What is the SSL Certificate Chain?
There are two types of certificate authorities (CAs): root CAs and intermediate CAs. In order for an SSL certificate to be trusted, that certificate must have been issued by a CA that is included in the trusted store of the device that is connecting.
If the certificate was not issued by a trusted CA, the connecting device (eg. a web browser) will then check to see if the certificate of the issuing CA was issued by a trusted CA, and so on until either a trusted CA is found (at which point a trusted, secure connection will be established) or no trusted CA can be found (at which point the device will usually display an error).
The list of SSL certificates, from the root certificate to the end-user certificate, represents the SSL certificate chain.
Example of an SSL Certificate chain
Here’s a practical example. Let’s suppose that you purchase a certificate from the Awesome Authority for the domain
Awesome Authority is not a root certificate authority. In other words, its certificate is not directly embedded in your web browser and therefore it can’t be explicitly trusted.
- Awesome Authority utilizes a certificate issued by Intermediate Awesome CA Alpha.
- Intermediate Awesome CA Alpha utilizes a certificate issued by Intermediate Awesome CA Beta.
- Intermediate Awesome CA Beta utilizes a certificate issued by Intermediate Awesome CA Gamma.
- Intermediate Awesome CA Gamma utilizes a certificate issued by The King of Awesomeness.
- The King of Awesomeness is a Root CA. Its certificate is directly embedded in your web browser, therefore it can be explicitly trusted.
In our example, the SSL certificate chain is represented by 6 certificates:
- End-user Certificate - Issued to: example.com; Issued By: Awesome Authority
- Intermediate Certificate 1 - Issued to: Awesome Authority; Issued By: Intermediate Awesome CA Alpha
- Intermediate Certificate 2 - Issued to: Intermediate Awesome CA Alpha; Issued By: Intermediate Awesome CA Beta
- Intermediate Certificate 3 - Issued to: Intermediate Awesome CA Beta; Issued By: Intermediate Awesome CA Gamma
- Intermediate Certificate 4 - Issued to: Intermediate Awesome CA Gamma; Issued By: The King of Awesomeness
- Root certificate - Issued by and to: The King of Awesomeness
Certificate 1 is your end-user certificate, the one you purchase from the CA. The certificates from 2 to 5 are called intermediate certificates. Certificate 6, the one at the top of the chain (or at the end, depending on how you read the chain), is called root certificate.
When you install your end-user certificate for
example.awesome, you must bundle all the intermediate certificates and install them along with your end-user certificate. If the SSL certificate chain is invalid or broken, your certificate will not be trusted by some devices.
Frequently Asked Questions
Do I have to install the Root certificate on my server?
No. The root certificate is generally embedded in your connected device. In the case of web browsers, root certificates are packaged with the browser software.
How do I install the Intermediate SSL certificates?
The procedure to install the Intermediate SSL certificates depends on the web server and the environment where you install the certificate.
For instance, Apache requires you to bundle the intermediate SSL certificates and assign the location of the bundle to the
SSLCertificateChainFileconfiguration. Conversely, NGINX requires you to package the intermediate SSL certificates in a single bundle with the end-user certificate.
We provide a certificate installation wizard which contains installation instructions for several servers and platforms. If you purchase a certificate with us you will be able to use this wizard to obtain and install the files you need for your server.
If your server is not on the wizard, you can still obtain the proper files through it and then follow the documentation of your web server to determine how to properly install your domain certificate and intermediate certificates.
What happens if I don’t install an Intermediate SSL certificate?
If you don’t install one or more intermediate SSL certificate, you break the certificate chain. That means you create a gap between a specific (end-user or intermediate) certificate and its issuer. When a device cannot find a trusted issuer for a certificate, the certificate and the entire chain from the intermediate certificate down to the final cerficate can’t be trusted.
As a result, your final certificate will not be trusted. Web browsers will display an “Invalid certificate” or “certificate not trusted” error.
How can I shorten the SSL certificate chain in my browser?
This is not possible. The only way to shorten a chain is to promote an intermediate certificate to root. Ideally, you should promote the certificate that represents your Certificate Authority, in this way the chain will consist in just two certificates.
However, root certificates are packaged with the browser software and the list cannot be altered if not from the browser maintainers.