"Error code: ERR_CERT_AUTHORITY_INVALID (-202)" is observed for Isolated web sites.
search cancel

"Error code: ERR_CERT_AUTHORITY_INVALID (-202)" is observed for Isolated web sites.

book

Article ID: 391501

calendar_today

Updated On:

Products

Web Isolation Cloud

Issue/Introduction

Following error is observed when particular web sites are Isolated by the Web Isolation Cloud. As an example www.transunion.co.uk is affected by the issue.

Your connection is not private

Attackers might be trying to steal your information from www.transunion.co.uk
(for example: passwords, messages, or credit cards).

Error code: ERR_CERT_AUTHORITY_INVALID (-202)

 

Cause

The default trusted CA certificates in the Web Isolation is dictated by the maintainers of Chromium.  The list of CA certificates that are trusted by default depends on the Chromium version used in the TIE gateways.

Resolution

Root and intermediate certificates should be imported to the Web Isolation certificate store. To do it, follow steps below:

1. Open affected web site using direct Internet access and verify Certificate Hierarchy for affected web site. Make sure certificates are valid and issued by well known  certificate authorities.

2. Download root and intermediate certificates in the chain from the root certificate authorities sources. Root and intermediate certificates for the web site  www.transunion.co.uk are available using links below.

Entrust OV TLS Issuing RSA CA 1:
http://cert.ssl.com/Entrust-OVTLS-I-R1.cer

SSL.com TLS RSA Root CA 2022:
https://ssl.com/repo/certs/SSLcom-TLS-Root-2022-RSA.pem

Note: To import certificates to the WI certificate root store, certificate should be converted to the ".pem" format. Below is the example of converting ".cer" to the ".pem" using  openssl utility:

openssl x509 -inform der -in certificate.cer -outform pem -out certificate.pem

3. Import root and intermediate certificates to the WI under the WI GUI console -> System Configuration -> Trusted Certificates -> NEW TRUSTED CERTIFICATE:

4. Push settings once certificates are added and clear browser cache before verifying the changes.