6. Distribute the CA certificates issued by the Federal Common Policy CA G2
The intermediate certification authorities (CAs) with certificates issued by the Federal Common Policy CA (FCPCA) were issued new certificates by the Federal Common Policy CA G2 (FCPCA G2) to support the migration to the new Federal PKI trust anchor. Depending on agency configurations, you might need to distribute these certificates to systems and applications.
This page will help you understand when to distribute the intermediate CA certificates, which certificates to distribute, and recommended solutions. This page also lists intermediate CA certificate details, including download locations.
Do I Need to Distribute the Intermediate CA Certificates?
Operating Systems
You might need to distribute the intermediate CA certificates issued by the FCPCA G2, depending upon your enterprise operating systems’ type and configuration.
- Microsoft Windows: Intermediate CA certificate distribution is recommended.
- Typically, Windows clients are able to dynamically build paths to a trusted root CA certificate through Microsoft’s Certificate Chaining Engine (CCE).
- Distributing the intermediate CA certificates improves system performance and prioritizes use of the FCPCA G2 over the FCPCA.
- There are instances where dynamic validation can fail, for example, when firewall rules prevent Microsoft from navigating to a certificate’s Authority Information Access extension Uniform Resource Locator. Email us at fpkirootupdate@gsa.gov with any questions or issues.
-
macOS or iOS: Intermediate CA certificate distribution is required.
- Linux or Unix: Intermediate CA certificate distribution is required.
Applications
Many, but not all, software applications leverage the underlying operating system trust store to verify whether a certificate should be trusted.
Collaborate across agency teams to identify applications that rely on custom trust stores to ensure distribution of the intermediate CA certificates issued by the FCPCA G2.
Example applications with custom trust stores that may require intermediate CA certificate installation:
- Java and all Java-based applications (for example, Apache Tomcat)
- Mozilla products (for example, Firefox or Thunderbird)
- OpenSSL-based applications (for example, Apache HTTP Server or Nginx)
Which Certificates Do I Need to Distribute?
Identify which, if any, of the intermediate CA certificates issued by the Federal Common Policy CA are currently being distributed across your agency.
A recommended starting point would be to replicate the existing configuration for CA certificates issued by the Federal Common Policy CA, instead of distributing the new certificates issued by the Federal Common Policy G2.
If you’re not sure which intermediate CA certificates issued by the FCPCA G2 you need to distribute, consider distributing all of them or email us for help at fpkirootupdate@gsa.gov.
How Do I Distribute the Intermediate CA Certificates?
Recommended solutions for distributing intermediate CA certificates are listed below.
Use Microsoft Group Policy Object
You must have enterprise administrator privileges for the domain to use these procedures. You must run the commands from an agency domain controller.
- Navigate to Server Manager.
- Select Tools.
- Select Group Policy Management from the drop-down list.
- Right-click your desired domain(s), and select Create a GPO in this domain, and Link it here.
- Enter a GPO Name and click OK.
- Right-click the newly created GPO and click Edit.
- Navigate to Policies > Windows Settings > Security Settings > Public Key Policies.
-
Right-click Intermediate Certification Authorities, and select Import.
The Certificate Import Wizard appears
- Browse to and select the certificates issued by the FCPCA G2 that you want to distribute.
- Verify that the target Certificate Store presents Intermediate Certification Authorities, and select Next.
-
Select Finish to complete the import.
A success message appears.
- Close the Group Policy Management window.
- Wait for clients to consume the new policy.
- (Optional) To force client consumption, click Start, type cmd, press Enter, and run the following command:
gpupdate /force
Use Apple Configuration Profile
Only System or Mobile Device Management (MDM) Administrators should create, distribute, and install Apple configuration profiles.
Create an Apple Configuration Profile
- As an administrator, download and verify the certificates issued by the FCPCA G2 that you want to distribute.
- Download and install Configurator 2 from the Apple App Store.
- Open Configurator 2 and click File > New Profile.
- On the General tab, enter a unique profile Name (for example, FPKI Intermediate CA Certificate Distribution Profile) and Identifier (for example, FCPCAG2-Intermediate-0001).
