What’s Causing This Issue?
This issue arises because Windows Server 2008 R2 automatically assigns a self-signed certificate ‘USERTrust RSA Certification Authority’ to the root store of your website. This is not recommended, since this is not considered a trusted CA root certificate by all browsers and devices. (You will however find a ‘USERTrust RSA Certification Authority’ entry as part of your intermediate bundle for certificates provided to you by SSL.com.) This is why visitors to your site using Android devices in particular (and possibly other visitors as well) will have received untrusted site warnings.
How About a Graphic?
Sure! Take a look this chart to see the items installed to make your SSL.com certificate work correctly (click to enlarge):
The Root store contains the AAA Certificate Services certificate. (This is the root for SSL.com USERTrust certificates.)
The Intermediate store has two certificates:
- A USERTrust RSA Certification Authority certificate (signed by AAA Certificate Services), and
- Your SSL.com DV CA.
The Personal store will contain your server certificate.
Windows Server 2008 R2 manages automatically trusted certificates, and may insert a separate, self-signed USERTrust item without any action on your part – thus, your server might well have this configuration (click to enlarge):
In this case, the Root store also contains a self-signed certificate (the USERTrust RSA Certification Authority entry) which is the “root” of the problem. (Thanks, I’m here all week – try the shrimp scampi.)
Okay – So How Do I Fix This?
It’s actually quite easy to correct this issue – just disable the self-signed USERTrust certificate in the root store using your Microsoft Management Console (or MMC). This will allow the certificate that was signed by AddTrust to be accepted and utilized for your SSL.com certificate.
Open MMC by pressing the Windows key on your keyboard and then typing “MMC”…
…then hit Enter or double-click the icon to start the application.
In MMC, select File > Add/Remove Snap-In (or type control-M).
- Add the “Certificates” Snap-In.
Select “Computer Account” and click the Next button…
…then select “Local computer”, then the Finish button.
- Click OK to close the Add/Remove Snap-In wizard.
In the MMC, click the arrow next to “Certificates (Local Computer)” to reveal the various certificate stores, then click the arrow next to “Trusted Root Certification Authorities”, and finally click the “Certificates” folder.
- In the list of certificates, look for an entry that is named “USERTrust RSA Certification Authority”, which is ‘Issued By’ the same name.
- Right-click the “USERTrust RSA Certification Authority” entry and select “Properties” from the dropdown menu.
In the Properties panel, select “Disable all purposes for this certificate”, then click Apply to implement the changes and OK to close the panel.
- Now restart your Windows Server 2008 R2 to have your changes take effect.