IU ECA root and issuing CA certificates

Root and issuing CA certificates are used to validate the chain of trust between the root CA and certificates issued by Indiana University's Enterprise Certificate Authority (ECA).

If your computer or mobile device is joined to the IU ADS domain, clicking the root and issuing CA links below will allow you to automatically import the certificates and add them to the appropriate certificate store.

If your computer or mobile device is not joined to the IU ADS domain, you must import and store the root and issuing CA certificates manually. To do so, log in as an administrator, click the Indiana University Root CA link below, open the .crt file when prompted, and then use the Certificate Import Wizard to install the certificate on the local machine and place it in the Trusted Root Certification Authorities store. Repeat the process for the issuing CA certificate, but place it in the Intermediate Certification Authorities store.

Download the Windows Application - IU Enterprise Certificate Authority Root Certificates Installer.

iOS, Mac, Linux, and Android devices can download and install the two chain certificates:

Root CA

  • Indiana University Root CA
    • Description: This root CA is used for signing issuing CA certificates.
    • Serial Number: 3c d1 9d 6d 96 10 76 8a 40 37 4a 37 03 6e 42 f7
    • Subject: CN = Indiana University Root CA, OU = UITS, O = IU
    • Valid from: Wednesday, December 4, 2013 10:42:04 AM
    • Valid to: Sunday, December 4, 2033 10:47:42 AM
    • Thumbprint: de 53 33 0a 1a c3 be 21 70 0c 38 53 4c a3 d7 29 98 7c f1 cd
    • Thumbprint algorithm: SHA1

Issuing CAs

  • Indiana University BL Issuing CA
    • Description: This issuing CA is used for publishing certificates defined in Certificate templates available from the ECA.
    • Serial Number: 2d 00 00 00 02 27 8f 90 4f bc 11 a5 db 00 00 00 00 00 02
    • Subject: CN = Indiana University BL Issuing CA, OU = UITS, O = IU
    • Valid from: Wednesday, December 4, 2013 11:05:14 AM
    • Valid to: Tuesday, December 4, 2018 11:15:14 AM
    • Thumbprint: a1 b6 82 fe 8b b9 76 47 72 8d f7 47 8f 77 e1 fe 11 65 88 41
    • Thumbprint algorithm: SHA1
  • Indiana University IN Issuing CA
    • Description: This issuing CA is used for publishing certificates defined in Certificate templates available from the ECA.
    • Serial Number: 2d 00 00 00 03 7a 08 a2 31 23 7d 2a e0 00 00 00 00 00 03
    • Subject: CN = Indiana University IN Issuing CA, OU = UITS, O = IU
    • Valid from: Thursday, December 5, 2013 9:36:17 AM
    • Valid to: Wednesday, December 5, 2018 9:46:17 AM
    • Thumbprint: 05 61 18 2b 45 49 52 4e 4c 12 49 b6 e3 51 dc a8 96 9b d5 eb
    • Thumbprint algorithm: SHA1
  • Indiana University BL Issuing CA(1)
    • Description: This issuing CA is used for publishing certificates defined in Certificate templates available from the ECA.
    • Serial Number: 2d 00 00 00 05 95 d9 0c c5 5f 17 d0 c7 00 00 00 00 00 05
    • Subject: CN = Indiana University BL Issuing CA, OU = UITS, O = IU
    • Valid from: Tuesday, March 7, 2017 9:34:40 AM
    • Valid to: Monday, March 7, 2022 9:44:40 AM
    • Thumbprint: 4e 97 1e 3f 6f 57 e6 a5 6b 25 a9 12 1c 0b d2 b1 fa 57 04 9d
    • Thumbprint algorithm: SHA1
  • Indiana University IN Issuing CA(1)
    • Description: This issuing CA is used for publishing certificates defined in Certificate templates available from the ECA.
    • Serial Number: 2d 00 00 00 04 00 90 59 e8 4e b3 ee 12 00 00 00 00 00 04
    • Subject: CN = Indiana University IN Issuing CA, OU = UITS, O = IU
    • Valid from: Tuesday, March 7, 2017 9:34:10 AM
    • Valid to: Monday, March 7, 2022 9:44:10 AM
    • Thumbprint: 14 bd 4d 2c 10 37 10 77 79 c2 d7 1c 70 e1 2b 16 2d b8 bf b3
    • Thumbprint algorithm: SHA1

Definitions

  • Serial Number: Used to uniquely identify the certificate
  • Subject: The person or entity identified
  • Valid from: The date from which the certificate is first valid
  • Valid to: The expiration date
  • Thumbprint (also known as fingerprint): The hash itself, used as an abbreviated form of the public key certificate
  • Thumbprint algorithm: The algorithm used to hash the public key certificate

This is document bedz in the Knowledge Base.
Last modified on 2017-03-08 10:53:39.

  • Fill out this form to submit your issue to the UITS Support Center.
  • Please note that you must be affiliated with Indiana University to receive support.
  • All fields are required.

Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address.

  • Fill out this form to submit your comment to the IU Knowledge Base.
  • If you are affiliated with Indiana University and need help with a computing problem, please use the I need help with a computing problem section above, or contact your campus Support Center.

Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address.