Skip to main content
    Installation Guide

    How to Install SSL Certificate on Microsoft IIS 5 & 6

    Complete step-by-step guide for legacy Windows Server 2000/2003 systems. From CSR generation to HTTPS configuration—secure your IIS installation.

    My-SSL Security Team
    Updated December 2025
    20 min read

    Legacy System Notice

    Microsoft IIS 5 and 6 have reached end of life. We strongly recommend upgrading to a supported version of IIS for ongoing security updates. Learn about upgrading

    Before You Begin

    This guide covers IIS 5.x (Windows 2000) and IIS 6.0 (Windows Server 2003). Have administrator credentials ready and ensure your domain points to the server. You can use our free CSR Generator or the built-in IIS Certificate Wizard.

    Introduction to IIS 5 & 6 SSL Installation

    Microsoft Internet Information Services (IIS) 5.x and 6.x were the web server platforms for Windows 2000 Server and Windows Server 2003, respectively. While these systems have reached end of life, many organizations still maintain legacy applications on these platforms that require SSL/TLS certificates for secure communication.

    This comprehensive guide walks you through the complete process of installing SSL certificates on IIS 5 and IIS 6—from generating a Certificate Signing Request (CSR) to verifying your installation with our SSL Checker. Whether you're maintaining a legacy intranet application or keeping an older system secure, you'll find step-by-step instructions tailored to these classic Microsoft platforms.

    Understanding how SSL works is essential for securing web traffic on any platform. SSL certificates encrypt data between your visitors' browsers and your IIS server, protecting sensitive information like login credentials and personal data. Even on legacy systems, proper SSL implementation remains critical for security.

    Looking for modern IIS? For IIS 10 and later on Windows Server 2016/2019/2022, see our updated guide: Installing SSL on IIS 10+ (Windows Server 2016/2019/2022).

    Important: Legacy System Considerations

    Before proceeding with SSL installation, please note the following critical information about IIS 5 and IIS 6:

    End of Support Status

  1. IIS 5.x (Windows 2000 Server): Extended support ended July 13, 2010
  2. IIS 6.0 (Windows Server 2003): Extended support ended July 14, 2015
  3. Security Updates: No longer provided by Microsoft
  4. Compliance Issues: May not meet PCI DSS or other regulatory requirements
  5. Upgrade Recommendation

    We strongly recommend upgrading to a modern version of IIS (7.0 or later) running on a supported Windows Server operating system. Modern IIS versions offer:

  6. Improved security features and TLS 1.2/1.3 support
  7. Better performance and management tools
  8. Ongoing security patches and updates
  9. Simplified certificate management with centralized stores
  10. Server Name Indication (SNI) support for multiple SSL sites on one IP
  11. For modern Windows Server installations, see our comprehensive guide: Installing SSL on IIS 10+ (Windows Server 2016/2019/2022).

    If upgrade is not immediately possible, this guide will help you secure your legacy IIS installation as best as possible within its limitations.

    What You'll Need Before Starting

    Before beginning the SSL installation process on IIS 5 or 6, ensure you have the following prerequisites ready:

    Prerequisites Checklist

  12. Administrator Access: Local administrator credentials for the Windows server
  13. IIS Installed and Running: Internet Information Services Manager accessible
  14. Domain Configured: Your domain must resolve to the server's IP address
  15. SSL Certificate Files: Either a pending CSR or your issued certificate files
  16. Intermediate Certificate: CA Bundle/Chain certificate from your Certificate Authority
  17. Server Restart Capability: Some changes require IIS restart or server reboot
  18. If you haven't purchased an SSL certificate yet, browse our SSL certificates to find the right option for your needs. We offer DV, OV, and EV certificates from trusted Certificate Authorities with prices starting at just $2.99/year.

    Step 1: Generate CSR Using IIS (Built-in Method)

    The first step in obtaining an SSL certificate is generating a Certificate Signing Request (CSR) directly within IIS. This method creates a pending request that pairs with the certificate upon installation.

