An Intermediate CA is a certificate authority that sits between a Root CA and an End-Entity Certificate, forming a crucial link in the chain of trust that secures your online communications.

Imagine you’re trying to verify a digital signature. You need to trust the person who signed it, and to do that, you need to trust the authority that vouches for their identity. The certificate chain of trust is how this vouching process unfolds, like a digital game of "who do you trust?"

Here’s how it looks in action:

Let’s say you’re visiting example.com. Your browser receives a certificate for example.com. This certificate isn’t directly signed by a root authority; instead, it’s signed by an "Intermediate CA." Your browser then looks at the Intermediate CA’s certificate. This certificate, in turn, is signed by another Intermediate CA, or perhaps directly by a "Root CA."

{
  "certificate_chain": [
    {
      "subject": "CN=Example Intermediate CA, O=Example Corp",
      "issuer": "CN=Example Root CA, O=Example Corp",
      "signature_algorithm": "SHA256withRSA",
      "validity": {
        "not_before": "2023-01-01T00:00:00Z",
        "not_after": "2025-01-01T00:00:00Z"
      }
    },
    {
      "subject": "CN=Example Root CA, O=Example Corp",
      "issuer": "CN=Example Root CA, O=Example Corp", // Self-signed
      "signature_algorithm": "SHA256withRSA",
      "validity": {
        "not_before": "2020-01-01T00:00:00Z",
        "not_after": "2040-01-01T00:00:00Z"
      }
    }
  ],
  "end_entity_certificate": {
    "subject": "CN=example.com, O=Example Corp",
    "issuer": "CN=Example Intermediate CA, O=Example Corp",
    "signature_algorithm": "SHA256withRSA",
    "validity": {
      "not_before": "2024-01-01T00:00:00Z",
      "not_after": "2025-01-01T00:00:00Z"
    }
  }
}

This JSON illustrates a simplified certificate chain. The end_entity_certificate (for example.com) is issued by the Example Intermediate CA. The Example Intermediate CA’s certificate is then issued by the Example Root CA. The Example Root CA is self-signed, meaning it’s the ultimate trust anchor.

The Problem Intermediate CAs Solve:

Root CAs are the ultimate arbiters of trust. They are managed by highly secure organizations and their public keys are pre-installed in operating systems and browsers (the "trust store"). If every website’s certificate were directly signed by a Root CA, a compromise of a Root CA would be catastrophic, impacting billions of devices and websites. Furthermore, managing and issuing certificates directly from Root CAs would be incredibly slow and resource-intensive.

Intermediate CAs act as a buffer. A Root CA can issue a certificate to an Intermediate CA. This Intermediate CA can then be used to issue certificates to end-entities (websites, servers, etc.). This has several benefits:

  1. Security: If an Intermediate CA is compromised, only the certificates it issued are affected. The Root CA remains secure and can revoke the Intermediate CA’s certificate, isolating the damage.
  2. Scalability: A Root CA can delegate the task of issuing certificates to multiple Intermediate CAs, allowing for a more distributed and efficient certificate issuance process.
  3. Flexibility: Different Intermediate CAs can be configured with different policies or for different regions, offering granular control over certificate issuance.

How the Chain of Trust Works (The Verification Process):

When your browser encounters a certificate, it performs a series of checks:

  1. Is the certificate valid? It checks the not_before and not_after dates.
  2. Is the certificate signed by a trusted issuer? It looks at the issuer field of the end-entity certificate and finds the issuer’s certificate.
  3. Is the issuer’s certificate valid? It repeats step 1 for the issuer’s certificate.
  4. Is the issuer’s certificate signed by a trusted issuer? It looks at the issuer’s issuer and finds that certificate.
  5. This process continues until it reaches a certificate that is self-signed.
  6. If this self-signed certificate is present in your browser’s or operating system’s trust store (i.e., it’s a recognized Root CA), and all intermediate certificates in the chain were valid and correctly signed, the chain is considered trusted.

The "One Thing" Most People Don’t Realize:

The trust in the entire chain doesn’t stem from the end-entity certificate or even the intermediate certificates; it fundamentally relies on the integrity and authenticity of the Root CA certificate residing in your device’s trust store. If a Root CA’s private key is compromised, all certificates issued under its chain become untrustworthy, and revoking them across the internet is a monumental, often incomplete, task. The careful management and security of these Root CA private keys are paramount, which is why they are typically kept offline and highly protected.

The next concept you’ll likely encounter is certificate revocation, which is how authorities invalidate compromised or superseded certificates within this established chain of trust.

Want structured learning?

Take the full Cryptography course →