The intermediate certificate works as a substitute for the root certificate. CAs keep the keys of the root certificate secret to hide from attackers and use the intermediate certificate to sign SSL certificates. If the root certificate is compromised, the whole certificate structure will be useless. An intermediate certificate is placed between the root certificate and the issued SSL certificate. Thus, it creates a chain of trust that starts from the root certificate, travels through an intermediate certificate, and ends its cycle with an issued SSL certificate.
Most Popular Articles
What is SSL?
SSL (secure socket layer) is a protocol designed to protect online information over the web....
What is an SSL certificate?
SSL certificate is also called a public key identity certificate, generally issued by a...
Why do I need an SSL certificate?
The information traveling between the browser and the server remains in plain text and third...
What is the role of Encryption in SSL?
Encryption plays an essential role in SSL that uses the SHA-2 hash algorithm. The SHA-2 family...
What is encryption strength?
The quantity of bits in the encryption key used to encrypt data during an SSL transaction is...