Solved

Certificate Chain

Posted on 2014-04-14
2
423 Views
Last Modified: 2014-04-15
What is a certificate chain, as opoosed to a certificate
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 29

Assisted Solution

by:becraig
becraig earned 250 total points
ID: 39999816
The certificate chain encapsulates all the certificates in the path:

e.g your certificate : www.domain.com - is your end user certificate

The chain now begins with the SUB CA (certificate authority that might have issues your cert)
e.g.  Verisign Class3 Secure Server xxx

Then unless there is extended validation the root certificate
The root certificate is at the top of the list of certificates on your certificate details tab and is the certificate from the CA that issued your cert.


The certs in the path leading to your certificate is the "chain"
0
 
LVL 37

Accepted Solution

by:
bbao earned 250 total points
ID: 40000697
i believe the IBM explanation below makes it easier.

How certificate chains work
http://publib.boulder.ibm.com/infocenter/wmqv6/v6r0/topic/com.ibm.mq.csqzas.doc/sy10600_.htm
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question