Information About Digital Certificates Parent topic

For Deep Discovery Web Inspector to determine if a server’s signature is trusted, the root Certification Authority (CA) certificate on which the signature is based must be added to the Deep Discovery Web Inspector certificate store.
There are three types of digital certificates that are involved in producing a digital signature:
  • The "end" or "signing" certificate, which contains the public key to be used to validate the actual digital signature.
  • One or more "intermediate" Certification Authority (CA) certificates, which contain the public keys to validate the signing certificate or another intermediate certificate in the chain.
  • The "root" CA certificate, which contains the public key used to validate the first intermediate CA certificate in the chain (or, rarely, the signing certificate directly). An otherwise valid signature is "trusted" by Deep Discovery Web Inspector if the CA certificate of the signature is known to Deep Discovery Web Inspector and is active.
If Deep Discovery Web Inspector encounters an unknown CA certificate during SSL handshake processing, it automatically saves the certificate in the Inactive CA Certificates list. Intermediate and root CA certificates are collected in this way. If required later, a CA certificate collected in this way can be "activated" (made trusted or untrusted by Deep Discovery Web Inspector so that the signatures of websites depending on it can be processed as valid or invalid.
Accessing secure resources that traverse through a Deep Discovery Web Inspector appliance with an untrusted or expired certificate displays a security warning in the web browser.