A knowledge base article about InCommon Certificate Chain provided by the UC Berkeley IT Service Hub - Knowledge Portal
On May 4th, 2026 InCommon will begin issuing all TLS certificates, both RSA and ECC, from new public intermediate certificate authorities (CAs). These new intermediate CAs are cross-signed by the widely trusted, but now legacy, USERTrust RSA and ECC roots as well as the modern Sectigo Public Server R46 and E46 roots to ensure compatibility with older clients.
Important: Chrome and Firefox are removing USERTrust from their trusted root programs; after removal, certificates relying solely on the USERTrust chain will fail in those browsers.
Important: We are waiting for additional guidance from InCommon, some dates may change.
When using certificates issued by InCommon for your service/server, the recommended certificate chain is as follows. You should include the first two certificates listed below in your application/server's TLS configuration.
your_server_leaf_certificate
InCommon RSA Server CA 2 (intermediate; expires 2032)
USERTrust RSA Certification Authority (root; expires 2038)
You can download these certificates here:
ECC certificates follow the same logic with an ECC intermediate.
your_server_leaf_certificate
InCommon ECC Server CA 2 (intermediate; expires 2032)
USERTrust ECC Certification Authority (root; expires 2038)
You can download these certificates here:
| NOTE: The InCommon Certificate Manager will provide links to the appropriate chains described below when certificates are issued. Certificates issued using ACME should automatically contain the appropriate chains provided your ACME client is not configured to request a specific chain. |
When using certificates issued by InCommon for your service/server, the recommended certificate chain is as follows to ensure maximum backward compatibility. You should include all three of the certificates listed below in your application/server's TLS configuration.
your_server_leaf_certificate
InCommon RSA OV SSL CA 3 (intermediate)
Sectigo Public Server Authentication Root R46 (cross-signed root acting as intermediate)
You can download these certificates here:
ECC certificates follow the same logic with E46/ECC intermediates.
your_server_leaf_certificate
InCommon ECC OV SSL CA 3 (intermediate)
Sectigo Public Server Authentication Root E46 (cross-signed root acting as intermediate)
You can download these certificates here:
We are recommending that the new cross-signed intermediates be used for maximum backward compatibility. This provides two verification paths for certificates during the transition off of the USERTrust root CA.
| Cross-signed version | Self-signed version | |
| Subject |
Sectigo Public Server Authentication Root R46 Sectigo Public Server Authentication Root E46 |
Sectigo Public Server Authentication Root R46 Sectigo Public Server Authentication Root E46 |
| Issuer |
USERTrust RSA Certification Authority USERTrust ECC Certification Authority |
Sectigo Public Server Authentication Root R46 Sectigo Public Server Authentication Root E46 |
| Public Key | Same | Same |
| Role | Intermediate | Root CA cert |
Path A (legacy clients without R46): via USERTrust (cross-signed chain)
Leaf cert
└── InCommon RSA OV SSL CA 3
└── Sectigo Public Server Authentication Root R46 (cross-signed)
└── USERTrust RSA Certification Authority ← root in trust store
Path B (modern clients): via R46 as native root
Leaf cert
└── InCommon RSA OV SSL CA 3
└── Sectigo Public Server Authentication Root R46 (self-signed) ← root in trust store
Because R46 has the same Subject DN and public key in both variants, a client that has the self-signed R46 in its trust store will recognize the cross-signed cert in the chain as anchoring to that trusted root. It terminates the chain there and never needs to go up to USERTrust.
These are special versions of the Sectigo Public Server Authentication Root R46 or E46 certificates that are signed by the legacy USERTrust root certificate. These act as additional intermediate certificates for maximal compatibility for clients. You can technically skip this at the risk of some legacy applications not working with your application.
See this article for more information:https://www.sectigo.com/resource-library/changes-to-root-ca-hierarchies-and-trust-status#removal-of-trust-for-legacy-cas
Clients connecting to your application have a collection of their own trusted certificates so if they do not already trust your root certificate nothing is changed by your application sending it. The exception is when cross-signed certificates are used for backward compatibilty when root CAs are being distrusted. In those cases additional certificates that are signed by the older CA are issued with the same DN as the self-signed new/modern root.
Your server's SSL certificate is supplied by InCommon if it is issued by the "InCommon ECC or RSA" certificate. To see your certificate's issuer you can use the online certificate decoder. You can also use the openssl tool:
openssl x509 -noout -in /path/to/your/server/certificate -issuer
Sectigo Public Server Authentication Root R46 (RSA)
Sectigo Public Server Authentication Root E46 (ECC)