Not Receiving E-Mails

If you have placed an order with Trustico® and have not received the expected e-mails, this page will help you quickly resolve the issue.

Most e-mail delivery problems are caused by spam filters, and many actions such as resending validation e-mails or downloading invoices can be completed directly through your account without waiting for e-mail.

When Trustico® sends an e-mail, it leaves our servers and is delivered to your mail server. If the e-mail is missing from your inbox, the issue is almost certainly on your side. Trustico® does not selectively withhold or fail to deliver e-mails.

In most cases, non-delivery is resolved by checking your spam folder, adjusting your e-mail filters, or contacting your hosting provider to whitelist our domains.

Check Your Spam and Junk Folders First

The most common reason for missing e-mails is spam filtering. Please check your spam, junk, or quarantine folder for e-mails from the following domains :

  • trustico.com
  • sectigo.com
  • trust-provider.com

If you find our e-mails there, mark them as "Not Spam" to ensure future messages reach your inbox.

Corporate e-mail systems often have additional security filtering, so you may need to contact your IT department to whitelist these domains at your organisation's e-mail gateway.

Validation and Approval E-Mails

If you are waiting for a Domain Control Validation (DCV) e-mail or your SSL Certificate approval e-mail, you do not need to wait for e-mail delivery. The Trustico® tracking system allows you to resend validation e-mails, change your validation method, and download your approved SSL Certificate files directly upon issuance.

It should be noted that e-mails sent by the Certificate Authority (CA) are outside of our control and can take as long as 15 minutes to be received during peak periods. At any time you can resend validation e-mails via our tracking system, though usually it will invalidate any previous validation codes sent.

To access the tracking system, use the tracking link provided in your order confirmation e-mails or visit our tracking page. Enter your Certificate Authority (CA) reference and the domain name associated with your order.

From the tracking interface, you can view your order status, resend the validation e-mail to a different approver address, switch to an alternative validation method that does not require e-mail, and download your SSL Certificate once it has been issued. Learn About SSL Certificate Tracking & Management 🔗

Alternative Validation Methods

If e-mail-based validation is problematic for your situation, two alternative methods are available that bypass e-mail entirely.

CNAME validation requires you to add a specific DNS record to your domain, which proves domain ownership without any e-mail communication.

File-based authentication requires you to place a verification file on your web server, which the Certificate Authority (CA) will check to confirm your control of the domain.

Both methods can be selected through the tracking system. Once you choose an alternative method, the system will provide the specific details you need to complete validation. Discover File-Based Authentication 🔗

Order Confirmations and Invoices

If you need your order confirmation or invoice and have not received them by e-mail, you can access these documents directly through your Trustico® account.

Log in to the ordering system and navigate to your order history. Select the relevant order to view your order details, download your invoice, and access any other documentation related to your purchase.

Whitelist Trustico® E-Mail Domains

To prevent future delivery issues, add the following domains to your safe senders list :

  • trustico.com
  • sectigo.com
  • trust-provider.com

In most e-mail clients, you can do this through the settings or preferences menu under spam filtering or safe senders options. Adding these domains ensures that all future communications from Trustico® and our Certificate Authority (CA) partners will reach your inbox.

Still Need Help?

If you have checked your spam folder, attempted to use the tracking system, and are still experiencing issues, please contact the Trustico® support team.

Have your order number or Certificate Authority (CA) reference ready when you contact us, and let us know which specific e-mails you are missing so we can investigate and assist you promptly. View Our Contact Information 🔗

Most Popular Questions

Resolve missing e-mail issues when you have not received validation, approval, or order confirmation e-mails from Trustico® by checking spam folders, using the tracking system, or switching validation methods.

Why am I not receiving e-mails from Trustico® after placing my order?

Missing e-mails are almost always caused by spam filters on your side. Check your spam, junk, or quarantine folder for e-mails from trustico.com, sectigo.com, and trust-provider.com. If you find them there, mark them as "Not Spam" to ensure future delivery.

How can I resend my SSL Certificate validation e-mail?

Log in to the Trustico® tracking system using your Certificate Authority reference and domain name. From there, you can resend the validation e-mail to a different approver address or switch to an alternative validation method. Note that resending will typically invalidate any previous validation codes.

