A CA certificate (or a Certificate Authority certificate) is a special type of certificate that is used to make...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
a device trust a particular certificate authority. If a device has a certificate installed, then the device will trust any certificates that have been issued by the certificate authority.
In many cases the installation of a CA certificate is unnecessary. Most operating systems already have a number of CA certificates installed by default. These default CA certificates are tied to well-known commercial certificate authorities such as GoDaddy or VeriSign. Therefore, it is only necessary to install a CA certificate if a device needs to trust a lesser known or a home grown certificate authority.
There isn't really a standard procedure for downloading and installing a CA certificate. The method that must be used depends on a number of factors such as the type of server that is being used as a certificate authority, the way that the certificate authority is configured, and the operating system being used on the device on which you want to install the CA certificate.
Windows servers that are configured to act as a certificate authority are commonly configured in a way that allows an administrator to generate and download certificates using a Web interface. The URL for this Web interface is usually https://<the server's FQDN>/CertSRV. There is an option within the Web interface to download a CA certificate.
If the CA certificate is being installed onto a Windows PC, the certificate is installed through the Certificates console. On a Windows 8 PC, you can access the certificate store for the local machine by entering CertLM.msc at the Run prompt. The CA certificate is usually installed into the Trusted Root Certification Authorities of the Third Party Root Certification Authorities container.
You can usually install a CA certificate onto a mobile device by emailing the certificate to someone who has an email account set up on the device. The certificate can be opened as an attachment and will be installed onto the device.
Dig Deeper on Windows Identity and Access Management
Related Q&A from Brien Posey
IT can take a few steps to make the move to Windows 10 easier on users, including considering an in-place upgrade and holding off on any other major ...continue reading
When trying to get to the bottom of virtual desktop problems, IT should turn to root cause analysis tools from vendors such as ControlUp and Lakeside...continue reading
Expert Brien Posey explains how hyper-convergence can help healthcare sites better use desktop virtualization, including for storage and scaling ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.