CA Root Certificate
Trust anchor for all certificates issued by this CA
Common Name
[cyphers] Trust CA
Algorithm
ECDSA P-384
Fingerprint (SHA-256)
A1:B2:C3:D4:E5:F6:01:23:45:67:89:AB:CD:E...
Valid From
12 Feb 2026
Valid Until
2036-02-12
Usage
Certificate Signing, CRL Signing
SPKI Pin (Base64)
sha256/YhKJG3Rk7GDhJRJXdH0zOOJE2mLbXeR3oBfEhVNzaXY=
Subject Public Key Info (SPKI) pinning allows clients to verify the CA's public key independently of the certificate chain. Use this Base64-encoded SHA-256 hash to configure certificate pinning in your applications, reverse proxies, or service meshes. This provides an additional layer of trust beyond standard chain validation.
Installation Guide
# Download the CA certificate curl -o ca.pem https://your-hub-url/api/ca/cert # Install to system trust store (Debian/Ubuntu) sudo cp ca.pem /usr/local/share/ca-certificates/cyphers-hub-ca.crt sudo update-ca-certificates # Install to system trust store (RHEL/CentOS/Fedora) sudo cp ca.pem /etc/pki/ca-trust/source/anchors/cyphers-hub-ca.pem sudo update-ca-trust
# Download the CA certificate curl -o ca.pem https://your-hub-url/api/ca/cert # Add to System Keychain (requires admin password) sudo security add-trusted-cert -d -r trustRoot \ -k /Library/Keychains/System.keychain ca.pem # Verify installation security find-certificate -a -c "Cyphers Hub" \ /Library/Keychains/System.keychain
# PowerShell (Run as Administrator) # Download the CA certificate Invoke-WebRequest -Uri https://your-hub-url/api/ca/cert ` -OutFile ca.pem # Import to Trusted Root CA store certutil -addstore -f "ROOT" ca.pem # Verify installation certutil -store "ROOT" | findstr "Cyphers"
# Dockerfile snippet # Copy the CA certificate into the image COPY ca.pem /usr/local/share/ca-certificates/cyphers-hub-ca.crt # Update the trust store RUN update-ca-certificates # --- Or mount at runtime --- # docker run -v ./ca.pem:/usr/local/share/ca-certificates/cyphers-hub-ca.crt \ # --entrypoint sh my-image -c "update-ca-certificates && exec my-app"
CA Trust Bundle (ZIP)
Contains the root certificate in PEM, DER, and CRT formats plus the SPKI pin and installation scripts.