    IIS 6 CSR Generation Steps

  19. Open IIS Manager: Go to Start > Administrative Tools > Internet Information Services (IIS) Manager
  20. Locate Your Website: In the left panel, expand your server name, then expand "Web Sites"
  21. Open Website Properties: Right-click on the website you want to secure, select Properties
  22. Access Directory Security: Click the Directory Security tab
  23. Start Certificate Wizard: Under "Secure communications," click Server Certificate...
  24. Create New Certificate: Select Create a new certificate, click Next
  25. Prepare Request: Choose Prepare the request now, but send it later, click Next
  26. Enter Certificate Name: Provide a descriptive name for the certificate (e.g., "www.example.com SSL 2025")
  27. Select Key Length: Choose 2048 bits (minimum for modern security), click Next
  28. Enter Organization Information:
  29. - Organization: Your legal company name (e.g., "Example Corporation")

    - Organizational Unit: Department (e.g., "IT Department")

  30. Enter Common Name: This is your fully qualified domain name (FQDN)
  31. - Standard certificate: www.example.com or example.com

    - Subdomain: secure.example.com

    - Wildcard: *.example.com

  32. Enter Location Information:
  33. - Country: Two-letter code (e.g., US, GB, CA)

    - State/Province: Full name, not abbreviated

    - City/Locality: Your city

  34. Save CSR File: Specify a filename and location (e.g., C:\certreq.txt), click Next
  35. Complete Wizard: Review the summary and click Finish
  36. IIS 5 CSR Generation Steps

    The process for IIS 5 is nearly identical:

  37. Open IIS Manager: Start > Programs > Administrative Tools > Internet Services Manager
  38. Access Website Properties: Right-click on your website, select Properties
  39. Directory Security Tab: Click the Directory Security tab
  40. Server Certificate: Click Server Certificate... button
  41. Follow the Certificate Wizard: Steps are the same as IIS 6 (steps 6-14 above)
  42. Critical Warning: Do NOT delete the pending certificate request from IIS! If you delete it before installing the issued certificate, you will lose the private key and must regenerate the CSR and reissue the certificate.

    Step 1 Alternative: Generate CSR Using My-SSL Tools

    For greater control over your CSR and to keep a secure copy of your private key, you can use our free CSR Generator tool.

    Benefits of Using External CSR Generation

  43. Secure Private Key Storage: Keep your own backup of the private key
  44. Cross-Platform Compatibility: Generate CSR on any device, install on IIS
  45. Multi-Domain Support: Easily add Subject Alternative Names (SANs)
  46. Verification Tools: Use our CSR Decoder to verify contents
  47. How to Generate a CSR with My-SSL Tools

  48. Navigate to the CSR Generator: Visit our CSR Generator tool
  49. Enter Your Common Name (CN):
  50. - Standard: example.com (covers www automatically)

    - Subdomain: secure.example.com

    - Wildcard: *.example.com

  51. Fill in Organization Details:
  52. - Organization Name: Legal business name

    - Department: Organizational unit

    - City, State, Country

  53. Add SANs (if needed): For multi-domain certificates
  54. Select Key Size: 2048-bit (standard) or 4096-bit (enhanced)
  55. Generate and Save: Download both CSR and Private Key files
  56. Important: Store your private key securely—you'll need it later when importing the certificate into IIS.

    For a complete walkthrough of all our tools, see our Complete Guide to Free SSL Certificate Tools.

    Step 2: Order Your SSL Certificate

    With your CSR ready, you can now order your SSL certificate. The type of certificate you choose depends on your website's needs:

  57. **DV SSL Certificates**: Domain validation only, issued in minutes, ideal for internal applications
  58. **OV SSL Certificates**: Organization validation, displays company name, suitable for businesses
  59. **EV SSL Certificates**: Extended validation, highest trust level, recommended for public-facing sites
  60. Ordering Process

  61. Choose Your Certificate: Select the appropriate SSL type and validity period
  62. Submit Your CSR: Paste the CSR content generated in Step 1
  63. Complete Domain Validation: Verify domain ownership via:
  64. - Email validation (sent to admin@yourdomain.com)

    - DNS validation (add a CNAME or TXT record)

    - HTTP validation (upload a file to your server)

  65. Download Certificate Files: Once validated, download your certificate and CA bundle
  66. For detailed information on validation types, read our guide on SSL Certificate Types.

    Step 3: Install the SSL Certificate (IIS-Generated CSR)

    If you generated your CSR using IIS (Step 1), follow these instructions to process the pending request.

