What is a certificate authority (CA)? (2024)

What is a certificate authority (CA)?

A certificate authority (CA) is a trusted entity that issues Secure Sockets Layer (SSL) certificates. These digital certificates are data files used to cryptographically link an entity with a public key. Web browsers use them to authenticate content sent from web servers, ensuring trust in content delivered online.

As providers of these certificates, CAs are a reliable and critical trust anchor of the internet's public key infrastructure (PKI). They help secure the internet for both organizations and users.

The main goal of a CA is to verify the authenticity and trustworthiness of a website, domain and organization so users know exactly who they're communicating with online and whether that entity can be trusted with their data.

When a CA issues a digital certificate for a website, users know they are connected with an official website, not a fake or spoofed website created by a hacker to steal their information or money.

Key roles of a certificate authority

As an integral part of PKI, a CA plays multiple crucial roles:

  • issues digital certificates;
  • helps establish trust between communicating entities over the internet;
  • verifies domain names and organizations to validate their identities; and
  • maintains certificate revocation lists.

Every CA charges a small fee to complete the verification process and issue a digital certificate following the process explained below.

What is a certificate authority (CA)? (1)

How a digital certificate works

A digital certificate primarily acts as a credential to validate the identity of the entity it is issued to. It also encrypts and secures communication over the internet and maintains the integrity of documents signed with it, ensuring third parties cannot alter the documents while they are in transit.

A digital certificate contains information about the entity to which it has been issued. Typically, that includes its name, contact information, organization, domain name, public key, certificate issue and expiry date, and more. The name of the issuing CA and its digital signature are also normally included in the digital certificate.

In the digital certificate, the digital signature proves that a trusted CA issued the certificate and it was not modified by any other party.

How SSL/TLS certificates work

The Transport Layer Security (TLS) protocol uses SSL certificates to encrypt and authenticate data streams for Hypertext Transfer Protocol Secure (HTTPS). The SSL cryptographic protocol facilitates secure encrypted connections over the internet via web browsers that connect to websites. SSL works on top of HTTP to create an HTTPS connection.

SSL certificates are sometimes called SSL/TLS certificates or simply TLS certificates. TLS is an upgraded version of SSL.

Similar to SSL, HTTP is layered on top of TLS to create HTTPS. It encrypts otherwise readable data to provide enhanced protection for applications and websites requiring higher privacy and security, such as those involving banking, taxation and e-commerce. TLS also provides privacy between the endpoints of a data transmission and boosts data integrity so hackers cannot intercept or compromise private data.

When a web browser initiates a secure connection over HTTPS, the SSL/TLS digital certificate is sent to the web browser. The browser checks the information in the certificate and authenticates it against its own root certificate store. This is how the certificate ensures secure, encrypted connections between a user's browser and the organization's web server or a website's web server.

When this feature is working, users will not see warning messages in their browser, such as "not sure" or "your connection is not private." Those are displayed for insecure websites.

All major browsers, including those provided by Microsoft (Internet Explorer, Edge), Google (Chrome), Apple (Safari) and Mozilla (Firefox) all maintain their own web browser root certificate stores. This is where they post the root certificates of CAs the publishers have decided their browser will trust.

How a certificate authority issues a digital certificate

SSL/TLS certificates authenticate and secure websites and facilitate secure, encrypted connections. They let users know they are visiting a genuine website by displaying a padlock icon in the web browser.

As important components of PKI, SSL/TLS certificates require a digital certificate to work. This is where the CA comes in.

An entity -- organization or person -- can request a digital certificate from a CA. First, it generates a key pair, which consists of the following:

  • private key, which is always kept a secret and should never be shown to anyone, including the CA; and
  • public key, which is mentioned in the digital certificate the CA issues -- the applicant also generates a certificate signing request (CSR), an encoded text file that specifies the information that will be included in the certificate, such as the following:
    • domain name;
    • additional or alternative domain names, including subdomains;
    • organization; and
    • contact details, e.g., email address.

The information included in the CSR depends on the intended use of the certificate and its validation level. Both of the above processes are usually done on the server -- or workstation -- where the certificate is to be installed.

What is a certificate authority (CA)? (2)

The applicant then sends the CSR to the CA, which verifies the information in the CSR and the applicant's identity. Then, the CA generates a digital certificate, digitally signs it with its private key and sends the certificate to the applicant.

At this point, this digital certificate can be authenticated -- by a web browser, for example -- using the CA's public key. The browser can also use the certificate to confirm that the digitally signed content was sent by a legitimate entity that holds the corresponding private key and that this information has not been altered since it was signed by that entity.

CAs often accept requests from applicants directly. Sometimes, they delegate the task of authenticating applicants to registration authorities (RAs). The RA collects and authenticates digital certificate requests and then submits those requests to the CA, which then issues the certificate to be passed through the RA to the applicant.

The RA may also be used for marketing and customer support. The CA is required to limit the RA to registering certificates within the domain namespace assigned to the RA.

Root certificates and intermediate certificates

The CA plays a vital role in the chain of trust, a hierarchical trust model that consists of root certificates, intermediate certificates and SSL certificates. Its activities start with a root certificate, which is used as the ultimate basis for trust in all certificates the authority issues.

The root certificate -- along with the private key associated with that certificate -- is treated with the highest level of security and is usually stored offline in a protected facility. It may also be stored on a device that is unpowered except when the certificate is needed.

The CA will use that root certificate to create intermediate certificates, i.e., the certificates used to sign the digital certificates issued by the authority. The root certificate should never be used directly for signing digital certificates. Different intermediate certificates support different purposes.

This enables the public to trust the issued certificates, while also protecting the root when an intermediate certificate expires or is revoked. RAs may also issue digital certificates using intermediate certificates.