What should I do if my corporate e-mail system blocks validation e-mails?

Contact your IT department to whitelist trustico.com, sectigo.com, and trust-provider.com at your organisation's e-mail gateway. Alternatively, use the Trustico® tracking system to switch to CNAME or file-based validation methods that bypass e-mail entirely.

How do I get my invoice if I did not receive it by e-mail?

Log in to the Trustico® ordering system and navigate to your order history. Select the relevant order to view your order details and download your invoice directly without waiting for e-mail delivery.

What alternative validation methods are available if e-mail validation is not working?

Trustico® offers two alternatives: CNAME validation requires adding a specific DNS record to your domain, while file-based authentication requires placing a verification file on your web server. Both methods can be selected through the tracking system and prove domain ownership without any e-mail communication.

Which e-mail domains should I whitelist to receive Trustico® communications?

Add trustico.com, sectigo.com, and trust-provider.com to your safe senders list. This can typically be done through your e-mail client's settings under spam filtering or safe senders options, ensuring all future communications reach your inbox.

Ask Trustico® Assistant

For Instant Answers - Start Here When You Have a Question or Need Help

SSL Certificate Validity Periods Are Changing to 200 Days

SSL Certificate Validity Periods Are Changing t...

The reduction in SSL Certificate validity periods is driven by the need to regularly confirm that the Certificate holder is still entitled to use the SSL Certificate. No new Certificate...

SSL Certificate Validity Periods Are Changing t...

The reduction in SSL Certificate validity periods is driven by the need to regularly confirm that the Certificate holder is still entitled to use the SSL Certificate. No new Certificate...

SSL Certificate Works on WWW but Not Root Domain : Troubleshooting Guide

SSL Certificate Works on WWW but Not Root Domai...

Several server configuration problems can cause SSL Certificates to work on the www version but fail on the non-www version of a domain. Understanding these causes helps identify the specific...

SSL Certificate Works on WWW but Not Root Domai...

Several server configuration problems can cause SSL Certificates to work on the www version but fail on the non-www version of a domain. Understanding these causes helps identify the specific...

Understanding SSL Certificate File Formats and Extensions

Understanding SSL Certificate File Formats and ...

SSL Certificate files can be broadly categorized into three main types based on how the data is encoded and stored. Understanding these categories will help you identify which format you...

Understanding SSL Certificate File Formats and ...

SSL Certificate files can be broadly categorized into three main types based on how the data is encoded and stored. Understanding these categories will help you identify which format you...

Understanding the AutoCSR Service for SSL Certificate Orders

Understanding the AutoCSR Service for SSL Certi...

Learn how AutoCSR works, compare it to hosting company practices, find out when automated credential generation is appropriate versus generating your own CSR. Covers security considerations including the Trustico® non-retention...

Understanding the AutoCSR Service for SSL Certi...

Learn how AutoCSR works, compare it to hosting company practices, find out when automated credential generation is appropriate versus generating your own CSR. Covers security considerations including the Trustico® non-retention...

What Is Encrypted Server Name Indication (ESNI)? How Encrypted Client Hello (ECH) Protects Your Privacy

What Is Encrypted Server Name Indication (ESNI)...

The limitations of Encrypted Server Name Indication (ESNI) led to its evolution into Encrypted Client Hello (ECH) in 2020. Encrypted Client Hello (ECH) addresses the shortcomings of its predecessor while...

What Is Encrypted Server Name Indication (ESNI)...

The limitations of Encrypted Server Name Indication (ESNI) led to its evolution into Encrypted Client Hello (ECH) in 2020. Encrypted Client Hello (ECH) addresses the shortcomings of its predecessor while...

Transport Layer Security (TLS) and Cybersecurity

Transport Layer Security (TLS) and Cybersecurity

Every time a browser connects to a website using Hypertext Transfer Protocol Secure (HTTPS), Transport Layer Security (TLS) encrypts the connection to protect data from interception and tampering.

Transport Layer Security (TLS) and Cybersecurity

Every time a browser connects to a website using Hypertext Transfer Protocol Secure (HTTPS), Transport Layer Security (TLS) encrypts the connection to protect data from interception and tampering.

1 / 6