Client Certificates V/s Server Certificates

In the past I have blogged about various certificate file extensions along with their usage. Here is the link:

I use blogs as reference so that they can refer the content and I need not repeat the same thing every time. Saves time and helps others too.

This time I thought of writing another blog explaining the difference between Client Certificates and Server Certificates. Something which is not clearly understood by everyone. I will be discussing this strictly in context of IIS only. (There are several types of certificates)

One of my colleagues, David Dietz has already published a KB article relating to this:

IIS and client certificates:

The above documentation is good enough to understand the difference between client and server certificates along with error messages associated with them.

Lets start off in an Layman’s language and then I’ll discuss it in complete depth.

  • How are Client and Server Certificates different?

Server Certificates: Server Certificates are used to identify a server. Typically they are issued to hostnames, which could be a machine name (like “PIIS-SVR01”) or a host-header (like “”). Both client and server certificates have the “Issued to” section. For a server certificate the “Issued to” section’s value would specify the hostname for which it has been issued.

Server Certificates serve the purpose of encrypting and decrypting the content.

Server Certificate

Read the highlighted text in the above certificate, it says “Ensures the identity of a remote computer” i.e., “localhost”. This is a self-signed certificate i.e., one issued a certificate to itself. (To be precise where the “Issued to” and the “Issued by” value is same. In the real world only Root-CA’s have self-signed certificates).

Server certificates are stored in the Personal store of the “Local Computer” account.

Note: Certificates can be put in the personal store of a user account. However IIS will always search for the server certificate in the personal store of computer account.

Client Certificates: Client certificates as the name indicates are used to identify a client or a user. They are meant for authenticating the client to the server. In case of a client certificate the value of this field would be set to a users name.

Yes, I know it is a certificate too, but it is not used for encryption or decryption of data, but represents a user identity. Smile Below is a Client Certificate which I issued to myself using my CA (KAUSHAL-CA).

imageClient Certificate

As seen above, the line is more than enough to inform you about the purpose of the certificate.  It reads “Proves your identity to a remote computer”. Here ‘your’ means the user (Kaushal in this context).

  • How are Client and Server Certificates Similar?

The only similarity between them is the keyword “Certificate”. They both contain public and private keys. For that matter, every certificate contains a public and a private key.

  • How does IIS distinguish between Client and Server Certificates?

The above explanation was good enough to explain a user on how to identify client and server certificates. However, this is not how IIS determines it. The best way of determining the purpose of a certificate is to look at its “Enhanced Key Usage” field. (this is a optional field and may not be seen for all the certificate types).

The Enhanced Key Usage field specifies what can the public key of the certificate be used for. If the value is set to “Client Authentication(”then you know what it is used for. Smile

For Server Certificates the value of this filed would be set to:
Server Authentication (”.’

Every certificate has a Object Identifier (OID) associated with it. If you observed the OID for server certificate is “” and for Client Certificate it is “”.

Here is a snippet from RFC 3280

Housley, et. al.          Standards Track                       [Page 40]
RFC 3280       Internet X.509 Public Key Infrastructure        April 2002

id-ce-extKeyUsage OBJECT IDENTIFIER ::= { id-ce 37 }

ExtKeyUsageSyntax ::= SEQUENCE SIZE (1..MAX) OF KeyPurposeId


Key purposes may be defined by any organization with a need. Object identifiers used to identify key purposes MUST be assigned in accordance with IANA or ITU-T Recommendation X.660 [X.660].

This extension MAY, at the option of the certificate issuer, be either critical or non-critical. If the extension is present, then the certificate MUST only be used for one of the purposes indicated. If multiple purposes are indicated the application need not recognize all purposes indicated, as long as the intended purpose is present. Certificate using applications MAY require that a particular purpose be indicated in order for the certificate to be acceptable to that application.

If a CA includes extended key usages to satisfy such applications, but does not wish to restrict usages of the key, the CA can include the special keyPurposeID anyExtendedKeyUsage. If the anyExtendedKeyUsage keyPurposeID is present, the extension SHOULD NOT be critical.