What is a certificate authority (CA)? (3)

Types of digital certificates

CAs don't just issue SSL/TLS certificates. They can issue other types of certificates for different use cases, including the following:

  • Code signing certificates are used by software publishers and developers to sign their software distributions. End users can then use them to authenticate and validate software downloads from the vendor or developer.
  • Email signing certificates let entities sign, encrypt and authenticate email using the Secure/Multipurpose Internet Mail Extensions protocol for secure email attachments.
  • Object signing certificates accommodate signing and authenticating any type of software object.
  • User/client signing certificates, or signature verification certificates, help individuals handle a variety of authentication needs.
What is a certificate authority (CA)? (4)

What is the CA/Browser Forum?

The CA/Browser (CA/B) Forum maintains guidelines for all aspects of the creation, distribution and use of digital certificates, including policies for certificate expiration and revocation. Publicly trusted certificate authorities usually participate in this forum.

Most members are either CAs or web browser vendors. However, certificate consumer organizations also participate.

According to CA/B Forum rules, the CA must contractually require all RAs to comply and document their compliance with these rules. CAs are themselves also subject to extensive rules and operational audits.

Any infractions can prompt more audits and other consequences that could damage the CA's reputation and lower trust in its operations and reliability.

What is a certificate authority (CA)? (2024)

FAQs

What does a certificate authority CA do? ›

A certificate authority (CA) is a trusted entity that issues Secure Sockets Layer (SSL) certificates. These digital certificates are data files used to cryptographically link an entity with a public key. Web browsers use them to authenticate content sent from web servers, ensuring trust in content delivered online.

What is a certificate authority CA Quizlet? ›

What is a certificate authority? - An entity that requires proof of identity from the individual requesting a certificate. - An entity that generates a digitally signed identification certificate.

What is an example of a certificate authority CA? ›

Examples include Comodo, GeoTrust, and Symantec. Becoming a Certificate Authority (CA) simply means that you (or your customers) are in charge of the issuing process of cryptographic pairs of private keys and public certificates.

What does a certificate of Authority do? ›

A Certificate of Authority shows that you are authorized to do business in a state other than your original formation state. A Certificate of Authority is a requirement in most states. It's important to note that the name of the document can vary from state to state.

Do I need a certificate authority for my domain? ›

To use HTTPS with your domain name, you need a SSL or TLS certificate installed on your website. Your web host (Web Hosting Provider) may offer HTTPS security or you can request a SSL/TLS certificate from Certificate Authorities and install it yourself. SSL/TLS certificates may need to be renewed periodically.

How do I find my certificate authority? ›

You can go to your Domain Controller and find the Cert Publishers group in Active Directory. It should have your servers with the Certificate Authority role. If you run the Certutil cmd there, you can get the info of the certificates installed.

What does a certificate of Authority allow Quizlet? ›

A Certificate of Authority permits an insurance company to transact business.

What part of the certificate indicates this is a CA certificate? ›

Most importantly, a certificate always includes the digital signature of the issuing CA. The CA's digital signature allows the certificate to function as a “letter of introduction” for users who know and trust the CA but don't know the entity identified by the certificate.

What are the two types of certificate authorities? ›

There are two types of certificate authorities—public and private CA—which provide certificate-issuing services for different organizational needs. Public certificate authorities provide CA services to the general public and are not associated with the certificate recipient.

Is GoDaddy a certificate authority? ›

The first step to getting an SSL certificate is to choose a Certificate Authority (CA). A CA, such as GoDaddy, is an organization that issues SSL certificates.

What is common name for certificate authority? ›

The common name is the domain name you wish to secure with your certificate. If you are creating a single domain certificate, entering the common name is straightforward: it is the single domain you wish to secure. Don't forget to include the subdomain if your single address includes a subdomain.

Do I need a certificate of Authority in California? ›

In California, companies that "transact intrastate business" require a Certificate of Authority. Other common reasons for applying for a certificate of authority include: Opening a physical office or location. Hiring employees.

Is Amazon a certificate authority? ›

Amazon Trust Services is a certificate authority created and operated by Amazon Web Services.

How important is the certificate authority? ›

CAs are responsible for maintaining the security of their infrastructure and issuing certificates in compliance with industry standards and best practices. They also revoke certificates that are no longer valid and maintain the trust of the certificate's validity.

Does California require a certificate of authority? ›

In California, companies that "transact intrastate business" require a Certificate of Authority. Other common reasons for applying for a certificate of authority include: Opening a physical office or location. Hiring employees.

What is the role of the certificate authority CA as a third party? ›

A Certificate Authority (CA) is a third-party organization or entity that validates websites by issuing digital certificates. To accomplish this, CAs check credentials with registration authorities, which, in turn, determine whether the website in question should be verified.

What is DigiCert used for? ›

DigiCert, Inc. is a digital security company headquartered in Lehi, Utah. DigiCert provides public key infrastructure (PKI) and validation required for issuing digital certificates or TLS/SSL certificates, acting as a certificate authority (CA) and trusted third party.

Top Articles
Latest Posts
Article information

Author: Patricia Veum II

Last Updated:

Views: 5670

Rating: 4.3 / 5 (44 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Patricia Veum II

Birthday: 1994-12-16

Address: 2064 Little Summit, Goldieton, MS 97651-0862

Phone: +6873952696715

Job: Principal Officer

Hobby: Rafting, Cabaret, Candle making, Jigsaw puzzles, Inline skating, Magic, Graffiti

Introduction: My name is Patricia Veum II, I am a vast, combative, smiling, famous, inexpensive, zealous, sparkling person who loves writing and wants to share my knowledge and understanding with you.