Chain of trust

The roles of root certificate, intermediate certificate and end-entity certificate as in the chain of trust.

In computer security, a chain of trust is established by validating each component of hardware and software from the end entity up to the root certificate. It is intended to ensure that only trusted software and hardware can be used while still retaining flexibility.


Developed by StudentB