Solved

followup q, installing crt to trusted chain. which one?

Posted on 2014-01-14
1
329 Views
Last Modified: 2014-01-22
Hi there;

This is a followup question,
http://www.experts-exchange.com/Software/Server_Software/Web_Servers/Microsoft_IIS/Q_28316394.html

I complete the import of certificate to IIS and made the binding to 443 properly but I have an issue. I have the error in certification path indicating that it is not signed (and issued) by trusted Root Certification Authority.  OS, I tihnk I am missing to add my crt file to intermediate certification authorities. Am i right in diagnosis?

If so, do you think the answer is this:
http://www.entrust.net/knowledge-base/technote.cfm?tn=8166

Regards.
0
Comment
Question by:jazzIIIlove
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 17

Accepted Solution

by:
Emmanuel Adebayo earned 500 total points
ID: 39778898
You might need to import your third party certificate in the Intermediate Certificate Authority.

The link you mentioned should be the steps to import the third party cert into your ICA, just ensure that you are using your own provider.

Regards
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question