Self-signed certificate chain not trusted in iOS when only TLS Server Certificate to the web server
Hi All,
We have the following x509 certificate chain for a web server running in a private networks.
+- Root CA Certificate (Self-signed)
+- Application Signing Intermediate Certificate (Self-Signed)
+- TLS Intermediate CA Certificate (Self-Signed)
+- TLS Server Certificate (Self-Signed, Note: TLS server certificate follows these requirements: Requirements for trusted certificates in iOS 13 and macOS 10.15 – Apple Support (AU))
The certificates were deployed to the test iPhone SE and iPad (Root and TLS Intermediate CA certificates) devices, and web server (TLS Server certificates). In both devices, Safari shown connection are not private. When tested the same in Windows and Android (Samsung Galaxy Tab), the connections were all secured.
When TLS Intermediate CA and TLS server certificates are combined into one PEM file, the connection became secured in both the iPad and iPhone SE. Is this the proper way? Do we need to deploy a certificate chain from after the root to the TLS server certificate?
We didn't faced this issue during our initial development, the only difference is we didn't use a TLS Intermediate CA Certificate (our TLS server certificate is directly signed by the root CA).
Currently, we have no idea why when just the TLS server certificate is deployed to the web server the connection is not secured but when the a certificate chain (TLS Server + intermediate) is deployed the connection becomes secure.