You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

The TCS Service offers services in multiple trust categories: public (web) server SSL, S/MIME email, and client "TCS Authentication" ('IGTF') private trust. Corresponding to these categories there are several (self-signed) trust anchors and intermediate 'issuing' authorities. Ensure that all relevant trust anchors are installed for your services to support the intended use case. Specifically, if your application relies on client authentication after August 28, 2023, install the "Research and Education Trust" roots, as well as the client "TCS Authentication" issuing authorities.

TCS Private Trust Anchors after August 28, 2023

Due to changes in the industry standards (CA/Browser Forum), dedicated client authentication certificates will be introduced by TCS by mid-August 2023. These are issued from a private trust hierarchy ("Research and Education Trust") and cannot be used for digitally signing emails ("S/MIME").

At the same time, the subject naming of email signing "S/MIME" certificates will change significantly - you cannot and must not rely on subject name uniqueness for these email signing certificates, and they must not be used for authentication purposes.

Make sure to install the "Research and Education Trust" roots, and (depending on the application) also the "GEANT TCS Authentication (RSA|ECC) CA 4B" on the server-side to continue supporting client authentication!

Public Trust Roots

Trust anchor nameKey technologyCertificateCRL Distribution Pointmeta-data 'info' filetar.gz package












  • No labels