- On the Certificates tab, click Configure.
- Browse to and select the certificates you want to distribute.
- (Optional) Add additional agency-specific configurations or customizations.
- Click File > Save to save your profile to your preferred location.
- Follow the steps to distribute the profile to macOS and iOS devices across your enterprise.
Note: The following video shows you how to create an Apple configuration profile.
Use Linux Command Line
The steps to distribute an intermediate CA certificate are the same as the steps to distribute a root CA certificate.
Certificates Issued By the Federal Common Policy CA G2
The following certificates are published in the Federal Common Policy CA G2 certificate’s Subject Information Access extension bundle located at http://repo.fpki.gov/fcpca/caCertsIssuedByfcpcag2.p7c.
- Issued to: Federal Bridge CA G4
- Issued to: U.S. Department of State AD Root CA
- Issued to: US Treasury Root CA
- Issued to: DigiCert Federal SSP Intermediate CA - G5
- Issued to: Symantec SSP Intermediate CA - G4
- Issued to: Entrust Managed Services Root CA
- Issued to: Verizon SSP CA A2
- Issued to: ORC SSP 4
- Issued to: WidePoint ORC SSP CA 5
Important! To ensure PIV credential certificates issued by the Entrust Federal SSP before August 13, 2019 validate to the Federal Common Policy CA G2, you'll need to distribute an additional intermediate CA certificate to systems that are unable to perform dynamic path validation. Learn more on our Frequently Asked Questions page.
Issued to: Federal Bridge CA G4
Certificate Attribute | Value |
---|---|
Distinguished Name | CN=Federal Bridge CA G4, OU=FPKI, O=U.S. Government, C=US |
Validity | October 15, 2020 to December 6, 2029 |
Serial Number | 234200beaa6dada658f53b403f418295290cae82 |
SHA-1 Thumbprint | 97db351e069964297a82040eb760c9cc1d74ba33 |
SHA-256 Thumbprint | 74383CA1BB648F96EFE9E6ECADB5A8A359E7DF9BA262EF7C02BD004EAB3895F4 |
Download Location | Click here |
Issued to: U.S. Department of State AD Root CA
Certificate Attribute | Value |
---|---|
Distinguished Name | CN=U.S. Department of State AD Root CA, CN=AIA, CN=Public Key Services, CN=Services, CN=Configuration, DC=state, DC=sbu |
Validity | November 18, 2020 to November 18, 2023 |
Serial Number | 27634fd321cbfd8c7efc0aeb02876f63da4c0c09 |
SHA-1 Thumbprint | 9b3849f7047964a6654988054956e478ccb75ded |
SHA-256 Thumbprint | 9744734dbd34f28d3c87a9094387388e7623a272437c612e88d251138c1db93c |
Download Location | Click here |
Issued to: US Treasury Root CA
Certificate Attribute | Value |
---|---|
Distinguished Name | OU=US Treasury Root CA, OU=Certification Authorities, OU=Department of the Treasury, O=U.S. Government, C=US |
Validity | April 6, 2022 to April 6, 2025 |
Serial Number | 279f09737fe5dd3d7534be0ea51aff9dc4018501 |
SHA-1 Thumbprint | 52de6628d8c70a9df9e1df94fcd84728b33c05ec |
SHA-256 Thumbprint | ed40cc2e18e224f1c8dc6d0786559576517139be777153cd9f8ad2d215a9be79 |
Download Location | Click here |
Issued to: DigiCert Federal SSP Intermediate CA - G5
Certificate Attribute | Value |
---|---|
Distinguished Name | CN=DigiCert Federal SSP Intermediate CA - G5, O=DigiCert, Inc., C=US |
Validity | November 18, 2020 to December 13, 2028 |