    Processing the Pending Request in IIS 6

  67. Open IIS Manager: Start > Administrative Tools > Internet Information Services (IIS) Manager
  68. Access Website Properties: Right-click the same website where you created the CSR, select Properties
  69. Directory Security Tab: Click the Directory Security tab
  70. Server Certificate: Click Server Certificate...
  71. Process Pending Request: Select Process the pending request and install the certificate, click Next
  72. Browse to Certificate File: Navigate to your downloaded certificate file (.cer or .crt), click Next
  73. Verify Port: The SSL port should be 443 (default), click Next
  74. Complete Installation: Review the summary, click Finish
  75. Processing the Pending Request in IIS 5

  76. Open Internet Services Manager
  77. Right-click Website: Select Properties
  78. Directory Security Tab: Click Directory Security
  79. Server Certificate: Click the button to process the pending request
  80. Select Certificate File: Browse to your .cer file
  81. Complete Wizard: Finish the installation
  82. Important: You must install the certificate on the exact same website where the CSR was generated. The pending request contains the private key reference that's required to complete the installation.

    Step 4: Install Intermediate Certificate (CA Bundle)

    Most SSL certificates require intermediate certificates to establish a complete chain of trust. Without the CA bundle, browsers may show "certificate not trusted" warnings.

    Installing Intermediate Certificates in IIS

  83. Obtain Intermediate Certificate: Download the CA bundle from your Certificate Authority
  84. Open Certificate File: Double-click the intermediate certificate file (.cer or .crt)
  85. Click Install Certificate: The Certificate Import Wizard opens
  86. Select Store Location: Choose Local Machine, click Next
  87. Place Certificate: Select Place all certificates in the following store
  88. Browse for Store: Click Browse, check Show physical stores
  89. Select Intermediate Store: Navigate to Intermediate Certification Authorities > Local Computer
  90. Complete Import: Click OK, then Next, then Finish
  91. Restart IIS: Run iisreset from the command prompt, or restart the server
  92. Multiple Intermediate Certificates

    If your CA provides multiple intermediate certificates:

  93. Install each one following the same process
  94. Order doesn't typically matter, but check your CA's documentation
  95. Some CAs provide a single bundled file containing all intermediates
  96. Step 5: Install Certificate (External CSR with PFX)

    If you generated your CSR externally using our CSR Generator, you'll need to create a PFX file and import it into IIS.

    Creating a PFX File

    A PFX (PKCS#12) file combines your certificate, private key, and intermediate certificates into a single encrypted file.

  97. Use our Certificate Converter: Visit our Certificate Converter tool
  98. Select PEM to PFX Conversion
  99. Provide Required Files:
  100. - Certificate file (.crt or .cer)

    - Private key file (.key)

    - CA Bundle file (optional but recommended)

  101. Set Export Password: Create a strong password for the PFX file
  102. Download PFX: Save the generated .pfx file
  103. Importing PFX into IIS

  104. Copy PFX to Server: Transfer the .pfx file to your Windows server
  105. Open MMC Console: Start > Run > mmc > Enter
  106. Add Certificates Snap-in: File > Add/Remove Snap-in > Certificates > Computer Account > Local Computer
  107. Import Certificate:
  108. - Expand Certificates (Local Computer)

    - Expand Personal

    - Right-click Certificates > All Tasks > Import

  109. Certificate Import Wizard:
  110. - Browse to your .pfx file

    - Enter the password you set during PFX creation

    - Check Mark this key as exportable (optional, for backup)

    - Select Personal store

  111. Complete Import: Click Finish
  112. Binding Certificate to Website in IIS

    After importing the PFX:

  113. Open IIS Manager
  114. Website Properties > Directory Security tab
  115. Server Certificate > Assign an existing certificate
  116. Select Your Certificate: Choose the newly imported certificate from the list
  117. Complete Wizard: Verify SSL port 443 and finish
  118. Step 6: Verify Your SSL Installation

    After installation, verify everything is working correctly.

