Solved

Certificate Chain

Posted on 2014-04-14
2
417 Views
Last Modified: 2014-04-15
What is a certificate chain, as opoosed to a certificate
0
Comment
Question by:Anthony Lucia
2 Comments
 
LVL 29

Assisted Solution

by:becraig
becraig earned 250 total points
ID: 39999816
The certificate chain encapsulates all the certificates in the path:

e.g your certificate : www.domain.com - is your end user certificate

The chain now begins with the SUB CA (certificate authority that might have issues your cert)
e.g.  Verisign Class3 Secure Server xxx

Then unless there is extended validation the root certificate
The root certificate is at the top of the list of certificates on your certificate details tab and is the certificate from the CA that issued your cert.


The certs in the path leading to your certificate is the "chain"
0
 
LVL 37

Accepted Solution

by:
bbao earned 250 total points
ID: 40000697
i believe the IBM explanation below makes it easier.

How certificate chains work
http://publib.boulder.ibm.com/infocenter/wmqv6/v6r0/topic/com.ibm.mq.csqzas.doc/sy10600_.htm
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
security string in a noisy bar 5 85
Unauthorized Network Devices Appearing on Home Network 20 104
Soundcloud.com 4 23
Decrypt string by php 7 29
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question