Click it to test your certificate installation. On your certificate status page (on your Certificates center) you'll see a 'Check your certificate' button. 4 - Check your certificate installation with Co-Pibot: If it still does not work, go back to the second step and disable COMODO RSA Certification Authority root and reboot the machine. Firstly stop and start the website then test your certificate with CO-piBot ( test a server certificate online), if it does not work, reboot the machine. Under IIS6, stop and start the website can be enough, but generally the machine needs to be restart. Tick Disable all purposes for this certificate
![mac keychain access comodo rsa certification authority mac keychain access comodo rsa certification authority](https://i0.wp.com/www.securitygeneration.com/wp-content/uploads/2011/03/Comodo-Never-Trust.png)
To disable the certificate, right-click on it and select properties.Then Trusted Root Certification AuthoritiesĬommon Name - COMODO RSA Certification Authority Deploy the hierarchy to go to Certificates.Close the window and click OK on the previous window.Choose Add, select Certificates among the list of Standalone Snap-in and click Add.Click on the File menu and select Add/Remove Snap in.Click Start then select Run and type mmc.Disable COMODO RSA Certification Authority (2038) root 1- Launch the MMC
Mac keychain access comodo rsa certification authority update#
To solve the issue, the problematic root certificate must be disabled and the automatic update of the certification authorities deactivated (ĭeactivate the certification authorities update on Windows 20). The problem being that instead of using the intermediate certificate "COMODO RSA Certification Authority (2020)", the server presents the root certificate "COMODO RSA Certification Authority (2038)". It makes the CO-piBot test fail ( Test a server certificate online) even if the certification chain has been correctly installed. Some Microsoft products (such as IIS servers) have a root certification authority named "COMODO RSA Certification Authority" expiring in 2036 that interferes with COMODO RSA Certification Authority intermediate certificate expiring in 2020.
![mac keychain access comodo rsa certification authority mac keychain access comodo rsa certification authority](https://support.comodo.com/uploaded/mac-os-x-yosemite-certificate-installation.7.png)
This solution is to be used only in case of compatibility issues. As an rsa authority root out of the post such as sectigo bundle file replacements. Comodo rsa certification authority not trusted mac. Ev levels that security situation seem better. This root is the current Comodo issuing root. Revoked certs are a comodo certification authority verifies the issue then ensure those of apple keychain from rebranding my company with my only. The recommendations listed on this page are not up to date. Disable COMODO RSA Certification Authority (2038) root