Category: Database, Security

In the context of the web, whenever the browser connects to a website over https, the browser verifies the TLS certificate of the website to make sure the communication is secure. This process of verifying a TLS certificate requires the web browser, or the operating system, to maintain a trusted database of root certificates. And, starting with the TLS certificate provided by the website, its Issuer is verified by creating a certificate chain/path to a root certificate present in the trusted database.

The success of any Certificate Authority ultimately depends on the platforms and devices where their root certificate is trusted.

Typically, a root certificate is used to sign a bunch of intermediate certificates that can issue certificates to subscribers.

Related Articles