If a certificate contains both a key usage extension and an extended key usage extension, then both extensions MUST be processed independently and the certificate MUST only be used for a purpose consistent with both extensions. If there is no purpose consistent with both extensions, then the certificate MUST NOT be used for any purpose.

The following key usage purposes are defined:

anyExtendedKeyUsage OBJECT IDENTIFIER ::= { id-ce-extKeyUsage 0 }

id-kp OBJECT IDENTIFIER ::= { id-pkix 3 }

id-kp-serverAuth OBJECT IDENTIFIER ::= { id-kp 1 }
-- TLS WWW server authentication

-- Key usage bits that may be consistent: digitalSignature,
-- keyEncipherment or keyAgreement

id-kp-clientAuth OBJECT IDENTIFIER ::= { id-kp 2 }
-- TLS WWW client authentication

-- Key usage bits that may be consistent: digitalSignature
-- and/or keyAgreement

id-kp-codeSigning OBJECT IDENTIFIER ::= { id-kp 3 }
-- Signing of downloadable executable code
-- Key usage bits that may be consistent: digitalSignature

id-kp-emailProtection OBJECT IDENTIFIER ::= { id-kp 4 }
-- E-mail protection
-- Key usage bits that may be consistent: digitalSignature,
-- nonRepudiation, and/or (keyEncipherment or keyAgreement)

id-kp-timeStamping OBJECT IDENTIFIER ::= { id-kp 8 }
-- Binding the hash of an object to a time
-- Key usage bits that may be consistent: digitalSignature
-- and/or nonRepudiation

id-kp-OCSPSigning OBJECT IDENTIFIER ::= { id-kp 9 }
-- Signing OCSP responses
-- Key usage bits that may be consistent: digitalSignature
-- and/or nonRepudiation

snippet of RFC describing the various Object ID’s associated with certificates.
  • How do I know what is the Enhanced Key Usage value for that certificate?  

Double click on the certificate to view it. FYI, it opens with “Crypto Shell Extensions”.

Go to the Details tab and select “Extension Only” from the “Show” drop down box as shown below:


This is a clear indication of the intended purpose of the certificate.

  • Can I use a Server Certificate as a Client Certificate or Vice-Versa?

NO is the answer to this question and its very obvious. If you try importing a client certificate to the IIS 7/7.5 you will receive the following error:


Note: There are certificates which can be issued for multiple purposes like the one shown below. This is meant for both Client and Server Authentication.


Hope this cleared some doubts! Smile

Comments (63)

  1. cron22 says:

    Great post.  you should create a Wiki page with all of these resources for easier discovery by newbies to TLS like me.  But you said something about the account to whose store a certificate has to be imported into based on its purpose.  What if the IIS computer isn't joined to a domain, therefore there are no computer accounts, but only user accounts?  Then?  

  2. Pawan says:

    Very nice article Kaushal. Good work

  3. Raj says:

    excellent explanation. Cleared all my doubts.

  4. Hi Cron,

    Sorry for the late reply. I have been very busy with other stuff and didn't find time to review my blogging space. I didn't understand your question completely. But I will try to clear your doubt.

    So, it doesn't matter whether a certificate is part of a domain or not. Certificates don't require the computer to be part of a domain. You can continue to have certs even if they are not part of any domain.

    To be clear, certificates are just files, which contain some data which is consumed by the crypto services of the OS (Windows/Unix/others)

    Hope this clears. 🙂

  5. Dominik says:

    Every certificate contains a public and a private key? Really? I thought that private keys are private….

  6. Yes! Certificates implement Public Key Cryptography. SO they are bound to have Private and public keys. But, yes the private keys are private and only known to one person who owns the certificate. For example in case of Server certificate, the private key is present on the server only and in case of Client Private key is present only on Client.

    Public key is distributed or is available as part of the certificate.

    1. Gopal says:

      i just accessed in my browser and ssl certificate for domain is enabled with both client and server authentication.

      Server Authentication (
      Client Authentication (

      Ensures the identity of a remote computer
      Proves your identity to a remote computer

      as per my knowledge the browser/client will provide its own certificate to prove its identity to server when client authentication is enabled and server wants to authenticate a client.. so in this scenario while accessing are we presented with any certificate for proving our identity? i guess its not. can you please clarify this thing?

