Category: Security

Custom root certificate recipes.

There are some cases when a company establishes its own root certification authority (CA) by creating a self-signed root certificate then issuing some certificates for intermediate CAs signed by the root certificate and finally...