Public Key Infrastructure

Digital Key Management

Digital Certificates

TLS/SSL Certificates

Certificate Management

Certificate Authority

Certificate Scanning

Encryption Standards, Regulations, and Algorithms

Certificate Request

Chain of Trust

Certificate Provisioning

Certificate Renewal and Revocation

Crypto Agility

Buying a Certificate from CA

PKI for IoT

Gartner Hype Cycle for IAM Technologies 2020


Control Your Certificates Before They Go Rogue!


Spending too much on PKI Management?

With AppViewX you could save up to $30/certificate! Use our free Savings Calculator to find out how much you could save by automating certificate lifecycle management.

Calculate Savings

Certificate chain (or Chain of Trust) is made up of a list of certificates that start from a server’s certificate and terminate with the root certificate. If your server’s certificate is to be trusted, its signature has to be traceable back to its root CA. In the certificate chain, every certificate is signed by the entity that is identified by the next certified along the chain.

Trusted root CAs are a handful of CAs that are recognized by the clients by default. Server and intermediate certificates meanwhile could be signed by a CA that is not recognized by the browser. In such an event, the root CA could sign the intermediate CA, which in turn could sign the server certificate. Now if the client attempts a connection with a server that has a certificate signed by a trusted intermediate CA, the server’s certificates can be traced back to the root certificate through an intermediate certificate and is thus trusted by the client.

The certificate chain simplifies key management and certificate monitoring by “grouping” CAs into a tree-like structure, where verifying the top or root CA automatically verifies the whole chain.

Share Us
Related Articles:   Links in the Certificate Chain