    Verification Steps

  119. Visit Your Website: Navigate to https://yourdomain.com
  120. Check for Padlock: A padlock icon should appear in the browser address bar
  121. No Browser Warnings: The page should load without security warnings
  122. View Certificate Details: Click the padlock to view:
  123. - Issued to: Your domain name

    - Issued by: Your Certificate Authority

    - Valid dates: Should include current date

  124. Use SSL Checker: Our SSL Checker tool provides comprehensive verification:
  125. - Certificate chain validation

    - Expiration date

    - Protocol support

    - Common issues detection

    Testing with Different Browsers

    Important: Internet Explorer on the server may cache old certificate information. Test with:

  126. External browsers (Chrome, Firefox)
  127. Computers outside your network
  128. Online SSL checking tools
  129. If IE shows the certificate is valid but other browsers show warnings, you likely need to install intermediate certificates (Step 4).

    Step 7: Backup Your Certificate and Private Key

    Always create a backup of your SSL certificate and private key before making any server changes.

    Exporting as PFX File

  130. Open MMC Console: Start > Run > mmc
  131. Add Certificates Snap-in: File > Add/Remove Snap-in > Certificates > Computer Account
  132. Navigate to Certificate: Certificates > Personal > Certificates
  133. Export Certificate: Right-click > All Tasks > Export
  134. Export Wizard:
  135. - Select Yes, export the private key

    - Choose PKCS #12 (.PFX) format

    - Check Include all certificates in the certification path

    - Set a strong password

    - Save to a secure location

    Backup Best Practices

  136. Store PFX files in a secure, encrypted location
  137. Never email PFX files unencrypted
  138. Keep multiple backups (offline and cloud)
  139. Document the password securely
  140. Test restoring from backup periodically
  141. Configure HTTPS and Port 443

    After installing SSL, configure IIS to use HTTPS on port 443.

    Verify SSL Binding

  142. Open Website Properties: Right-click website > Properties
  143. Web Site Tab: Check the SSL Port field shows 443
  144. Multiple IP Addresses: If your server has multiple IPs, ensure the correct IP is bound to the SSL site
  145. To force all traffic over HTTPS:

  146. Website Properties > Directory Security tab
  147. Under Secure Communications: Click Edit
  148. Check "Require secure channel (SSL)"
  149. Optional: Check "Require 128-bit encryption" for stronger security
  150. HTTP to HTTPS Redirect

    For IIS 6, create a redirect using a custom error page or third-party ISAPI filter. A common approach:

  151. Create a simple HTML page with JavaScript redirect
  152. Set it as the default document for an HTTP-only site
  153. The script redirects visitors to the HTTPS version
  154. Alternatively, use URLRewrite or a similar ISAPI extension for server-side redirects.

    Multiple SSL Sites on IIS 5 & 6

    IIS 5 and 6 have limitations with multiple SSL sites compared to modern versions.

    SSL Host Headers (IIS 6 Only)

    IIS 6 supports SSL Host Headers for hosting multiple SSL sites on a single IP:

  155. Assign Certificate to Default Site: First install SSL on your primary site
  156. Configure Host Headers: Use adsutil.vbs script:
  157. ```

    cscript adsutil.vbs set /w3svc/<SiteID>/SecureBindings ":443:www.example.com"

    ```

  158. Repeat for Each Site: Each site needs its own SecureBindings entry
  159. Limitations

  160. IIS 5: Requires a unique IP address for each SSL site
  161. SNI Not Supported: Server Name Indication is only available in IIS 8+
  162. Wildcard Certificates: Can cover multiple subdomains on one IP
  163. SAN Certificates: Can include multiple domains in one certificate
  164. For multiple SSL sites, consider using:

  165. Multiple IP addresses (one per SSL site)
  166. Wildcard SSL certificate for subdomains
  167. Multi-domain (SAN) certificate for different domains
  168. Common IIS SSL Errors & Troubleshooting

    Even with careful installation, you may encounter errors. Here's how to resolve the most common issues:

    Error: "Page cannot be found" on HTTPS

    Causes:

  169. SSL port 443 not configured
  170. Certificate not bound to website
  171. Windows Firewall blocking port 443
  172. Solutions:

  173. Verify SSL port in website properties
  174. Check certificate binding in Directory Security
  175. Add firewall exception for port 443
  176. Error: "Certificate not trusted"

    Cause: Missing intermediate certificates.

    Solution:

  177. Download CA bundle from your Certificate Authority
  178. Install intermediate certificates (see Step 4)
  179. Restart IIS with iisreset
  180. For ISA Server: Full server restart required
  181. Error: "Certificate has expired"

    Cause: Certificate validity period has ended.

