4 Managing System Certificates
Oracle Linux stores certificates that are trusted system-wide in
within the /etc/pki/ca-trust/
and /usr/share/pki/ca-trust-source/
directories.
In Oracle Linux release 10, certificates that are trusted
system-wide are stored as .pem
files in the
/etc/pki/ca-trust/extracted
directory.
Note:
This is a different location and format from earlier releases of Oracle Linux. If any applications, scripts, or configurations refer
directly to files in /etc/pki/tls/certs
, change them to use the new
path.
For example, if the old path is:
/etc/pki/tls/certs/ca-bundle.crt
You must now use:
/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
Typically, the CA certificates of major third-party CAs are included within the system-wide trust store to enable applications to work correctly. By storing trusted certificates in a central location, a wide range of applications can use these trusted certificates to validate and authenticate certificate chains. For example, when an application needs to validate a certificate, it uses the certificates within the system-wide trust to confirm whether the certificate either matches a trusted certificate, or is signed by one.
A certificate, such as a CA certificate, that's stored on a system as a trusted certificate is often referred to as a trust anchor. This distinguishes the certificate from one for which trust is derived, typically by walking through a certificate chain until a trust anchor is found. You can add any public certificate to the system trust as a trust anchor so that it can be validated immediately.
Commonly trusted third-party CA certificates are selected by the Mozilla Foundation and
are included in the ca-certificates
package. These certificates are
installed into the system trust store as anchors for general use.