Our Intermediate Certificates
When Trustico® issues your SSL Certificate, it's signed by an Intermediate Certificate Authority (CA). These Intermediate CAs are in turn signed by a trusted Root Certificate Authority.
The specific Intermediate CA (also known as the Issuer CA) that signs your SSL Certificate may vary depending on the SSL Certificate type.
For optimal security and browser compatibility, we strongly recommend installing the Intermediate Certificate on your server. This installation creates a complete chain of trust from the Root CA through to your End Entity Certificate.
Below you'll find links to where you can download the necessary Intermediate Certificate for your specific needs.
The following Intermediates should be used for Trustico® branded SSL Certificates issued after 24 May 2025.
RSA Domain Validation (DV) Intermediates
Our SSL Certificates are available in two cryptographic variants : RSA and ECC. For RSA-based SSL Certificates, we use the "Trustico RSA DV SSL CA 2" Intermediate SSL Certificate, which is specifically designed to issue and validate RSA algorithm SSL Certificates.
We additionally recommend the installation of the cross-chain version of the Sectigo Public Server Authentication Root R46 Intermediate. This ensures ubiquity across a broad range of devices.
Usually, we include your Intermediate SSL Certificates during the issuance process. If you are not sure what to install, please refer to your fulfillment e-mail for clarification.
ECC (Elliptic Curve Cryptography) Domain Validation (DV) Intermediates
For customers who prefer the newer ECC (Elliptic Curve Cryptography) SSL Certificates, we use the "Trustico ECC DV SSL CA 2" Intermediate SSL Certificate.
ECC offers comparable security to RSA while using shorter key lengths, resulting in faster processing times and lower computational overhead.
The choice between RSA and ECC Intermediate SSL Certificates must match your SSL Certificate type - RSA Intermediates for RSA SSL Certificates, and ECC Intermediates for ECC SSL Certificates.
Organization Validation Intermediate
We offer Organization Validated SSL Certificates in both RSA and ECC cryptographic formats. For our RSA-type OV SSL Certificates, issuance and validation are handled by the "Trustico RSA OV SSL CA 2" Intermediate SSL Certificate, purpose-built for RSA algorithm OV SSL Certificate management.
Customers selecting our ECC (Elliptic Curve Cryptography) OV SSL Certificates benefit from the "Trustico ECC OV SSL CA 2" Intermediate SSL Certificate.
This modern cryptographic approach matches RSA's security standards but excels in efficiency, featuring shorter key lengths that enable faster processing and minimize computational demands.
Note : Matching your Intermediate SSL Certificate to your OV SSL Certificate type is essential - use RSA Intermediates with RSA OV SSL Certificates, and ECC Intermediates with ECC OV SSL Certificates to ensure proper functionality.
Extended Validation Intermediate
Extended Validation SSL Certificates from Trustico® come in two cryptographic options : RSA and ECC.
When you choose an RSA-based EV SSL Certificate, it's issued through our "Trustico RSA EV SSL CA 2" Intermediate SSL Certificate, engineered specifically for RSA algorithm EV SSL Certificate validation and issuance.
If you opt for our ECC (Elliptic Curve Cryptography) EV SSL Certificates, these are issued through the "Trustico ECC EV SSL CA 2" Intermediate SSL Certificate.
The advantage of ECC technology lies in its ability to deliver RSA-equivalent security levels while utilizing shorter key lengths, which translates to improved processing speed and reduced server resources.
Important : Your Intermediate SSL Certificate selection must align with your chosen EV SSL Certificate type. RSA Intermediate SSL Certificates pair with RSA EV SSL Certificates, while ECC Intermediate SSL Certificates must be used with ECC EV SSL Certificates.
Windows IIS Problems?
If you are having problems with IIS and your chain, it has been noticed that there can be some issues with their chain-building technology. Essentially, Windows as a client will try and build the shortest available chain.
This works well for a client machine but is not so well for a server - which should send the longest available chain (as longest, usually is the most ubiquitous chain).
One solution is by removing the shorter (non cross-chain) Sectigo Public Server Authentication Root R46 from the Root and Intermediate stores and adding it specifically to the Untrusted Certificates list.
Windows Chain Building Information 🔗
Doing this will the force sending the longer Sectigo Public Server Authentication Root R46 (Cross Chain issued by USERTrust RSA Certification Authority)
-
PositiveSSL DV Single Site
Vendor :Sectigo CARegular Price From €42,95 EURRegular Price -
Trustico® DV Single Site
Vendor :Trustico CARegular Price From €42,95 EURRegular Price -
PositiveSSL DV + Wildcard
Vendor :Sectigo CARegular Price From €154,95 EURRegular Price -
Trustico® DV + Wildcard
Vendor :Trustico CARegular Price From €215,95 EURRegular Price -
Sectigo® DV Single Site
Vendor :Sectigo CARegular Price From €59,95 EURRegular Price -
PositiveSSL DV + Multi Domain
Vendor :Sectigo CARegular Price From €85,95 EURRegular Price€0,00 EURSale Price From €85,95 EUR

We Match Our Competitors Prices
We'd prefer not to lose your business, if you have found a cheaper price we'll ensure to welcome you as a customer of Trustico® by matching the price you have found elsewhere.
Trustico® Blog Posts
-
SEO and SSL Certificates (SSL)
Trustico® SSL Certificates provide the HTTPS encryption that search engines look for when determining rankings. Sites secured with our SSL Certificates typically see improved search visibility and higher placement in results.
SEO and SSL Certificates (SSL)
Trustico® SSL Certificates provide the HTTPS encryption that search engines look for when determining rankings. Sites secured with our SSL Certificates typically see improved search visibility and higher placement in results.
-
SSL Certificate Sniffing Attacks
SSL Certificate sniffing occurs when attackers intercept encrypted traffic between a client and server by exploiting vulnerabilities in the SSL Certificate/TLS protocols. Without proper SSL Certificate security measures, sensitive data...
SSL Certificate Sniffing Attacks
SSL Certificate sniffing occurs when attackers intercept encrypted traffic between a client and server by exploiting vulnerabilities in the SSL Certificate/TLS protocols. Without proper SSL Certificate security measures, sensitive data...
-
Understanding SSL Certificate Bridging
SSL Certificate bridging creates secure connections between systems using different SSL Certificate types or configurations. This is especially important for enterprises running hybrid environments or connecting legacy systems with modern...
Understanding SSL Certificate Bridging
SSL Certificate bridging creates secure connections between systems using different SSL Certificate types or configurations. This is especially important for enterprises running hybrid environments or connecting legacy systems with modern...