Solved

SSL:  What is the difference between a root and intermediate certificate

Posted on 2014-03-24
2
4,033 Views
Last Modified: 2014-03-26
Regarding SSL

What is the difference between a root and intermediate certificate
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 29

Accepted Solution

by:
becraig earned 250 total points
ID: 39951802
The root certificate is the certificate of the publishing authority and is generally valid for a longer duration.

Intermediates certs are usually a shorter life and chain to the root of the certification authority.

Intermediates CA's generally allow issuing of end user certificates allowing less visibility and access to the root as well as less potential for compromise.

The CA you can say acts as a manufacturer, where designs and plans are created and the CA can act as a factory creating models based on designs by the manufacturer for eventual sale provisioning to end users.
0
 
LVL 33

Assisted Solution

by:Dave Howe
Dave Howe earned 250 total points
ID: 39953883
Simpler: A root certificate is self-signed, has the "CA" flag set, and is in the root store for your computer and/or web browser.

An intermediate certificate is one that has the "CA" flag set and is signed by another certificate that has the "CA" flag set (you can have multiple levels of indirection, but to be valid, it must be signed by a valid CA or by a root CA)

an end certificate is one without the CA flag set, hence cannot be used to sign certificates further from the root.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question