What is a Single Root SSL Certificate?
When connecting to a webserver over SSL, the visitor’s browser decides whether or not to trust the website’s SSL certificate based on which Certification Authority has issued the actual SSL certificate. To determine this, the browser looks at its list of trusted issuing authorities – represented by a collection of Trusted Root CA certificates added into the browser by the browser vendor (such as Microsoft and Netscape). Most SSL certificates are issued by CAs who own and use their own Trusted Root CA certificates, such as those issued by GeoTrust and RapidSSL.com. As GeoTrust and RapidSSL.com is known to browser vendors as a trusted issuing authority, its Trusted Root CA certificate has already been added to all popular browsers, and hence is already trusted. These SSL certificates are known as “single root” SSL certificates. RapidSSL.com, a subsidiary of GeoTrust, owns the Equifax root used to issue its certificates. Some Certification Authorities do not have a Trusted Root CA certifi
When connecting to a webserver over SSL, the visitor’s browser decides whether or not to trust the website’s SSL certificate based on which Certification Authority has issued the actual SSL certificate. To determine this, the browser looks at its list of trusted issuing authorities – represented by a collection of Trusted Root CA certificates added into the browser by the browser vendor (such as Microsoft and Netscape). Most SSL certificates are issued by CAs who own and use their own Trusted Root CA certificates, such as those issued by GeoTrust and HomepageUniverse’ partner company. As GeoTrust and our partner company are known to browser vendors as a trusted issuing authority, its Trusted Root CA certificate has already been added to all popular browsers, and hence is already trusted. These SSL certificates are known as “single root” SSL certificates. Some Certification Authorities, like Comodo, do not have a Trusted Root CA certificate present in browsers, therefore they need a “ch
When connecting to a webserver over SSL, the visitor’s browser decides whether or not to trust the website’s SSL certificate based on which Certification Authority has issued the actual SSL certificate. To determine this, the browser looks at its list of trusted issuing authorities – represented by a collection of Trusted Root CA certificates added into the browser by the browser vendor (such as Microsoft and Netscape). Most SSL certificates are issued by CAs who own and use their own Trusted Root CA certificates, such as those issued by GeoTrust and RapidSSL.com. As GeoTrust and RapidSSL.com is known to browser vendors as a trusted issuing authority, its Trusted Root CA certificate has already been added to all popular browsers, and hence is already trusted. These SSL certificates are known as “single root” SSL certificates. RapidSSL.com, a subsidiary of GeoTrust, owns the Equifax Secure eBusiness CA-1 root used to issue its certificates. Some Certification Authorities do not have a T
When connecting to a webserver over SSL, the visitor’s browser decides whether or not to trust the website’s SSL certificate based on which Certification Authority has issued the actual SSL certificate. To determine this, the browser looks at its list of trusted issuing authorities – represented by a collection of Trusted Root CA certificates added into the browser by the browser vendor (such as Microsoft and Netscape). Most SSL certificates are issued by CAs who own and use their own Trusted Root CA certificates, such as those issued by GeoTrust. As GeoTrust is known to browser vendors as a trusted issuing authority, its Trusted Root CA certificate has already been added to all popular browsers, and hence is already trusted. These SSL certificates are known as “single root” SSL certificates. GeoTrust owns the Equifax Secure eBusiness CA-1 root used to issue its certificates. Some Certification Authorities, like Comodo, do not have a Trusted Root CA certificate present in browsers, the
When connecting to a webserver over SSL, the visitor’s browser decides whether or not to trust the website’s SSL certificate based on which Certification Authority has issued the actual SSL certificate. To determine this, the browser looks at its list of trusted issuing authorities – represented by a collection of Trusted Root CA certificates added into the browser by the browser vendor (such as Microsoft and Netscape). Most SSL certificates are issued by CAs who own and use their own Trusted Root CA certificates, such as those issued by GeoTrust and ServersAndDomains’ partner company. As GeoTrust and our partner company are known to browser vendors as a trusted issuing authority, its Trusted Root CA certificate has already been added to all popular browsers, and hence is already trusted. These SSL certificates are known as “single root” SSL certificates. Some Certification Authorities, like Comodo, do not have a Trusted Root CA certificate present in browsers, therefore they need a “c