Chained Root SSL Certificates

When connecting to a web site over SSL, the visitor's web browser decides whether or not to trust the SSL Certificate based on which Certification Authority (CA) has issued the actual SSL Certificate. To determine this, the browser looks at its own internal list of trusted Certification Authorities (CA's). These are added into the browser by the browser vendor (such as Microsoft, Netscape and Mozilla).

Technical Information Support

Most SSL Certificates are issued by Certification Authorities (CA's) who own and use their own Trusted Root CA Certificates. We only issue SSL Certificates by trusted Certification Authorities (CA's) - this means they have already been added into the browser by the browser vendor and are regarded as highly trusted. Some newer SSL Certificates (such as Extended Validation (EV) SSL Certificates) may contain a Chained Certificate, however we will only provide Chained Certificates where the Certification Authority (CA) owns the Root Certificate associated with it.

Some Companies Issue Inferior SSL Certificates

Some Certification Authorities (CA's) do not have a Trusted Root CA Certificate present in browsers, or do not use a root that they own, and use a Chained Root in order for their SSL Certificates to be trusted. Essentially a Certification Authority (CA) with a Trusted Root CA Certificate issues a Chained Certificate which inherits the browser recognition of the Trusted Root CA. These SSL Certificates are known as Chained Root SSL Certificates and may now be owned by the SSL Certificate issuer.

A Direct Relationship Is A Sign Of Stability & Trust

For a Certification Authority (CA) to have and use its own Trusted Root CA Certificate which is already present in browsers is a clear sign that they are long time, stable and credible organizations who have long term relationships with the browser vendors (such as Microsoft, Mozilla and Netscape) for the inclusion of their Trusted Root CA Certificates. For this reason, such Certification Authorities are seen as being considerably more credible and stable than Chained Root SSL Certificate providers who do not have a direct relationship with the browser vendors, or do not use their own root certificates to issue SSL Certificates.

You can view the Certification Authorities (CA's) who have and use their own root certificates by viewing the list in your browser. We do not recommend the use of an SSL Certificate from a vendor that does not have a direct relationship with the browser vendor.

Looking for Cheap SSL? Choose Affordable SSL That Protects Your Site

Looking for Cheap SSL? Choose Affordable SSL Th...

Selecting the right SSL Certificate requires balancing cost with quality, security features, and ongoing support. Our affordable SSL Certificates provide enterprise-grade protection without the premium price tag typically associated with...

Looking for Cheap SSL? Choose Affordable SSL Th...

Selecting the right SSL Certificate requires balancing cost with quality, security features, and ongoing support. Our affordable SSL Certificates provide enterprise-grade protection without the premium price tag typically associated with...

SSL Certificate : What You Need to Know About Encryption and Security

SSL Certificate : What You Need to Know About E...

Encryption is a cornerstone of online security, and SSL Certificates are the key to implementing encryption on websites. When an SSL Certificate is installed on a web server, it enables...

SSL Certificate : What You Need to Know About E...

Encryption is a cornerstone of online security, and SSL Certificates are the key to implementing encryption on websites. When an SSL Certificate is installed on a web server, it enables...

Certificate Signing Request (CSR) Generator Tool

Certificate Signing Request (CSR) Generator Tool

The Trustico® CSR Generator eliminates the complexity of command-line tools and platform-specific requirements through an intuitive web interface that guides you through each step.

Certificate Signing Request (CSR) Generator Tool

The Trustico® CSR Generator eliminates the complexity of command-line tools and platform-specific requirements through an intuitive web interface that guides you through each step.

DNS Stamp Generator and Decoder Tool

DNS Stamp Generator and Decoder Tool

The Trustico® DNS Stamp generator simplifies creation of properly formatted stamps for any DNS resolver configuration. Users input their resolver details including protocol type, server address, and security properties through...

DNS Stamp Generator and Decoder Tool

The Trustico® DNS Stamp generator simplifies creation of properly formatted stamps for any DNS resolver configuration. Users input their resolver details including protocol type, server address, and security properties through...

SSL Certificates with Client Authentication EKU - Available Through Trustico® Until May 2026

SSL Certificates with Client Authentication EKU...

All Sectigo® branded SSL Certificates issued through Trustico® automatically include this capability without requiring special requests or additional configuration through May 15th, 2026.

SSL Certificates with Client Authentication EKU...

All Sectigo® branded SSL Certificates issued through Trustico® automatically include this capability without requiring special requests or additional configuration through May 15th, 2026.

Beyond the Padlock : How Customers Really Evaluate Payment Security

Beyond the Padlock : How Customers Really Evalu...

SSL Certificates from established providers like Trustico® form the foundation of payment security trust, but customers evaluate numerous additional signals before deciding to share sensitive financial information.

Beyond the Padlock : How Customers Really Evalu...

SSL Certificates from established providers like Trustico® form the foundation of payment security trust, but customers evaluate numerous additional signals before deciding to share sensitive financial information.

1 / 6