Root Certificates vs. Intermediate Certificates Explained

Sdílet
Vložit
  • čas přidán 12. 06. 2024
  • What is the difference between Root Certificates and Intermediate Certificates? What are trust stores and certificate chains? Venafi Ecosystem Architect Paul Cleary explains everything you need to know!
    Want to learn more? Check out the Venafi blog: bit.ly/3GTcOEn
  • Věda a technologie

Komentáře • 16

  • @irenestanely6462
    @irenestanely6462 Před rokem +4

    awesome explanation!

  • @SnapJD
    @SnapJD Před rokem +1

    Very well stated. Good stuff!

  • @carlosmighty
    @carlosmighty Před 2 lety +6

    Very good explanation.

  • @antdx316
    @antdx316 Před 7 dny

    👍
    So, you have the root cert in a generator and from that it stems? then every next one is in its own gen that stems too? Each had their own set permissions of limitations?

  • @dangaines405
    @dangaines405 Před 5 měsíci

    Well done. Liked and subscribed.

  • @tilla455
    @tilla455 Před 2 lety +1

    So is the chain of trust followed up the web server’s intermediate(s) and root installed certificates? Some descriptions sound like the browser is following the certificate chain on the client (browser)

    • @VenafiCo
      @VenafiCo  Před 2 lety +1

      Thanks for your question! In short, you are correct that the browser is responsible for establishing the chain of trust. To verify a certificate, a browser will obtain a sequence of certificates, each one having signed the next certificate in the sequence, connecting the signing CA’s root to the server’s certificate. For more details, check out this Venafi blog post: www.venafi.com/blog/how-does-browser-trust-certificate?

  • @seasoningfine5562
    @seasoningfine5562 Před měsícem

    Awesome, just need some diagrams for us bad listeners

  • @chadsexinton
    @chadsexinton Před 2 lety +1

    Someone told me that roots cas are powered off and offline . How can it validate back up to the root of this is the case.

    • @VenafiCo
      @VenafiCo  Před 2 lety

      Thanks for your great question! You are correct that for security purposes, the root CA is powered off and offline, and is inaccessible whenever it’s not performing a signing operation on a subordinate CA certificate (aka 99% of the time). That being said, the PUBLIC portion of the Root CA certificate is included in the subordinate CA, plus any end-entity certificate signed by the SubCA. This means validation can continue happening even when the Root CA and/or Intermediate (aka Subordinate) is offline!

    • @chadsexinton
      @chadsexinton Před 2 lety +1

      @@VenafiCo great. Thanks. I'm organization uses venafi and I just started using it daily and I'm trying to learn as much as possible .

    • @switchfox1977
      @switchfox1977 Před 2 lety +1

      @@VenafiCo Thanks very much for the question and the detailed answer. That helped me understand the concept for my company TLS Root plan as well!

  • @kowshikjayakumar8405
    @kowshikjayakumar8405 Před 2 měsíci

    ca we directly certify by root CA removing intermediate certificate

  • @materialgirl338
    @materialgirl338 Před 5 měsíci

    I just happened to get into root certificate and found China Financial

  • @sylviagarcia5794
    @sylviagarcia5794 Před rokem +2

    PeŔfF€Ct

  • @erikvissers4934
    @erikvissers4934 Před 2 lety +2

    Good explanation.