  7. SID says:

    great explanation. looking for this since a long time

  8. vikas says:

    very nice post. very good explanation. detailed and comprehensive. Thanks heaps.

  9. Anirudha says:

    Hello Kaushal,

    Its good see all the details about certificate, thanks.

    I am facing one problem with certificate, I could install certificate thru MMC but I can implement it, bcoz I can see the certificate in Webserver console, RDP console

    Plz help

    Thank you

  10. Hi Anirudha,

    I don't understand the question. Could you provide more details on the problem?

  11. Prasanna Krishnan says:

    Hi Kaushal,

    Thank you for the nice and simple post 🙂

  12. Guan says:

    Great detail post!  I have some questions.  What is the purpose of the certificate with both Server and Client Authentication?  Do you know how to create this type of certificate?  Thanks.

  13. I am not a big fan of having both for the same certificate as they are quite a conflict. But if you try to submit a custom certificate request then you could select both client and server authentication form the dropdown.

  14. mark wfeld says:

    I knew about 90% of that, but was happy to learn the other 10% that is hard to come by in brief form. What resources can you suggest for someone who wants to go further into understanding what all those parts of a certificate do and how they fit together?

    I am currently writing a PowerShell script for an installer to use to creaet a self-signed certificate for SAML token En/Decryption. (Independent of the SSL cert.) The latest APIs, supporting bigger keys, have many parts to them that I really should understand better. Like, why do we lump so much functionality into a process or program called Certreq.exe? What exactly is a certificate request that makes it a likely foundation for doing all those other things it can do?

    See what I mean? I just need to understand the mechanics better and I do not know where to start. It is complexity built on complexity, but I am ready for that.

  15. keshara - from sri lanka says:

    Good article Bro! Thanks for sharing…

  16. Supriya says:

    Awesome blog! Solved the mystery in a matter of seconds! Thanks a lot 🙂

  17. Glad that it helped a lotta folks.. 🙂

  18. reidca says:

    Firstly thanks for your informative blog posts.

    I have been debugging a problem where IE would not allow a client certificate to be used even though the Enhanced Key usage was correct (

    Eventually I stumbled across the KeySpec using CertUtil and it appeared to be set to "KeySpec = 1" which in my understanding is "Key Exchange" which should also include use for "Signature" purposes. However IE would not accept the certificate.

    I solved the problem by requesting a new certificate specifically for "Signature" with "KeySpec = 2" and also including the Enhanced Key usage of (

    I am confused as to how these two properties related and exactly what the Keyspec of exchange means.

    When you use certificate services to request a certificate and the CSP is set to "Microsoft Enhanced Cryptographic Provider" you can choose a KeySpec of "both" however if the provider is "Microsoft RSA SChannerl Cryptographic Provider" then only "Exchange" is selectable.

    Any explanation you can offer for keyspec and how it is used would be very welcome as I have done a lot of research on this area and come up mostly blank.

  19. @reidca the keyspec property governs the usage of the private key associated with the certificate. It plays a trivial role in deciding the fate of the certificate.

    It can have 3 values as shown below


    Value                                                            Meaning


    XCN_AT_NONE (0)                       The intended use is not identified.

                                                          This value should be used if the provider is a Cryptography API: Next Generation (CNG) key storage provider (KSP).


    XCN_AT_KEYEXCHANGE (1)      The key can be used for encryption or key exchange.


    XCN_AT_SIGNATURE (2)           The key can be used for signing


    The corresponding value of keyspec decides what purpose the private key can be used for.

    Here is the MSDN documentation for this:…/aa379020(v=vs.85).aspx


  20. @reidca the keyspec property governs the usage of the private key associated with the certificate. It plays a trivial role in deciding the fate of the certificate.

    It can have 3 values as shown below


    Value                                                            Meaning


    XCN_AT_NONE (0)                       The intended use is not identified.

                                                          This value should be used if the provider is a Cryptography API: Next Generation (CNG) key storage provider (KSP).


    XCN_AT_KEYEXCHANGE (1)      The key can be used for encryption or key exchange.


