Solved

Certificate Chain

Posted on 2014-04-14
2
429 Views
Last Modified: 2014-04-15
What is a certificate chain, as opoosed to a certificate
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 29

Assisted Solution

by:becraig
becraig earned 250 total points
ID: 39999816
The certificate chain encapsulates all the certificates in the path:

e.g your certificate : www.domain.com - is your end user certificate

The chain now begins with the SUB CA (certificate authority that might have issues your cert)
e.g.  Verisign Class3 Secure Server xxx

Then unless there is extended validation the root certificate
The root certificate is at the top of the list of certificates on your certificate details tab and is the certificate from the CA that issued your cert.


The certs in the path leading to your certificate is the "chain"
0
 
LVL 37

Accepted Solution

by:
bbao earned 250 total points
ID: 40000697
i believe the IBM explanation below makes it easier.

How certificate chains work
http://publib.boulder.ibm.com/infocenter/wmqv6/v6r0/topic/com.ibm.mq.csqzas.doc/sy10600_.htm
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question