences
- • Wildcard certificate risks
- • Certificate transparency
- • Post-quantum cryptography
- • SSH certificates
Troubleshooting & Tools
Real error messages. Actual solutions. The stuff you Google at 2 AM.
Troubleshooting (15+):
- • SSL diagnostic troubleshooter
- • Certificate error decoder
- • Name mismatch resolution
- • Chain validation failures
- • Python/Git/Java SSL errors
Tools (5):
- • CSR Checker
- • SSL/TLS Configuration Checker
- • Certificate Decoder
- • Naming Convention Generator
- • Certificate Inventory Template
Checklists, Compliance & News
Copy-paste procedures and compliance tracking for when things go wrong (or need to go right).
Runbooks (10):
- • Certificate renewal
- • Emergency replacement
- • Key compromise response
- • CA migration
Compliance Hub:
- • CA/Browser Forum deadlines
- • Algorithm deprecation
- • Browser root changes
- • Countdown timers
PKI News:
- • 11 curated sources
- • Browser vendors
- • Certificate authorities
- • Updated daily
The Approach
Every piece of content follows three principles:
Visual First
Cryptography is abstract. Seeing key exchange happen, watching a TLS handshake unfold, or clicking through a certificate's anatomy makes concepts stick in ways that reading RFCs never will.
Practical Focus
Real error messages. Actual commands. The things you'll encounter on the job, not just exam prep. Every guide answers "when would I actually use this?"
No Paywalls
No email gates. No "sign up for the full version." No tracking you across the internet. Just learn.
Who This Is For
Primary audience:
- DevOps and SRE teams managing certificates at scale
- Security engineers implementing PKI policies
- Network engineers configuring SSL on load balancers and proxies
- IT professionals handling certificate requests and renewals
- Developers debugging SSL/TLS issues in applications
You'll get the most value if you:
- Already know certificates exist (this isn't "what is HTTPS")
- Need to actually implement or troubleshoot something
- Want vendor-neutral guidance, not a sales pitch
- Appreciate seeing how things work, not just what buttons to click
What Makes This Different
Vendor-Neutral
I've implemented solutions with Venafi, DigiCert, Sectigo, Microsoft ADCS, Let's Encrypt, and internal CAs. Every platform has tradeoffs. This site explains those tradeoffs honestly.
Operationally Focused
This content comes from implementing certificate management at banks, enterprises, and government agencies — environments where "it works on my machine" isn't acceptable.
Actively Maintained
PKI isn't static. Browser requirements change. Algorithms get deprecated. This site tracks those changes and updates guides when the landscape shifts.
Actually Free
No premium tier. No gated content. Frustrated engineers shouldn't have to expense a subscription to fix a broken certificate chain.
Who Built This
I'm Patrick, a PKI engineer who's spent too many late nights troubleshooting certificate chains, explaining the difference between PEM and PFX, and watching perfectly good deployments break because someone forgot to include the intermediate CA.
I've implemented certificate lifecycle management solutions at major financial institutions, worked with enterprise PKI platforms, and helped organizations prepare for compliance deadlines they didn't know existed.
FixMyCert started as a single interactive demo in late 2025. It's now grown to over 197 pieces of content — demos, guides, checklists, tools — with more added regularly.
Quick Stats
Get In Touch
FixMyCert.com — Interactive PKI education for engineers. Demystifying certificates, TLS, and cryptographic trust since 2025.