The intermediate CA certificate (and the root certificate sometimes) is not presented to browsers. Only the assigned SSL network certificate is shown, so the browser does not accept the certificate as trusted, although the certificate should be trusted automatically.
When the SSL certificate is assigned to the Universal Server Network Interface, the Universal Server automatically searches the Trusted Keys for the Intermediade CA and Root CA certificates. If these are found, the PGP Universal Server then combines these certificates and serves these as soon as a browser requests the SSL certificate.
If the Root CA or Intermediate CAare not in the Trusted Keys when saving the certificate to the Network Interface, only the end certificate is assigned to the interface. Also importing the CA certificates later does not change this.
Make sure, all intermediate and root CA certificates are imported to Trusted Keys. Afterwards go to System > Network and select the correct interface. Now assign None certificate to this interface and click Save. After this, return to the same page and re-assign the correct network certificate again and click Save. Now the whole certificate chain should be presented to the end users internet browser.
Imported Document Id
This is machine translated content
Login to Subscribe
Please login to set up your
For security reasons, your link to this document has expired. Please click on the attachment link to access this file.
The attachment that you are looking for no longer exists.
There has been an issue retrieving your attachment. Please try again.
Currently server is down.
Didn't find the article you were looking for? Try these resources.