4 Managing System Certificates

Oracle Linux stores certificates that are trusted system-wide in within the /etc/pki/ca-trust/ and /usr/share/pki/ca-trust-source/ directories.

In Oracle Linux release 10, certificates that are trusted system-wide are stored as .pem files in the /etc/pki/ca-trust/extracted directory.

Note:

This is a different location and format from earlier releases of Oracle Linux. If any applications, scripts, or configurations refer directly to files in /etc/pki/tls/certs, change them to use the new path.

For example, if the old path is:

/etc/pki/tls/certs/ca-bundle.crt

You must now use:

/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem

Typically, the CA certificates of major third-party CAs are included within the system-wide trust store to enable applications to work correctly. By storing trusted certificates in a central location, a wide range of applications can use these trusted certificates to validate and authenticate certificate chains. For example, when an application needs to validate a certificate, it uses the certificates within the system-wide trust to confirm whether the certificate either matches a trusted certificate, or is signed by one.

A certificate, such as a CA certificate, that's stored on a system as a trusted certificate is often referred to as a trust anchor. This distinguishes the certificate from one for which trust is derived, typically by walking through a certificate chain until a trust anchor is found. You can add any public certificate to the system trust as a trust anchor so that it can be validated immediately.

Commonly trusted third-party CA certificates are selected by the Mozilla Foundation and are included in the ca-certificates package. These certificates are installed into the system trust store as anchors for general use.