    Solution:

  182. Purchase a new certificate or renew
  183. Complete the full installation process
  184. Set up expiry reminders to prevent future issues
  185. Error: "Server's certificate does not match the URL"

    Cause: Certificate Common Name doesn't match the accessed domain.

    Solution:

  186. Use Certificate Decoder to check the CN and SANs
  187. Access the site using the exact domain in the certificate
  188. Request certificate reissuance if needed
  189. Error: "The pending certificate request was deleted"

    Cause: The pending request in IIS was removed before certificate installation.

    Solution:

  190. You must generate a new CSR
  191. Request certificate reissuance from your CA
  192. Never delete pending requests until installation is complete
  193. Error: "Old certificate still appears"

    Cause: Browser or server caching.

    Solutions:

  194. Clear browser cache and cookies
  195. Run iisreset from command prompt
  196. Restart the server completely
  197. Test from a different computer
  198. Error: "Cannot find the certificate request"

    Cause: CSR was generated on a different website or server.

    Solution:

  199. Install certificate on the same website where CSR was created
  200. Or use PFX import method if CSR was generated externally (Step 5)
  201. Setting Up SSL Expiry Reminders

    SSL certificates have limited validity periods. Don't let your certificate expire unexpectedly—use our free reminder service.

    How to Set Up Reminders

  202. Visit our SSL Checker tool
  203. Enter your domain and run the check
  204. After viewing results, enter your email address
  205. Choose notification timing (30, 14, 7 days before expiry)
  206. Click "Set Reminder"
  207. You'll receive email notifications before your certificate expires, giving you time to renew without any security warnings for your visitors.

    Let's Encrypt vs Purchased SSL for Legacy IIS

    Let's Encrypt offers free SSL certificates, but has limitations on legacy IIS systems:

    FeatureLet's EncryptPurchased SSL
    **Cost**FreeFrom $2.99/year
    **Automation**Difficult on IIS 5/6Manual but straightforward
    **Validity**90 days1-2 years
    **Renewal**Manual on legacy IISManual
    **Support**Community onlyProfessional 24/7
    **Validation**DV onlyDV, OV, or EV
    **Warranty**NoneUp to $1.75 million

    Why Purchased SSL May Be Better for Legacy IIS

  208. Longer Validity: Less frequent renewals (1-2 years vs 90 days)
  209. No Automation Required: Manual process works reliably
  210. Professional Support: Help available if issues arise
  211. Warranty Protection: Coverage for certificate-related breaches
  212. Organization Validation: Show company name to visitors
  213. For legacy systems where automation is challenging, the longer validity and professional support of purchased certificates often provides better value.

    Upgrading from IIS 5/6 to Modern IIS

    While this guide helps secure your legacy IIS installation, we strongly recommend planning an upgrade path.

    Benefits of Modern IIS (8.0+)

  214. TLS 1.2 and 1.3 Support: Required by many compliance standards
  215. SNI (Server Name Indication): Multiple SSL sites on single IP
  216. Centralized Certificate Store: Easier certificate management
  217. Better Security: Ongoing patches and updates
  218. Improved Performance: HTTP/2 support, better caching
  219. Migration Considerations

  220. Application Compatibility: Test your applications on newer IIS
  221. Windows Server: IIS 8+ requires Windows Server 2012 or later
  222. Certificate Export: Export PFX backups before migration
  223. DNS Changes: Plan for minimal downtime during cutover
  224. Best Practices for Legacy IIS SSL Management

    Follow these best practices to maintain optimal SSL security on legacy systems:

    Regular Monitoring

  225. Check certificate status monthly using our SSL Checker
  226. Set up expiry reminders for all certificates
  227. Monitor for any browser security warnings
  228. Test from external networks regularly
  229. Security Measures

  230. Use 2048-bit or higher key sizes
  231. Never share or email private keys
  232. Store PFX backups securely (encrypted)
  233. Disable outdated SSL/TLS protocols where possible
  234. Documentation

  235. Document all certificate details (issuer, expiry, domains)
  236. Keep records of renewal dates
  237. Maintain installation procedure notes
  238. Log all SSL-related server changes
  239. Renewal Process

  240. Begin renewal 30+ days before expiry
  241. Generate fresh CSR for each renewal (recommended)
  242. Test thoroughly after installation
  243. Verify on multiple browsers and devices
  244. For a deeper understanding of certificate infrastructure, read our guide on What is PKI?

