How-To Guide

How to Share SSL Certificates Securely

SSL private keys are the crown jewels of your infrastructure. If leaked, an attacker can impersonate your entire domain. Here's how to transfer them safely.

Never share SSL private keys via:

  • • Email (stored in plaintext on mail servers forever)
  • • Slack/Teams DMs (retained in company logs, accessible to admins)
  • • Shared drives (Google Drive, Dropbox — no access visibility)
  • • Jira/Confluence tickets (persisted indefinitely, widely accessible)

Step-by-Step: Secure SSL Certificate Transfer

1

Prepare Your Certificate Files

Bundle your certificate chain. Typically you'll have: server.crt (certificate), server.key (private key), and optionally ca-bundle.crt (CA chain). You can share them individually or as a .pfx/.p12 archive.

2

Upload to EnvShareApp

Go to envshare.app/create. Upload your .pem, .key, .pfx, or .p12 file (up to 25MB). The file is encrypted in your browser using AES-256-GCM before it ever touches the network.

3

Enable Identity Verification

Turn on Email OTP — the recipient must verify their email via a one-time code before downloading. Add domain lock (@yourcompany.com) and geo-fencing for layered security.

4

Set TTL and Send

Set a short expiry (1-24 hours for certificates). Enable burn-on-read for one-time download. Copy the link and share it via your preferred channel.

5

Verify Delivery

Check your audit log to confirm the recipient viewed the certificate. You'll see their IP, country, timestamp, and verification status. The link is now permanently destroyed.

For DevOps Teams: CLI Method

$ npx envshareapp upload server.key --ttl 1h --burn

Encrypted, uploaded, and link generated — all from your terminal.

Share Your SSL Certificate Now

Encrypted. Self-destructing. Identity verified. Free.

Upload Certificate