The Entrust Chain Certificate contains the Entrust Root CA public key and is signed by Entrust Root Certification Authority (CA). Entrust is a Root CA in all major browsers. By installing the Entrust L1E Chain Certificate in your Web server, you create a chain of trust between end users and your Entrust EV Multi-Domain SSL Certificate.
Certificates presented by ATS endpoints are cross signed by Starfield. Some TLS client implementations require validation of the root of trust and require that the Starfield CA certificates are installed in the client's trust stores. Getting Started – DoD Cyber Exchange Address the cross-certificate chaining Issue These instructions walk through adjusting the trust settings on the Interoperability Root CA (IRCA) > DoD Root CA 2 and the US DoD CCEB IRCA 1 > DoD Root CA 2 certificates to prevent cross-certificate chaining issues. This can make it appear that your certificates are issued by roots other than the Create your own client certificates - AWS IoT AWS IoT supports client certificates signed by other root certificate authorities (CA). You can register client certificates signed by another root CA; however, if you want the device or client to register its client certificate when it first connects to AWS IoT, the root CA must be registered with AWS IoT.
Address the cross-certificate chaining Issue These instructions walk through adjusting the trust settings on the Interoperability Root CA (IRCA) > DoD Root CA 2 and the US DoD CCEB IRCA 1 > DoD Root CA 2 certificates to prevent cross-certificate chaining issues. This can make it appear that your certificates are issued by roots other than the
Create your own client certificates - AWS IoT
Client certificate, Server certificate, Intermediate certificate, Root certificate…hell, these terminologies are so confusing that they can make Einstein’s Theory of Relativity look easy. Okay, that’s way too much exaggeration in one sentence but don’t take anything away from their complexity.
Address the cross-certificate chaining Issue These instructions walk through adjusting the trust settings on the Interoperability Root CA (IRCA) > DoD Root CA 2 and the US DoD CCEB IRCA 1 > DoD Root CA 2 certificates to prevent cross-certificate chaining issues. This can make it appear that your certificates are issued by roots other than the Create your own client certificates - AWS IoT