The certificate chain could not be established to a trusted root authority


skm:

During the installation of .NET Framework 4.6.2, I get the error:

.NET Framework installation failed: -2146762486. The certificate chain could not be established to a trusted root authority

A solution to the above error is provided by the MSDN Blog link which instructs the following steps:

1. Download the certificate locally http://www.microsoft.com/pki/certs/MicRooCerAut2011_2011_03_22.crt (Example: C:\Temp)

2. You can use the certmgr.exe utility to add certificates via the command line. See the Certmgr.exe (Certificate Manager Tool) topic on MSDN for more information.

3. Open an administrative command prompt and run the following command: certmgr.exe /add C:\Temp\MicRooCerAut2011_2011_03_22.cer /s /r localMachine root

4. Next, try to install hotfix KB3135996 or KB3136000

my question:

The installation of .NET Framework 4.6.2 has to be done on multiple production systems, so are the above steps standard ? I mean, would it be a problem to have the same certificate installed on multiple systems ? Will there be a conflict when the system is connected to the Internet at some point?

PS: Solving this problem (managing certificates) by connecting the system to the internet is not an option for me as the whole process has to be offline .

pepo:

Will installing the same certificate on multiple systems cause problems?

No, there will be no problem even connecting the system to the internet in the future.

When you connect your system to the Internet and update it, it can download a package of trusted certificates. These certificates will be added to the trusted root store. The existing will simply be replaced IMO.

Related


Should trusted root CAs be part of the certificate chain?

Mike I am establishing 2-way SSL communication between services on different hosts. Suppose I have a CA of my own, called A. All my services trust A through centralized jks. Now suppose I have a certificate B signed by A. When services send certificates, shoul

The certificate chain was issued by an untrusted authority

Kirsten Grid I researched here for help on upgrading to aspnetcore 2.1.0 My database is SQLExpress 2016SP1 I can add migrations, but when I publish update-database In the package manager console, I get an error The connection to the server was successfully es

The certificate chain was issued by an untrusted authority

Kirsten Grid I researched here for help on upgrading to aspnetcore 2.1.0 My database is SQLExpress 2016SP1 I can add migrations, but when I publish update-database In the package manager console, I get an error The connection to the server was successfully es

The certificate chain was issued by an untrusted authority

Kirsten Grid I researched here for help on upgrading to aspnetcore 2.1.0 My database is SQLExpress 2016SP1 I can add migrations, but when I publish update-database In the package manager console, I get an error The connection to the server was successfully es

iOS checks if root certificate is installed *and* trusted

Aluminum Gallium Our app is installing the root CA profile and I want to verify that it is installed and trusted by the user. For now, this is roughly what we do (pruned for the core) SecPolicyRef policyObj = SecPolicyCreateBasicX509(); SecTrustRef trustObj; O

iOS checks if root certificate is installed *and* trusted

Aluminum Gallium Our app is installing the root CA profile and I want to verify that it is installed and trusted by the user. For now, this is roughly what we do (pruned for the core) SecPolicyRef policyObj = SecPolicyCreateBasicX509(); SecTrustRef trustObj; O

Add a root certificate authority to a Java application

Ezvig I have installed Jenkins on CentOS7 and am getting SSL errors when trying to update/install plugins. After investigation it turned out that I was missing the root CA certificate in the Java CA store. I used the keytoolutility to add the missing CA certif

Add a root certificate authority to a Java application

Ezvig I have installed Jenkins on CentOS7 and am getting SSL errors when trying to update/install plugins. After investigation it turned out that I was missing the root CA certificate in the Java CA store. I used the keytoolutility to add the missing CA certif

Get the full certificate chain, including the root certificate

three wheat How can I get the full certificate chain of the server? While some claim that it should be possible to do this with openssl s_client -showcerts, it turns out that's not always the case. echo | openssl s_client -CApath /etc/ssl/certs -connect www.ss