    XCN_AT_SIGNATURE (2)           The key can be used for signing


    The corresponding value of keyspec decides what purpose the private key can be used for.

    Here is the MSDN documentation for this:…/aa379020(v=vs.85).aspx


  21. ldeakm says:

    Is it possible to create a client authentication certificate which is used to authenticate to say a web service on IIS that can be shared among clients?  I would like to issue a single certificate that is loaded during application installation which can be leveraged by any number of machines for authentication to a web service.  Something like a generic client authentication certificate used by many clients.  Is this possible?

  22. Yes that is possible. You need to distribute the client certificate along with the private key to all the clients. I am not sure on how you planning to do this, but it is possible.

  23. syed shah says:

    Hi Kaushal,

    How would I go about authenticating a Microsoft client certificate from a java application running on tomcat, ideally from the application level. How can I authenticate against the CA server or do I need to to check the authenticity of the client certification?


  24. Hi Syed,

    I'm not sure if I understood your question correctly. What exactly do you mean when you say "Microsoft Client Certificate"

    Are you trying to implement Client Certificate Authentication?

  25. Aradi says:

    Hi Kaushal,

    We have Microsoft CA server  to issue certificates locally. We have been asked to generate three files for the requester:  a root , an intermediate, and user certificates files. Is this possible ?. We usually issue one per CSR request.  How can we do this knowing the server is Unix and Application is Oracle App.

    Thanks alot

  26. @Aradi

    You need not generate the Root CA and the Intermediate CA certs. If you have a CA hosted then they are already present. However depends on whether you have a Root CA or a Intermediate CA. There is a download link provided within the certsrv app to download the certificate chain which consists the CA certificates. This is what you need to send to the users.

  27. Atul Kumar says:

    Very useful information. Please keep it up.

  28. Aradi says:

    Thanks Kaushal , appreciate your answer.

  29. reidca says:


    Thanks for the reply and sorry for the late reply – for some reason i do not get notified when people reply on this which means i have to remember to check it regularly to see whether there has been any updates.

    Anyway, regarding your explanation for KeySpec, am I right in thinking that a KeySpec of 1 should be valid for client authentication or must it be 2? I have mixed experiences getting IE to allow you to choose a certificate for Client Auth with some working OK with KeySpec 1 and some needing 2. The EKU has always been correct.

    I have tried to setup a test certificate template using "Microsoft Enhanced Cryptographic Provider" that allows us to request a KeySpec of Both but have been unable to do so. The "Both" option is never presented and one must always choose between Exchange and Signature.

    The blog post here:…/troubleshooting-403-7-client-certificate-required-errors-amp-step-by-step-to-make-sure-your-client-certificate-is-displayed-and-selected.aspx shows that this is required.

    Thanks for your continued help.


  30. Rajeev says:

    Hi Kaushal,

    I have created SSL mutual certificate for client and server in one machine. Whn i tried to access or to consume that service in another machine, I am getting "The page requires a client certificate "  error. can you please guide me in this.

    Thank You!


  31. the first line you said it self answers your problem. You cannot have a mutual Client and Server certificate. This doesn't make sense. Please create separate certificates for client and server with corresponding EKU.

  32. reidca says:

    @Kaushal, in respect of your answer to the Rajeev you can have an SSL certificate that has both EKUs.

    Nothing I am aware of says this is not possible. In fact the SSL certificate we use on our main web site (issued by a trusted CA has both these uses)

    Server Authentication (

    Client Authentication (

    We have successfully done this many times in the past.

    Are you able to advise regarding my KeySpec question?



  33. Mahesh says:

    Hi Kaushal,

                        From one of your replies —

    "Kaushal Kumar Panday 13 Nov 2013 12:20 PM #

    I am not a big fan of having both for the same certificate as they are quite a conflict. But if you try to submit a custom certificate request then you could select both client and server authentication form the dropdown."

    Can you be a bit more elaborate on the procedure to get such combi certificate. Thanks in advance.

  34. @reidca

    You can get certificate for multiple EKU's and still use it. This would work fine for a Server Certificate. Not diverting from the topic further.

