Which X509 StoreName refers to a certificate stored under Trusted Root Certification Authorities in Windows 10


Tim:

When enumerating AuthRootand CertificateAuthoritiesX509 store, I can't find the self-signed SSL certificate imported on my Trusted Root Certification Authoritieslocal machine :

        X509Store store = new X509Store(StoreName.AuthRoot);  // also tried StoreName.CertificateAuthorities
        store.Open(OpenFlags.ReadOnly);
        var storecollection = (X509Certificate2Collection) store.Certificates;
        foreach (X509Certificate2 x509 in storecollection)
        {
            Console.WriteLine("certificate name: {0}", x509.Subject);
        }

Does the enumerator skip self-signed SSL certificates as invalid? Am I looking in the wrong place?

This is what I see in the MMC's "Certificates" snap-in:

MMC Certificate Snap-in

bartonjs:

StoreName.Rootis the "Trusted Root Certification Authorities" you want.

AuthRootis a "Third Party Root Certification Authority" and CertificateAuthorityis an "Intermediate Certification Authority".

Related


Detect root x509 certificate in Go

Adam Williams: I have X509 certificate obtained using: block, additionalData := pem.Decode([]byte(str)) cert, err := x509.ParseCertificate(block.Bytes) I want to check if the certificate is a root certificate. I've tried checking IsCA, but the same is true fo

Get trusted X509 certificate for Java SSLSocket

Jesse Wilson I can establish a TLS connection to https://google.com/ . The remote service returns a chain of 3 certificates: CN=www.google.com, O=Google Inc, L=Mountain View, ST=California, C=US CN=Google Internet Authority G2, O=Google Inc, C=US CN=GeoTrust G

Detect root x509 certificate in Go

Adam Williams: I have X509 certificate obtained using: block, additionalData := pem.Decode([]byte(str)) cert, err := x509.ParseCertificate(block.Bytes) I want to check if the certificate is a root certificate. I've tried checking IsCA, but the same is true fo

Detect root x509 certificate in Go

Adam Williams: I have X509 certificate obtained using: block, additionalData := pem.Decode([]byte(str)) cert, err := x509.ParseCertificate(block.Bytes) I want to check if the certificate is a root certificate. I've tried checking IsCA, but the same is true fo

Install Self Signed Certificate as Trusted Root on Windows XP

jospe I have successfully installed a self signed certificate to Windows7. The process is to install it to the Trusted Root Certification Authorities (the local computer) first, and then install it to the trusted people (the local computer). (Without installin

Trust different root certificate authorities in Chromium

Sven I'm using different profiles --user-data-dir=in Chromium under Linux . In one config file I want to trust other root certificate authority (CA) and in other config file the certificate should not be trusted. According to the documentation, Chromium is usi

Detect root x509 certificate in Go

Adam Williams: I have X509 certificate obtained using: block, additionalData := pem.Decode([]byte(str)) cert, err := x509.ParseCertificate(block.Bytes) I want to check if the certificate is a root certificate. I've tried checking IsCA, but the same is true fo

Install Self Signed Certificate as Trusted Root on Windows XP

jospe I have successfully installed a self signed certificate to Windows7. The process is to install it to the Trusted Root Certification Authorities (the local computer) first, and then install it to the trusted people (the local computer). (Without installin

Trust an x509 certificate already trusted on another host

on Monday I have two hosts, one with Debian Buster and the other with CentOS 7. I want to connect to the SMTP server from these two servers via SSL. However, I can only do this on CentOS: CentOS: $ openssl s_client -connect smtp.server.com:587 CONNECTED(000000

Trust different root certificate authorities in Chromium

Sven I'm using different profiles --user-data-dir=in Chromium under Linux . In one config file I want to trust other root certificate authority (CA) and in other config file the certificate should not be trusted. According to the documentation, Chromium is usi