A number of operating system and browser vendors ship their software with pre-installed root certificates. In this way, they document that all the certificates they issue are trustworthy. In addition, other bodies, such as the EU or major energy trading auction platforms, maintain their own trust lists.

 

Overview

  • Microsoft Root Program (incl. Extended Validation)
  • Apple Root Store, ab iOS 16, iPadOS 16, macOS 13, tvOS 16 und watchOS 9
  • Google Chrome Root Store “neu” CRS v7 (incl. Extended Validation)
  • Android, v13 (incl. Extended Validation)
  • Adobe AATL Member
  • Mozilla Root Store (incl. Extended Validation)
  • Network Security Services (NSS) v3.66+
  • Open Suse-Distributionen mit NSS v3.66+
  • Ubuntu-Distributionen mit NSS v3.66+
  • Mozilla Firefox, FF 90+ (incl. Extended Validation)
  • Microsoft Internet Explorer, Microsoft Edge (incl. Extended Validation)
  • Windows Mobile
  • Opera
  • 360 Browser
  • Odette Trust Service Status List
  • Qualified Trust Service Provider according to eIDAS regulation
  • Accredited Provider of certificates under the Austrian eGovernment Act
  • Various exchange platforms  (JAO, OKTE,…)

What to do if the root certificate is not pre-installed

If the GLOBALTRUST root certificate is not pre-installed, the root certificate must be installed by the website user. However, this installation is only required once. To install the root certificate, it is sufficient to click once on the link to the root certificate (https://www.globaltrust.eu/static/globaltrust-2020.crt) and agree to add it. It is easy to check if the GLOBALTRUST root certificate is pre-installed. All you have to do is go to https://testok-2020-server-qualified-ev-1.e-monitoring.at. If you do not receive a warning, the root certificate is already pre-installed.

Limits

This information refers to the latest root certificate GLOBALTRUST 2020, older root certificates may differ. The information also refers to the respective default settings of an up-to-date device. Deviations due to individual configurations cannot be guaranteed. This includes, for example, conflicting firewall rules, the use of outdated systems or self-configured locks.
In the interests of our customers, we are constantly striving to achieve the best possible acceptance in current software products. If you come across a use case that we have overlooked, please do not hesitate to contact us.