    The KeySpec should be set to 1 and not 2. We set it 2 during signing of assemblies. Look at this:…/aa379020(v=vs.85).aspx

    KeySpec is not the only deciding factor though.

    While generating a client cert the EKU should only be set to Client Authentication ( Also pay attention to the Key Usage fields.


    See this:…/ff625722(v=ws.10).aspx

  35. heeradhar Dhiwar says:

    How to get only CA certified certificate on store ? when we use certificate for Login or any other purpose  then it can show ca certified certificate as well as system generated certificate then how can we allow only USB Token Certificates will available ??

    Heeradhar Dhiwar

  36. The client will always provide you options via a prompt to choose the required certificate.

    The authentication/authorization piece could be done at the web server or the application level.

    In IIS this is done via mappings. You could allow specific certificate only (this is one to one mapping) or allow a certificate from a specific CA (Many to one mapping)

    In application you could do the above yourself, by verifying either the thumbprint or the issuer field or both for the provided certificate. The choice is always yours.

  37. Selami Ozlu says:

    what are the certificate purposes for a LDAP SSL certificate?

  38. @Selami.. What is the certificate being used for.. There is nothing as "LDA Certificate" What are you using the certificate here for? Is it for authentication/Digital Signature or others?

    This article lists out couple of OOID's:…/287547

    See this wiki article:…/X.509

  39. starix says:

    Hi Kausal,

    For digital signature and encryption, are we using server certificate as well?

    anything extra need to be done in order to enable the server certificate for digital signature or encryption?

    Server certificate is the one we used for SSL channel?

  40. Douglas Marzano says:

    The only part of the document I disagree with is the following statement  "The only similarity between them is the keyword “Certificate”. They both contain public and private keys. For that matter, every certificate contains a public and a private key. "   — Certificates are used to validate the public portion of a public/private key pair — A certificate does not contain a private key — it contains the public portion of the pair —  At least that is my understanding

  41. @Douglas Certificates are implementation of PKI which invovles Public & private keys. If a Certificate has a puiblic key, it is bound to have a private key. However when the certificates are clubbed with their private keys the file extension changes. I have explained it here:…/ssl-certificates.aspx

  42. Kabir says:

    There are two ways we use certificate – One is importing in keystore using keytool command , other is server dynamically download the certificate, technically how the the latter part happens?

  43. @Kabir: What certificate re you referring to? I am not aware of mechanism where the Server will download a cert.

  44. Gaurav Dongre says:

    =>I am seeing list of certificates while i browse the website. I am using client certificate.

    =>Checked configuration editor in that system.webServer/security/authentication/iisClientCertificateMappingAuthentication-> webconfig

      Settings are as follows:

            many to one enable=true count =0

            one to one enable=true count=0

    =>We are getting list of certificates only when we browse website for first time not for subsequent/all pages.

  45. thulasi v says:

    Hi Kaushal Kumar ,

    The description what you are sharing regarding digital certificates is fantastic and clear to understand for the newbies like me. I have a question to ask , please help me. I am trying to generate a new Digital Certificate using Elliptic Curve Cryptography by revisiting through the OpenSSL Libraries.

    The question(s) am writing here :

    1. How can i know to change what piece of code from what file to achieve some task, for example i want to make the generated digital certificate should be ecc signed means ecdsa signed instead of rsa ,, for these kind of kinds how can i recognize the file name/piece of code within the stipulated time  ?

    2.How can i sign an email using pgp and how can i replace the sha-1 to sha-3 algorithm.I mean which file to modify ?

    3. I have a bit confusion about the three self-signed certificate , client certificate and server certificate from the document ?

    Please explain as soon as possible 🙂

  46. thulasi v says:

    Sorry to write one more question :

    I want to download a CA free version certificate for an academic project purpose .I found that without a domain name the CA's like comodo, etc.. are not suppose to issue the certificate , If i want to download that

    Do i have to create a domain name and then download it or Is there any way to download that as a normal user ?

  47. Divya says:

    Hi Kushal,

    I have a certificate that has both "Server Authentication" and "Client Authentication" purposes in the Enhanced Key Usage. Can I use this cert for client authentication even if I dont have the private key associated with it.

