{"id":307884,"date":"2025-02-14T20:25:55","date_gmt":"2025-02-14T19:25:55","guid":{"rendered":"https:\/\/glosarix.com\/glossary\/untrusted-root-en\/"},"modified":"2025-02-14T20:25:55","modified_gmt":"2025-02-14T19:25:55","slug":"untrusted-root-en","status":"publish","type":"glossary","link":"https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/","title":{"rendered":"Untrusted Root"},"content":{"rendered":"<p>Description: The &#8216;Untrusted Root&#8217; refers to a root certificate that is not recognized as trustworthy by a system or application. In the context of Public Key Infrastructure (PKI), root certificates are fundamental as they serve as the trust anchor for validating other digital certificates. When a root certificate is deemed untrusted, it can create security vulnerabilities, as systems cannot verify the authenticity of the certificates that rely on it. This can lead to identity spoofing attacks, where an attacker might present a fake certificate as if it were legitimate. Untrusted roots can arise for various reasons, such as certificate expiration, revocation by the certificate authority, or simply because the certificate is not included in the system&#8217;s trust store. Identifying and managing untrusted roots is crucial for maintaining the integrity and security of digital communications, as a system that trusts an untrusted certificate can be vulnerable to various cyber threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description: The &#8216;Untrusted Root&#8217; refers to a root certificate that is not recognized as trustworthy by a system or application. In the context of Public Key Infrastructure (PKI), root certificates are fundamental as they serve as the trust anchor for validating other digital certificates. When a root certificate is deemed untrusted, it can create security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"glossary-categories":[],"glossary-tags":[],"glossary-languages":[],"class_list":["post-307884","glossary","type-glossary","status-publish","hentry"],"post_title":"Untrusted Root ","post_content":"Description: The 'Untrusted Root' refers to a root certificate that is not recognized as trustworthy by a system or application. In the context of Public Key Infrastructure (PKI), root certificates are fundamental as they serve as the trust anchor for validating other digital certificates. When a root certificate is deemed untrusted, it can create security vulnerabilities, as systems cannot verify the authenticity of the certificates that rely on it. This can lead to identity spoofing attacks, where an attacker might present a fake certificate as if it were legitimate. Untrusted roots can arise for various reasons, such as certificate expiration, revocation by the certificate authority, or simply because the certificate is not included in the system's trust store. Identifying and managing untrusted roots is crucial for maintaining the integrity and security of digital communications, as a system that trusts an untrusted certificate can be vulnerable to various cyber threats.","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Untrusted Root - Glosarix<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Untrusted Root - Glosarix\" \/>\n<meta property=\"og:description\" content=\"Description: The &#8216;Untrusted Root&#8217; refers to a root certificate that is not recognized as trustworthy by a system or application. In the context of Public Key Infrastructure (PKI), root certificates are fundamental as they serve as the trust anchor for validating other digital certificates. When a root certificate is deemed untrusted, it can create security [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/\" \/>\n<meta property=\"og:site_name\" content=\"Glosarix\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@GlosarixOficial\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/\",\"url\":\"https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/\",\"name\":\"Untrusted Root - Glosarix\",\"isPartOf\":{\"@id\":\"https:\/\/glosarix.com\/en\/#website\"},\"datePublished\":\"2025-02-14T19:25:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/glosarix.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Untrusted Root\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/glosarix.com\/en\/#website\",\"url\":\"https:\/\/glosarix.com\/en\/\",\"name\":\"Glosarix\",\"description\":\"T\u00e9rminos tecnol\u00f3gicos - Glosarix\",\"publisher\":{\"@id\":\"https:\/\/glosarix.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/glosarix.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/glosarix.com\/en\/#organization\",\"name\":\"Glosarix\",\"url\":\"https:\/\/glosarix.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp\",\"contentUrl\":\"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp\",\"width\":192,\"height\":192,\"caption\":\"Glosarix\"},\"image\":{\"@id\":\"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/GlosarixOficial\",\"https:\/\/www.instagram.com\/glosarixoficial\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Untrusted Root - Glosarix","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/","og_locale":"en_US","og_type":"article","og_title":"Untrusted Root - Glosarix","og_description":"Description: The &#8216;Untrusted Root&#8217; refers to a root certificate that is not recognized as trustworthy by a system or application. In the context of Public Key Infrastructure (PKI), root certificates are fundamental as they serve as the trust anchor for validating other digital certificates. When a root certificate is deemed untrusted, it can create security [&hellip;]","og_url":"https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/","og_site_name":"Glosarix","twitter_card":"summary_large_image","twitter_site":"@GlosarixOficial","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/","url":"https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/","name":"Untrusted Root - Glosarix","isPartOf":{"@id":"https:\/\/glosarix.com\/en\/#website"},"datePublished":"2025-02-14T19:25:55+00:00","breadcrumb":{"@id":"https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/glosarix.com\/en\/glossary\/untrusted-root-en\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/glosarix.com\/en\/"},{"@type":"ListItem","position":2,"name":"Untrusted Root"}]},{"@type":"WebSite","@id":"https:\/\/glosarix.com\/en\/#website","url":"https:\/\/glosarix.com\/en\/","name":"Glosarix","description":"T\u00e9rminos tecnol\u00f3gicos - Glosarix","publisher":{"@id":"https:\/\/glosarix.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/glosarix.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/glosarix.com\/en\/#organization","name":"Glosarix","url":"https:\/\/glosarix.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp","contentUrl":"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp","width":192,"height":192,"caption":"Glosarix"},"image":{"@id":"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/GlosarixOficial","https:\/\/www.instagram.com\/glosarixoficial\/"]}]}},"_links":{"self":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary\/307884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/comments?post=307884"}],"version-history":[{"count":0,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary\/307884\/revisions"}],"wp:attachment":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/media?parent=307884"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-categories?post=307884"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-tags?post=307884"},{"taxonomy":"glossary-languages","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-languages?post=307884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}