CyberArk Glossary >

What is a Certificate Chain?

The certificate chain of trust refers to a TLS/SSL certificate and how it is linked back to a trusted certificate authority. It is made up of a list of certificates that begins with a server’s certificate and ends with the root certificate. A certificate chain of trust is a crucial aspect of Public Key Infrastructure (PKI), which underpins various security services like data confidentiality, integrity, and user authentication. These services fundamentally rely on the correct application of public/private key pairs.

A certificate chain consists of a sequence of certificates, typically beginning with an end-entity certificate and followed by one or more CA (Certificate Authority) certificates, culminating in a self-signed certificate. Key characteristics include:

  • The issuer of each certificate in the chain (except the last one) corresponds to the subject of the subsequent certificate.
  • Each certificate (except the final one) is meant to be authenticated by the secret key associated with the next certificate in the chain, allowing the signature of one certificate to be verified using the public key in the next.
  • The final certificate in the chain is a trust anchor: a trusted CA certificate obtained through a reliable method. This trust anchor, essentially the public verification key of a CA, serves as the foundational point for path validation by the relying party.

The term “chain of trust” in the context of TLS/SSL certificates refers to the connection of your certificate to a trusted Certificate Authority (CA). For a TLS certificate to be considered trustworthy, it must have a clear path back to its root of trust, the original CA that validated it. This means that every certificate in the chain – including the server, intermediate, and root certificates – must be reliably authenticated. The certificate chain of trust consists of three key components:

  1. Root Certificate: This is a digital certificate issued by the Certificate Authority (CA). Most browsers come pre-installed with these root certificates, which are stored in a “trust store.” CAs meticulously safeguard these root certificates.
  2. Intermediate Certificate: These certificates function like tree branches stemming from the root certificates. They serve as intermediaries, linking the secure root certificates to the server certificates that are distributed to the public. In any certificate chain, there’s always at least one intermediate certificate, but sometimes there are multiple.
  3. Server Certificate: This certificate is specifically issued for the domain that requires coverage, provided to the end-user or the website

How do Certificate Chains work?

Upon installing your TLS certificate, you will receive an intermediate root certificate or a bundle. When a browser accesses your website and retrieves the TLS certificate, it starts the process of linking this certificate back to its root. This begins with the intermediate certificate and continues backtracking to a trusted root certificate. A valid certificate that successfully chains back to a trusted root will be accepted by the browser. Conversely, if the chain doesn’t lead to a trusted root, the browser will display a warning. Effective certificate management is key to ensuring that each certificate is valid and correctly chained.

How to troubleshoot Certificate Chain issues

If the certificate chain hasn’t been configured correctly, you will encounter errors related to the trust chain of your certificate. Here are some things to address if you encounter trust chain errors:

  • Verify the Certificate Authority (CA): Confirm that your TLS certificate has been issued by a trusted Certificate Authority (CA). If it hasn’t, web browsers will not trust your TLS certificate. This is also a concern if you’ve self-signed your certificate.
  • Ensure Correct Installation of Intermediate Certificates: It is imperative to install intermediate certificates accurately. While some browsers may attempt to fill gaps in the certificate chain, it is not advisable to rely on chance. Ensure the successful installation of all intermediate certificates when setting up your TLS certificate.
  • Configure Your Server: Merely installing your TLS certificate and its associated intermediates represents just one aspect of the process. Equally critical is configuring your server correctly to seamlessly integrate with the certificate. Proper server configuration is essential to ensure that your TLS certificate operates as intended.

Learn more about machine identity security, and how it can benefit your organization!

OTHER GLOSSARY ENTRIES