Let’s say you have your own internal Root Certificate Authority (CA) and you use it to grant server certificates to your Web sites.
You are able to browse to your web site over SSL and can access the page. Things look good so far.
However you get an unwanted security alert all the time while accessing the page, stating the following:
“The security certificate was issued by a company you have not chosen to trust.
View the certificate to determine whether you want to trust the certifying authority“
“This certificate cannot be verified up to a trusted certification authority” in the Certificate ->General tab.
And if you have mobile access users they won’t be able to access the page at all :-(, forget the Security alert.
Also if your Web site is Internet-facing, that means both internal as well as external users should be able to access the web site, then you will see a little different behavior.
What does it mean? Well, as the message description above clearly states we do not have information about the Root CA to verify whether it can be trusted for SSL transactions. Since you are using an internal Root CA for your Web site certificates, IE on the external client has no way to verify whether the root CA is trusted or not. IE has a list of default trusted root CA’s.
If you check IE->Tools->Internet Options->Content->Certificates->Trusted Root Certification Authorities, you will see a list of all the public Root CA’s that are trusted by IE client like VeriSign, Go Daddy, Thawte etc.
From an external IE (here assuming IE7) client, If you go to the Certificate Error->View certificates->”Certification Path” as in the above screenshot you should only see the Web site certificate listed.
If you check the above from an intranet client you will see an hierarchy showing both the Root CA and the Web site certificates.
Why the above difference?
Since Intranet client has access to the Internal Root CA they (IE) see the hierarchy of Root CA and the Web site certificate in the Certificate->”Certification Path”,
You will be able to see both the root CA and the Web site certificate as above.
But since root CA is not accessible for the Internet users they will only see the Web site certificate and not the Root CA certificate in the tree in the “Certification Path”. Root CA will be absent altogether in the tree. Or else you will see an entry for the root CA but with a RED X meaning that CA Root certificate is not trusted as it is not in the Trusted Root Certification Authorities store on the client.
You get “This certificate cannot be verified up to a trusted certification authority” when the Certificate Authority is not running or is not visible to the client (IE). This generally happens when client cannot access CA for e.g. running your internal CA and users accessing the web site over Internet.
We will have to install the root CA certificate on to the client computer in order to get rid of the security alert.
For intranet users downloading and installing the .cer of the Root CA into the Trusted Root Certification Authority MAY resolve the issue.
Else, here are the steps to successfully install the root certificate authority on to the client’s trusted CA store:
- On the IIS or Certificate Server, open MMC (Start->Run and type MMC) and add the Certificates snap-in using the Computer Account.
— Expand Certificates
— Expand Trusted Root Certification Authority.
— Right click on the correct Root Certification Authority -> Click Export, which opens the wizard. Choose the following in the wizard:
a) Check “Cryptographic Message Syntax Standard – PKCS #7 Certificates (.P7B)”
b) Check “Include all certificates in the certification path if possible” –> click Next
c) Give it a relevant file name (in our case, say RootCAFileName) and choose the location –> Click Next
d) Click Finish
This will create RootCAFileName.p7b.
— Copy RootCAFileName.p7b to the client.
— It can be installed on the client machine in two ways:
By Right click on the RootCAFileName.p7b file or by using IE via Import.
– Right-click on RootCAFileName.p7b -> Click “Install Certificate” -> Next
– Click “Place all certificates in the following store” -> Browse
– Select “Trusted Root Certification Authorities” -> Ok -> Next
– Click Finish
– Open IE -> Tools menu -> Internet Options
– Go to the Content tab -> Click Certificates
– Go to the “Trusted Root Certification Authorities” tab -> Click Import
– Follow steps in the wizard to browse to the RootCAFileName.p7b file and place it in “Trusted Root Certification Authorities” -> Next
Hope this helps…