Public Key Infrastructure (PKI) relies on a trusted root Certification Authority (CA) to issue certificates. Devices and users must trust the root CA for the PKI to be effective. If a root CA certificate is not pre-installed or manually chosen to be trusted on a device, any certificates issued by that CA will not be inherently trusted by the device.
[Reference: The concept and structure of PKI are detailed in various security literature, such as NIST Special Publication 800-32 - Introduction to Public Key Technology and the Federal PKI Infrastructure., ]
Submit