Need to know how to remove a root certificate? You’re in the right place.
Digital Certificates, but for our explicit purposes, SSL Certificates, all have to be chained back to a trusted root certificate. This is called certificate chaining and it’s the way trust is established.
When you’re on the internet your browser has been taught to be skeptical—it doesn’t just grant trust freely to whatever website it stumbles across. When your browser arrives at a website that presents a digital certificate, it checks to make sure that the certificate chains back to a trusted root. This is why you may sometimes be asked to install intermediate certificates along with your SSL—you’re helping to complete the certificate chain.
To aid in this chaining process on the browser side, each of the major browsers has a trusted root store that contains a set of pre-downloaded X.509 certificates (that’s a fancy way of saying Digital Certificates). These roots are all highly-guarded, owned by Certificate Authorities that store their private keys offline on private hardware tokens in highly-secured data centers. There are four major root stores, Apple and Microsoft each have one as OSs. Mozilla maintains its own root store. And there’s also an Android root store as well. It’s also worth noting that Google Chrome, America’s most popular browser, uses the root store provided by whatever OS you’re using.
The browsers may not trust any random digital certificate, but they trust the roots in their trust store and as long as your certificate chains back to one of those, the browsers will afford it trust, too.
But what happens when something goes wrong with one of those roots? What happens when you need to distrust one? While the browsers will work to remove the root from the list in their next update, you may need to remove the root now. So how do you do it?
Here are step-by-step instructions on how to remove a root certificate from Windows, Apple, Mozilla and then one iPhone and Android phone, too.
Removing a Root Certificate from the Windows trust store is fairly straightforward, but before we go any further I want to add a quick disclaimer. Be careful. Messing with your root certificates can cause serious issues. We recommend that you back up your computer before proceeding with any of the following steps. We will not be held liable for any issues that arise from following these instructions.
Ok, now that we’re done with that, let’s get started.
We got asked how to remove a root certificate on Windows 7 recently, so we’ve updated this article with instructions on removing roots on the Windows 7 OS.
When deleting a root certificate on an Apple machine, much like with Windows, you will need to have administrator access in order to access your trust store. Once again, you can mess up your machine this way if you’re not careful—so be careful.
Unlike Google Chrome, Mozilla’s Firefox browser uses its own proprietary trust store that is maintained by individuals at the Mozilla organization. In order to remove a root, you’ll have to access the trust store through your browser.
Mobile devices have overtaken desktop computers as the primary way that most people surf the internet. This means that your phone now has the task of chaining certificates and verifying trust. As such, you may be forced to occasionally manage Root Certificates on your mobile device. Here’s how to do it on an iPhone (iPads, too).
Related: How to trust manually installed roots in macOS High Sierra
Finally, Android. Android phones have their very own trust store, which needs to be managed just like any other. Here’s how to do it.
We saved the easiest for last! Hopefully this helps you, as always if you have any questions leave them in the comments section and I’ll be happy to answer them for you!
*** This is a Security Bloggers Network syndicated blog from Hashed Out by The SSL Store™ authored by Patrick Nohe. Read the original post at: https://www.thesslstore.com/blog/how-to-remove-a-root-certificate/
When it comes to detecting phishing and social engineering threats, slow response times are detrimental. Automate online brand protection to take…
Interesting development in Germany to restore phonetics that were erased by the Nazis Before the Nazi dictatorship some Jewish names…
Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization's…
via the comic delivery system monikered Randall Munroe resident at XKCD! Permalink
Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization's…
It's December, so you know what that means: Predictions for what's to come for cyber in 2021. We brought together…