The TCS Service offers services in multiple trust categories: public (web) server SSL, S/MIME email, and client "TCS Authentication" ('IGTF') private trust. Corresponding to these categories there are several (self-signed) trust anchors and intermediate 'issuing' authorities. Ensure that all relevant trust anchors are installed for your services to support the intended use case. Specifically, if your application relies on client authentication after August 28, 2023, install the "Research and Education Trust" roots, as well as the client "TCS Authentication" issuing authorities.
Due to changes in the industry standards (CA/Browser Forum), dedicated client authentication certificates will be introduced by TCS by mid-August 2023. These are issued from a private trust hierarchy ("Research and Education Trust") and cannot be used for digitally signing emails ("S/MIME"). At the same time, the subject naming of email signing "S/MIME" certificates will change significantly - you cannot and must not rely on subject name uniqueness for these email signing certificates, and they must not be used for authentication purposes. Make sure to install the "Research and Education Trust" roots, and (depending on the application) also the "GEANT TCS Authentication (RSA|ECC) CA 4B" on the server-side to continue supporting client authentication! |
| Trust anchor name | Key technology | Certificate | CRL Distribution Point | meta-data | Trust purposes |
|---|---|---|---|---|---|
| USERTrust RSA Certification Authority | RSA4096/SHA384 | https://crt.sh/?id=1199354 | http://crl.usertrust.com/USERTrustRSACertificationAuthority.crl | info-file | any |
| USERTrust ECC Certification Authority | ECC P384/SHA384 | https://crt.sh/?id=2841410 | http://crl.usertrust.com/USERTrustECCCertificationAuthority.crl | info-file | any |
** Client certificates from this issuing CA will be issued only until August 28th, 2023. Certificates will remain valid until their stated validUntil date, which is 395 days after issuance. No new certificates from this profile can be ordered after the sun-set date. Move to the Private Authentication Intermediate (issuing) Authority profiles after this date.
Installing these roots is required for use of the Private Authentication Intermediate (issuing) Authority certificates!
| Trust anchor name | Key technology | Certificate | CRL Distribution Point | meta-data | Trust purposes |
|---|---|---|---|---|---|
| Research and Education Trust RSA Root CA | RSA4096/SHA384 | ResearchandEducationTrustRSARootCA.crt(PEM) | http://crl.enterprise.sectigo.com/ResearchandEducationTrustRSARootCA.crl | info-file | IGTF, Client Authentication |
| Research and Education Trust ECC Root CA | P-384/SHA384 | ResearchandEducationTrustECCRootCA.crt (PEM) | http://crl.enterprise.sectigo.com/ResearchandEducationTrustECCRootCA.crl | info-file | IGTF, Client Authentication |
Installation of the corresponding Private Research and Education Trust Roots is required for these issuing intermediates to be trusted in your application!
| Trust anchor name | Key technology | Certificate | CRL Distribution Point | meta-data | Trust purposes |
|---|---|---|---|---|---|
| GEANT TCS Authentication RSA CA 4B | RSA4096/SHA384 | ca_GEANTTCSAuthenticationRSACA4B.crt (PEM) | http://crl.enterprise.sectigo.com/GEANTTCSAuthenticationRSACA4B.crl | info-file | IGTF, Client Authentication |
| GEANT TCS Authentication ECC CA 4B | P-384/SHA384 | ca_GEANTTCSAuthenticationECCCA4B.crt (PEM) | http://crl.enterprise.sectigo.com/GEANTTCSAuthenticationECCCA4B.crl | info-file | IGTF, Client Authentication |