IU ECA root and issuing CA certificates

Root and issuing CA certificates are used to validate the chain of trust between the root CA and certificates issued by Indiana University's Enterprise Certificate Authority (ECA).

If your computer or mobile device is joined to the IU ADS domain, clicking the root and issuing CA links below will allow you to automatically import the certificates and add them to the appropriate certificate store.

If your computer or mobile device is not joined to the IU ADS domain, you must import and store the root and issuing CA certificates manually. To do so, log in as an administrator, click the Indiana University Root CA link below, open the .crt file when prompted, and then use the Certificate Import Wizard to install the certificate on the local machine and place it in the Trusted Root Certification Authorities store. Repeat the process for the issuing CA certificate, but place it in the Intermediate Certification Authorities store.

Download the Windows Application - IU Enterprise Certificate Authority Root Certificates Installer.

iOS, Mac, Linux, and Android devices can download and install the two chain certificates:

Root CA

  • Indiana University Root CA
    • Description: This root CA is used for signing issuing CA certificates.
    • Serial Number: 3c d1 9d 6d 96 10 76 8a 40 37 4a 37 03 6e 42 f7
    • Subject: CN = Indiana University Root CA, OU = UITS, O = IU
    • Valid from: Wednesday, December 4, 2013 10:42:04 AM
    • Valid to: Sunday, December 4, 2033 10:47:42 AM
    • Thumbprint: de 53 33 0a 1a c3 be 21 70 0c 38 53 4c a3 d7 29 98 7c f1 cd
    • Thumbprint algorithm: SHA1

Issuing CAs

  • Indiana University BL Issuing CA
    • Description: This issuing CA is used for publishing certificates defined in Certificate templates available from the ECA.
    • Serial Number: 2d 00 00 00 02 27 8f 90 4f bc 11 a5 db 00 00 00 00 00 02
    • Subject: CN = Indiana University BL Issuing CA, OU = UITS, O = IU
    • Valid from: Wednesday, December 4, 2013 11:05:14 AM
    • Valid to: Tuesday, December 4, 2018 11:15:14 AM
    • Thumbprint: a1 b6 82 fe 8b b9 76 47 72 8d f7 47 8f 77 e1 fe 11 65 88 41
    • Thumbprint algorithm: SHA1
  • Indiana University IN Issuing CA
    • Description: This issuing CA is used for publishing certificates defined in Certificate templates available from the ECA.
    • Serial Number: 2d 00 00 00 03 7a 08 a2 31 23 7d 2a e0 00 00 00 00 00 03
    • Subject: CN = Indiana University IN Issuing CA, OU = UITS, O = IU
    • Valid from: Thursday, December 5, 2013 9:36:17 AM
    • Valid to: Wednesday, December 5, 2018 9:46:17 AM
    • Thumbprint: 05 61 18 2b 45 49 52 4e 4c 12 49 b6 e3 51 dc a8 96 9b d5 eb
    • Thumbprint algorithm: SHA1
  • Indiana University BL Issuing CA(1)
    • Description: This issuing CA is used for publishing certificates defined in Certificate templates available from the ECA.
    • Serial Number: 2d 00 00 00 05 95 d9 0c c5 5f 17 d0 c7 00 00 00 00 00 05
    • Subject: CN = Indiana University BL Issuing CA, OU = UITS, O = IU
    • Valid from: Tuesday, March 7, 2017 9:34:40 AM
    • Valid to: Monday, March 7, 2022 9:44:40 AM
    • Thumbprint: 4e 97 1e 3f 6f 57 e6 a5 6b 25 a9 12 1c 0b d2 b1 fa 57 04 9d
    • Thumbprint algorithm: SHA1
  • Indiana University IN Issuing CA(1)
    • Description: This issuing CA is used for publishing certificates defined in Certificate templates available from the ECA.
    • Serial Number: 2d 00 00 00 04 00 90 59 e8 4e b3 ee 12 00 00 00 00 00 04
    • Subject: CN = Indiana University IN Issuing CA, OU = UITS, O = IU
    • Valid from: Tuesday, March 7, 2017 9:34:10 AM
    • Valid to: Monday, March 7, 2022 9:44:10 AM
    • Thumbprint: 14 bd 4d 2c 10 37 10 77 79 c2 d7 1c 70 e1 2b 16 2d b8 bf b3
    • Thumbprint algorithm: SHA1

Definitions

  • Serial Number: Used to uniquely identify the certificate
  • Subject: The person or entity identified
  • Valid from: The date from which the certificate is first valid
  • Valid to: The expiration date
  • Thumbprint (also known as fingerprint): The hash itself, used as an abbreviated form of the public key certificate
  • Thumbprint algorithm: The algorithm used to hash the public key certificate

This is document bedz in the Knowledge Base.
Last modified on 2017-03-08 10:53:39.

Contact us

For help or to comment, email the UITS Support Center.