    My problem is – I added the cert to the store using certuitl commands. But still it won't show up in the list when chromium / chrome wants to send the client auth cert to the server.

    Thank you for your help


  48. Mitchel says:

    I amtrying to implement client certificate authentication in IIS, its not happening can someone help me with the step by step process or a video recording with 1 working example.

  49. @Mitchel

    I don't have any post on configuring Client Certificates. You may refer the following article on IIS.NET:…/iisclientcertificatemappingauthentication…/clientCertificateMappingAuthentication

  50. Venkat says:

    Does client certificate requires server certificate? say for example, my server wants to validate only clients. Clients does not need to worry about they are talking to correct server. So I require only client authentication. In this case, only client certificate is enough?

  51. Seema says:

    In conventional client/server environment (2-tier), can we use / embed digital certificates in application to secure the communication, in addition to application layer security? Please guide.

  52. @Seema.. yes you could.. This is also known as Mutual Auth or Client Certificate Auth. See this:…/iisclientcertificatemappingauthentication

  53. Steve SpiritAero says:

    Does Microsoft have any data on percentage of Client Authentication Certificates that break or become corrupt in a Large Organization (10, 000 users to 20,000 users). Currently we have issues with about 1 percent of our user population of about 17, 000 users.

  54. Nidaye says:

    Thanks@! very useful

  55. Ghazan Haider says:

    This helped resolve an issue I was debugging for hours with openssl.
    Thank you.

  56. selena mefford says:

    Just awesome topic! Thanks for the info, super helpful. BTW, there is an online service through which you can fill out a TX TREC 37-5, the fillable blank is here

  57. Syed Emad says:

    Hi and thanks for this article. Old but useful. I would like to extend the question asked by Shah by saying that we have digicert installed on server and i wish to use 1to1 client server mapping. My client is android on which i can embed the client cert in application. How can i get client certificate using digicert. Thanks

  58. Binh Thanh Nguyen says:

    Thanks, nice post

  59. Very good post Kaushal, thank you very much for sharing.

    Just one thing isn’t clear for me. You told that Enhanced Key Usage is an optional filed. If I have a certificate that does not have this field, is there any problem to use it as a client certificate? Nowadays I use this cert as server certificate, but I also want to use it as Client certificate for some applications.


  60. bypass says:

    If i got a normal server ssl certificate for a domain name from AstraGate Domain Services (AGDS), then can I use that certificate as an intermediate certificate and write some of my own certificates for other domain names? Also AGDS provide’s an intermediate certificate of their own along with the certificate delivery, and so would I be able to provide the AGDS intermediate cert, the AGDS issued cert (but used as an intermediate also), and the cert I issued for the 2nd domain name to another hosting server where another website is?

  61. mnkartik says:

    Very well explained about the differences. Thank you Kaushal.

  62. Josie says:

    Hi Kaushal, thank you so much for this detailed information. I don’t know if you can provide assistance with this current issue I’m looking at, but if you can it would be so helpful as I’ve been kind of banging my head against a wall.

    I’ve worked with ssl server certificates for a while from an admin/deploy perspective, but am currently trying to get more into the weeds on specific certificate settings because of a specific problem I’m seeing with deployment of a Client Certificate. We are using Chef to deploy certificates to our Windows Servers. The Chef Client service logs in with LocalSystem (by default). We are having problems with only the Client Certificates. It will install it properly the first time, and configure the private key permissions (adds iis_iusrs R). The next time the chef client runs it seems like it can’t read the properties of the private key, so then attempt to setup the private key permissions again, and something goes wrong, the key permissions end up in an unreadable state (The requested security information is either unavailable or can’t be displayed).

    If I change the Chef Client service so it uses a domain account (in the local server’s administrator group), or the local administrator account, this does not happen. If I run the service manually using my account (again in the local server’s administrator group), again, no problem. We don’t have this same problem with the Server Certificates we deal with, just this one Client Certificate.

    I’m still trying to investigate the settings on these client certificates to see if there is something that keep the localsystem account from reading the private key properties properly, but ran across this blog and thought I’d see if this behavior makes any sense to you.

    Thank you!

Skip to main content