1. Paste the contents of the certificate request file into the area they designate and make sure the web server type is properly set. The request files contents will look similar to the following:
-----BEGIN NEW CERTIFICATE REQUEST-----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-----END NEW CERTIFICATE REQUEST-----
2. Certificate Authority validation techniques vary. Typically an email is sent to the contacts listed in the WhoIS information for the domain name. Additionally, to support large IT infrastructures, an email is sent to if SSLAdmin @ the domain name. Usually, there is a link in the email that must be clicked on to confirm that the request is valid.
3. Depending on the Certificate Authority, the confirmation link will either have a reply certificate or it will be emailed to you.