fix: Move Microsoft TLS ECC and RSA Root G2 certs to roots section#128358
fix: Move Microsoft TLS ECC and RSA Root G2 certs to roots section#128358srunde3 wants to merge 1 commit intoMicrosoftDocs:mainfrom
Conversation
|
@srunde3 : Thanks for your contribution! The author(s) and reviewer(s) have been notified to review your proposed change. |
|
Learn Build status updates of commit fd5c078: ✅ Validation status: passed
For more details, please refer to the build report. |
|
Can you review the proposed changes? IMPORTANT: When the changes are ready for publication, adding a #label:"aq-pr-triaged" |
|
As a side-note: the links to these certificates direct us to |
|
A certificate’s name does not define its role in path validation. A root certificate is, by definition, self‑signed and sits at the top of a PKI hierarchy. A cross‑certified "root" certificate is not self‑signed. Rather, it is issued by a different CA in order to create a certification path between independent PKIs. Because it has an issuer, it is subordinate in the certification path and is validated like any other CA certificate during chain building. While the Subject Name of these certificates may contain the word "Root", their role in validation is that of a subordinate CA certificate, not a root. They are presented as subordinate CAs for a reason, because that is what they are. As subordinate CAs, they are presented to clients in the TLS handshake, allowing clients to build a validation path to the issuing CA’s trust anchor (the DigiCert Global Root G2 or G3). |
|
No change. #please-close |
These certificates sign other certificates listed in the "subordinates" section, and are correctly listed as signing those subordinates in the "certificate authority chains" section.
It's important that these are properly listed as root certificates. These certificates do not ship in the default bundle on some systems and therefore need to be explicitly passed as "roots" whenever their subordinates are validated.