Certification Authority
Certification Authority (CA) is an organisation that issues and signs X.509 digital certificates used to authenticate domain names and enable encrypted connections on the Web (primarily via TLS and HTTPS). In the context of the Web PKI, a CA’s authority derives less from a formal public mandate than from inclusion in major browser and operating-system trust stores and adherence to ecosystem policy requirements.[1][2][3]
Role in the Web PKI[edit | edit source]
CAs issue end-entity certificates that bind a public key to a DNS identifier (for example, a domain name) and sign those certificates under intermediate and root certificates. Browsers validate a presented certificate by building a chain to a trusted root and applying profile and policy rules, including name constraints, key usage, validity periods, and revocation signalling, as profiled in RFC 5280.[1]
In practice, CAs operate within a set of de facto global policy regimes: the CA/Browser Forum’s Baseline Requirements (BRs) describe common issuance, validation, lifecycle, and audit expectations for publicly trusted TLS server certificates, while root programs impose their own additional constraints and incident-handling requirements.[4][2][3]
Governance and Accountability[edit | edit source]
From an Internet Governance perspective, certificate authorities sit in an unusual institutional position: they are private entities that effectively mediate global trust for Web authentication, yet their “regulatory” environment is largely established through private coordination (CA/Browser Forum) and platform gatekeeping (browser/OS trust stores), rather than treaty-based or intergovernmental processes.[5][2][3]
Accountability mechanisms include:
- Root program governance: vendors can impose requirements, demand disclosures, and ultimately remove trust for CA roots or intermediates, which can have global operational impact for websites and services relying on that CA.[2][6]
- Audits and compliance reporting: root programs and the BRs rely heavily on periodic audits and public audit statements as prerequisites for continued inclusion.[7][4]
- Public transparency measures: Certificate Transparency (CT) is designed to make issuance observable by requiring public logging of certificates, enabling third parties to detect mis-issuance and audit CA behaviour at scale.[8]
Incidents and Trust Concentration[edit | edit source]
Because any broadly trusted CA can potentially issue certificates for many domains, CA compromise or mis-issuance can undermine authentication at Internet scale. The 2011 compromise of DigiNotar is widely cited as a key stress test: fraudulent certificates were issued, major vendors distrusted the CA, and the firm ultimately collapsed, illustrating how trust-store decisions function as an enforcement tool with systemic consequences.[9]
Concentration also matters. A limited set of browser vendors controls dominant root programs, and a relatively small number of CAs issue a large share of publicly trusted certificates. This can simplify coordination (for example, rapid rule changes through root programs), but it also concentrates leverage over a critical security dependency into a small set of institutions.[2][3]
Interaction with DNS and Naming Policy[edit | edit source]
Although CAs are not part of ICANN’s contractual regime, the Web PKI is structurally coupled to the DNS namespace that ICANN coordinates: certificate identities are predominantly DNS names, and changes in naming policy (TLD delegation, reserved labels, and Special-Use Domain Names) can have downstream effects on validation practices and certificate eligibility.
Conversely, the PKI has developed DNS-based controls. The Certification Authority Authorization (CAA) record allows domain holders to publish, in DNS, which CAs are authorised to issue certificates for their domain, providing a governance “hook” at the DNS layer that can reduce mis-issuance risk when properly enforced by CAs.[10]
Automation and Market Structure[edit | edit source]
The IETF’s ACME protocol enables automated domain validation and certificate issuance at large scale, reshaping CA operations and lowering issuance costs for many services.[11] Operationally, this increases reliance on automated validation channels (including DNS-based validation) and shifts governance pressures toward lifecycle management requirements (shorter certificate lifetimes, faster revocation, and stronger incident-response expectations) primarily set by the BRs and root programs.[4][6]
References[edit | edit source]
- ↑ 1.0 1.1 D. Cooper et al., "Internet X.509 Public Key Infrastructure Certificate and CRL Profile", RFC 5280, IETF, May 2008.
- ↑ 2.0 2.1 2.2 2.3 2.4 Mozilla, "Mozilla Root Store Policy" (accessed 2025-12-11).
- ↑ 3.0 3.1 3.2 3.3 Google, "Chrome Root Program Policy" (accessed 2025-12-11).
- ↑ 4.0 4.1 4.2 CA/Browser Forum, "Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates" (accessed 2025-12-11).
- ↑ CA/Browser Forum, "About the Baseline Requirements" (accessed 2025-12-11).
- ↑ 6.0 6.1 Google Security Blog, "Sustaining Digital Certificate Security..." 30 May 2025.
- ↑ MozillaWiki, "CA/Audit Statements" (accessed 2025-12-11).
- ↑ B. Laurie et al., "Certificate Transparency Version 2.0", RFC 9162, IETF, December 2021.
- ↑ ENISA, "Operation Black Tulip: Certificate authorities lose authority", 2011.
- ↑ P. Hallam-Baker et al., "DNS Certification Authority Authorization (CAA) Resource Record", RFC 8659, IETF, November 2019.
- ↑ R. Barnes et al., "Automatic Certificate Management Environment (ACME)", RFC 8555, IETF, March 2019.
ICANNWiki resources: Special Pages | Content Guide | Documentation | Development || Maintenance: Articles needing attention | Candidates for deletion || Projects: Internet & Digital Governance Library