Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Certificate Chain

Posted on 2014-04-14
2
Medium Priority
?
448 Views
Last Modified: 2014-04-15
What is a certificate chain, as opoosed to a certificate
0
Comment
Question by:Anthony Lucia
2 Comments
 
LVL 29

Assisted Solution

by:becraig
becraig earned 1000 total points
ID: 39999816
The certificate chain encapsulates all the certificates in the path:

e.g your certificate : www.domain.com - is your end user certificate

The chain now begins with the SUB CA (certificate authority that might have issues your cert)
e.g.  Verisign Class3 Secure Server xxx

Then unless there is extended validation the root certificate
The root certificate is at the top of the list of certificates on your certificate details tab and is the certificate from the CA that issued your cert.


The certs in the path leading to your certificate is the "chain"
0
 
LVL 37

Accepted Solution

by:
bbao earned 1000 total points
ID: 40000697
i believe the IBM explanation below makes it easier.

How certificate chains work
http://publib.boulder.ibm.com/infocenter/wmqv6/v6r0/topic/com.ibm.mq.csqzas.doc/sy10600_.htm
0

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Securing your business data in current era should be your biggest priority. Numerous people are unaware of the fact that insiders commit more than 60 percent of security breaches. You need to figure out the underlying cause and invoke your potential…
The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question