    Frequently Asked Questions

    How long does it take to install SSL on IIS 5 or 6?

    The technical installation takes 10-20 minutes once you have all the necessary files. The complete process—including CSR generation, certificate ordering, and domain validation—typically takes 30-60 minutes for DV certificates. OV and EV certificates require additional business validation, taking 1-7 business days.

    Can I still get SSL certificates for Windows Server 2003?

    Yes, SSL certificates work independently of your server's support status. You can purchase and install certificates on IIS 5/6 as documented in this guide. However, we strongly recommend planning a migration to supported systems.

    Why did my pending certificate request disappear?

    If you reinstalled Windows, ran certain system tools, or manually deleted it, the pending request may be gone. Unfortunately, you'll need to generate a new CSR and request certificate reissuance from your CA.

    What's the difference between IIS 5 and IIS 6 for SSL?

    IIS 6 (Windows Server 2003) added SSL Host Headers support, allowing multiple SSL sites on a single IP address. IIS 5 (Windows 2000) requires a unique IP for each SSL site. IIS 6 also has better management tools and configuration options.

    Can I use a wildcard SSL certificate on IIS 5/6?

    Yes, wildcard certificates work on IIS 5 and 6. Generate the CSR with *.yourdomain.com as the Common Name, and the certificate will secure all subdomains at that level.

    How do I install multiple SSL certificates on IIS 6?

    Use SSL Host Headers or assign each SSL site to a different IP address. For host headers, use the adsutil.vbs script to configure SecureBindings for each site.

    Why does my certificate work in IE but not in Firefox or Chrome?

    This usually indicates missing intermediate certificates. IE often caches intermediates from previous sessions, while other browsers require the complete chain. Install all intermediate certificates as described in Step 4.

    How do I renew an SSL certificate on IIS?

    The renewal process is essentially the same as initial installation. Generate a new CSR (or reuse the existing one if your CA allows), order the renewal, and install the new certificate. Export a PFX backup before making any changes.

    Can I export my certificate to move it to a new server?

    Yes, export the certificate as a PFX file with the private key included. You can then import this PFX on the new server. See Step 7 for detailed export instructions.

    What TLS versions does IIS 5/6 support?

    IIS 5 supports SSL 3.0 and TLS 1.0. IIS 6 supports SSL 3.0, TLS 1.0, and with registry modifications, TLS 1.1 and 1.2. Note that SSL 3.0 and TLS 1.0 are considered insecure and should be disabled where possible.

    Should I upgrade from IIS 5/6?

    Yes, absolutely. IIS 5 and 6 are no longer supported by Microsoft and don't receive security updates. Modern compliance standards often require TLS 1.2 or higher, which requires newer IIS versions. Plan a migration path to protect your organization.

    How do I disable SSL 2.0/3.0 on IIS 6?

    You can disable insecure protocols via Windows Registry. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols and create keys to disable specific protocols. Always test thoroughly after making registry changes.

    Recommended

    Ready to Secure Your IIS Server?

    Get your SSL certificate and complete the installation

    DV SSL Certificate

    Starting at From $2.99/year/year

    • Quick Issuance
    • 99.9% Browser Trust
    • Free Reissues
    Browse SSL Certificates

    Let's Encrypt vs Purchased SSL for Legacy IIS

    FeatureLet's EncryptPurchased SSL
    CostFreeFrom $2.99/year
    AutomationDifficult on IIS 5/6Manual but reliable
    Validity90 days1-2 years
    RenewalManual on legacy IISManual
    Validation LevelDV onlyDV, OV, or EV
    WarrantyNoneUp to $1.75 million
    SupportCommunity only24/7 professional
    Recommended

    Need Organization Validation?

    Display your company name and build customer trust

    OV & EV SSL Certificates

    Starting at From $29/year/year

    • Organization Validation
    • Company Name Display
    • $1.75M Warranty
    View Business Certificates

    Don't Let Your SSL Expire!

    Legacy systems require extra attention for certificate renewals. Set up free email reminders before your certificate expires—get notified 30, 14, or 7 days in advance.

    Set Up SSL Reminders