Need Professional Security Testing?
Our penetration testers find vulnerabilities before attackers do. Get a comprehensive security assessment.
Understanding Certificate Chains
When you obtain an SSL/TLS certificate from a Certificate Authority (CA), you receive more than just your server's certificate. You also need intermediate CA certificates that form a chain of trust.
Chain Structure
- End-Entity Certificate - Your server's certificate containing your domain name
- Intermediate CA Certificate(s) - Certificates that chain your cert to the root
- Root CA Certificate - Self-signed certificate trusted by browsers (usually not needed in your config)
Common Chain Issues
Incomplete Chain: Missing intermediate certificates cause "certificate not trusted" errors, especially on mobile devices.
Wrong Order: Some servers require certificates in a specific order. The standard is end-entity first, followed by intermediates, with root last.
Authority Information Access (AIA)
Modern certificates include an AIA extension that contains a URL to the issuer's certificate. This tool uses AIA to automatically fetch and build the complete chain.
Server Configuration
Nginx
Apache
Frequently Asked Questions
Common questions about the Certificate Chain Builder
A certificate chain (or chain of trust) is a sequence of certificates that links your server's certificate to a trusted root Certificate Authority (CA). It typically includes your end-entity certificate, one or more intermediate CA certificates, and optionally the root CA certificate.
ℹ️ Disclaimer
This tool is provided for informational and educational purposes only. All processing happens entirely in your browser - no data is sent to or stored on our servers. While we strive for accuracy, we make no warranties about the completeness or reliability of results. Use at your own discretion.