Curated articles, resources, tips and trends from the DevOps World.
Summary: This is a summary of an article originally published by the source. Read the full original article here →
In the context of the web, whenever the browser connects to a website over https, the browser verifies the TLS certificate of the website to make sure the communication is secure. This process of verifying a TLS certificate requires the web browser, or the operating system, to maintain a trusted database of root certificates. And, starting with the TLS certificate provided by the website, its Issuer is verified by creating a certificate chain/path to a root certificate present in the trusted database.
The success of any Certificate Authority ultimately depends on the platforms and devices where their root certificate is trusted.
Typically, a root certificate is used to sign a bunch of intermediate certificates that can issue certificates to subscribers.
Made with pure grit © 2024 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com