From: Rich Bowen What are RSA Private Keys, CSRs and Certificates?
@@ -475,16 +475,24 @@ Certificate for testing purposes?
$ openssl x509 -in cert.pem -out cert.der -outform DER
Verisign uses an intermediate CA certificate between the root CA - certificate (which is installed in the browsers) and the server - certificate (which you installed on the server). You should have - received this additional CA certificate from Verisign. - If not, complain to them. Then, configure this certificate with the +
One reason this might happen is because your server certificate is signed + by an intermediate CA. Various CAs, such as Verisign or Thawte, have started + signing certificates not with their root certificate but with intermediate + certificates.
+ +Intermediate CA certificates lie between the root CA certificate (which is + installed in the browsers) and the server certificate (which you installed + on the server). In order for the browser to be able to traverse and verify + the trust chain from the server certificate to the root certificate it + needs need to be given the intermediate certificates. The CAs should + be able to provide you such intermediate certificate packages that can be + installed on the server.
+ +You need to include those intermediate certificates with the
SSLCertificateChainFile
- directive. This ensures that the intermediate CA certificate is
- sent to the browser, filling the gap in the certificate chain.