Chained Root SSL Certificates

When connecting to a web site over SSL, the visitor's web browser decides whether or not to trust the SSL Certificate based on which Certification Authority (CA) has issued the actual SSL Certificate. To determine this, the browser looks at its own internal list of trusted Certification Authorities (CA's). These are added into the browser by the browser vendor (such as Microsoft, Netscape and Mozilla).

Technical Information Support

Most SSL Certificates are issued by Certification Authorities (CA's) who own and use their own Trusted Root CA Certificates. We only issue SSL Certificates by trusted Certification Authorities (CA's) - this means they have already been added into the browser by the browser vendor and are regarded as highly trusted. Some newer SSL Certificates (such as Extended Validation (EV) SSL Certificates) may contain a Chained Certificate, however we will only provide Chained Certificates where the Certification Authority (CA) owns the Root Certificate associated with it.

Some Companies Issue Inferior SSL Certificates

Some Certification Authorities (CA's) do not have a Trusted Root CA Certificate present in browsers, or do not use a root that they own, and use a Chained Root in order for their SSL Certificates to be trusted. Essentially a Certification Authority (CA) with a Trusted Root CA Certificate issues a Chained Certificate which inherits the browser recognition of the Trusted Root CA. These SSL Certificates are known as Chained Root SSL Certificates and may now be owned by the SSL Certificate issuer.

A Direct Relationship Is A Sign Of Stability & Trust

For a Certification Authority (CA) to have and use its own Trusted Root CA Certificate which is already present in browsers is a clear sign that they are long time, stable and credible organizations who have long term relationships with the browser vendors (such as Microsoft, Mozilla and Netscape) for the inclusion of their Trusted Root CA Certificates. For this reason, such Certification Authorities are seen as being considerably more credible and stable than Chained Root SSL Certificate providers who do not have a direct relationship with the browser vendors, or do not use their own root certificates to issue SSL Certificates.

You can view the Certification Authorities (CA's) who have and use their own root certificates by viewing the list in your browser. We do not recommend the use of an SSL Certificate from a vendor that does not have a direct relationship with the browser vendor.

Ask Trustico® Assistant

For Instant Answers - Start Here When You Have a Question or Need Help

Securing Your Online Store with SSL Certificates

Securing Your Online Store with SSL Certificates

Trustico® provides the SSL Certificate solutions that online retailers need to establish secure connections, protect customer data, and build the trust that drives conversions.

Securing Your Online Store with SSL Certificates

Trustico® provides the SSL Certificate solutions that online retailers need to establish secure connections, protect customer data, and build the trust that drives conversions.

Trustico® Monitoring Protects Your Search Ranking - SEO and SSL Certificates

Trustico® Monitoring Protects Your Search Ranki...

By detecting issues before search engines encounter them, Trustico® Monitoring maintains the consistent security signals that protect and enhance your SEO investment.

Trustico® Monitoring Protects Your Search Ranki...

By detecting issues before search engines encounter them, Trustico® Monitoring maintains the consistent security signals that protect and enhance your SEO investment.

Trustico® Monitoring : Automatic SSL Certificate Expiration Protection

Trustico® Monitoring : Automatic SSL Certificat...

Trustico® Monitoring is specifically designed to prevent SSL Certificate expiration through an intelligent, multi-tier alert system that gives your business the time and information needed to renew SSL Certificates before...

Trustico® Monitoring : Automatic SSL Certificat...

Trustico® Monitoring is specifically designed to prevent SSL Certificate expiration through an intelligent, multi-tier alert system that gives your business the time and information needed to renew SSL Certificates before...

How GREASE from Google Protects the Future of Secure Connections and SSL Certificate Compatibility

How GREASE from Google Protects the Future of S...

By randomly injecting unknown values into Transport Layer Security (TLS) connections, GREASE ensures that servers and network devices properly handle new protocol features rather than rejecting them.

How GREASE from Google Protects the Future of S...

By randomly injecting unknown values into Transport Layer Security (TLS) connections, GREASE ensures that servers and network devices properly handle new protocol features rather than rejecting them.

Delegated Credentials : The New Standard for Securing SSL Certificate Private Keys at Scale

Delegated Credentials : The New Standard for Se...

Delegated Credentials provide an elegant solution to the private key distribution problem by separating the long-lived SSL Certificate from the short-lived credentials used to actually terminate Transport Layer Security (TLS)...

Delegated Credentials : The New Standard for Se...

Delegated Credentials provide an elegant solution to the private key distribution problem by separating the long-lived SSL Certificate from the short-lived credentials used to actually terminate Transport Layer Security (TLS)...

How Time Synchronization Affects SSL Certificate Validation : Why Incorrect Clocks Cause Certificate Errors

How Time Synchronization Affects SSL Certificat...

When a browser or application connects to a server over HTTPS, it compares these timestamps against the current system time to verify that the SSL Certificate is within its valid...

How Time Synchronization Affects SSL Certificat...

When a browser or application connects to a server over HTTPS, it compares these timestamps against the current system time to verify that the SSL Certificate is within its valid...

1 / 6