Serial Number | 24bc168f9ccb30cfcef8f0a58f26f10181869266 |
SHA-1 Thumbprint | 9aecfbe2de8aea49d220bbf799172c00527fe756 |
SHA-256 Thumbprint | ea86e0baf55eef020ed58196af865f2fa72a77d1be70a779b65a9cbf0b5ee3f2 |
Download Location | Click here |
Issued to: Symantec SSP Intermediate CA - G4
Certificate Attribute | Value |
---|---|
Distinguished Name | CN=Symantec SSP Intermediate CA - G4, O=Symantec Corporation, C=US |
Validity | November 18, 2020 to November 12, 2024 |
Serial Number | 262bd1f025c8af37334545666ea6c9ea946c2c34 |
SHA-1 Thumbprint | 4c40f62b5c3f13533a8f8a1d44f8b027aaa0fd3d |
SHA-256 Thumbprint | 09d3f1a7d2e0be1a8d043fdf5d16bf8bf18e0dff2f397f27b0b8ee962de59de5 |
Download Location | Click here |
Issued to: Entrust Managed Services Root CA
Certificate Attribute | Value |
---|---|
Distinguished Name | OU=Entrust Managed Services Root CA, OU=Certification Authorities, O=Entrust, C=US |
Validity | November 18, 2020 to August 14, 2029 |
Serial Number | 215e78d99648b021c6394a6566d8e00f46a1e595 |
SHA-1 Thumbprint | 07f5dc58f83778d5b5738a988292c00a674a0f40 |
SHA-256 Thumbprint | e3d6b1b33d0a5df0630b32bf17f9fb632b0471a6cac561f164aa6429ef0699a1 |
Download Location | Click here |
Issued to: Verizon SSP CA A2
Certificate Attribute | Value |
---|---|
Distinguished Name | CN=Verizon SSP CA A2, OU=SSP, O=Verizon, C=US |
Validity | November 18, 2020 to December 6, 2026 |
Serial Number | 25fca834ada24a4455a2db0ff4cef7c411198e3a |
SHA-1 Thumbprint | b2167fd38ff47bb910d8dcc32fcc3b7b63a09ff7 |
SHA-256 Thumbprint | 226508d2a1c926a7092218e743ccd01bab8273291feef66941691592fa7c12b8 |
Download Location | Click here |
Issued to: ORC SSP 4
Certificate Attribute | Value |
---|---|
Distinguished Name | CN=ORC SSP 4, O=ORC PKI, C=US |
Validity | November 18, 2020 to January 21, 2024 |
Serial Number | 20a0e513367881559a5e7d20d35fa7c6739a42ab |
SHA-1 Thumbprint | 3e6610b03daca9fa07e1093b60ccb8927c42d83b |
SHA-256 Thumbprint | 7cd7f21d04beb99d9f833be8697138e3ad4e11313897ee573c066132d21ab5f8 |
Download Location | Click here |
Issued to: WidePoint ORC SSP CA 5
Certificate Attribute | Value |
---|---|
Distinguished Name | CN=WidePoint ORC SSP 5, O=ORC PKI, C=US |
Validity | November 19, 2020 to November 5, 2030 |
Serial Number | 210b3f17db750e616eb25f3f0b4933e5a98c449b |
SHA-1 Thumbprint | 80f4731a60fd5f2eb0468d0629310daa50ad210d |
SHA-256 Thumbprint | 70200179049bdc8cbe94b4880730609489f324f2a770477f7c1859401e644c72 |
Download Location | Click here |
Certificates issued to the Federal Common Policy CA G2
Distrusting the certificate below will prevent workstations from building a path from the Federal Common Policy CA G2, through the Federal Bridge CA G4, to the Federal Common Policy CA or any other root. For more on how to distrust a certificate, click here.
Issued by: Federal Bridge CA G4
Certificate Attribute | Value |
---|---|
Distinguished Name | CN=Federal Common Policy CA G2, OU=FPKI, O=U.S. Government, C=US |
Validity | October 15, 2020 to December 6, 2029 |
Serial Number | 129217e6c9126fd816babe02d9192ae2b519e231 |
SHA-1 Thumbprint | edf2d373f4c56b5186087300638e3c5660c9a090 |
SHA-256 Thumbprint | 0b658c27727dfd6cd47e378ae2390ea376d9708ecf4b06775f8ee7bc50119991 |
Download Location | Click here |
Next, migrate to the FCPCA G2.