Validation result

Information

File Name
direct-trust-CA.pem
OID :
1.3.6.1.4.1.12559.11.11.4.21136
Validation Date :
1/17/25 7:21:57 AM (CET GMT+0100)
GSS - Digital certificate validator ()
TLS server ()
Validation Results :
DONE_FAILED
Permanent link :
https://connectathon.ihe-catalyst.net/evs/report.seam?oid=1.3.6.1.4.1.12559.11.11.4.21136
Data Visibility :
Public

Validation Results

«
»

GSS - Digital certificate validator Standard Report
Additional Metadata GSS - Digital certificate validator
XML

«
»
Validation Summary
1

TLS serverFAILED

Validation Summary
1
Constraint ID
PKIX
Constraint Description
PKIX validation (CN=EMR Direct Test CA, OU=Certification Authority (certs.emrdirect.com), O=EMR Direct, L=San Diego, ST=CA, C=US) : The certificate has a valid signature, but is no trust anchor

File Content



Certificate
Binary content

«
»

The following content has been modified for better visualization. Validation will be performed on original content
1 [
2 [
3 Version: V3
4 Subject: CN=EMR Direct Test CA, OU=Certification Authority (certs.emrdirect.com), O=EMR Direct, L=San Diego, ST=CA, C=US
5 Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
6
7 Key: Sun RSA public key, 4096 bits
8 modulus: 765452407624255318385514594592971691095243268988688829249205888887057914822857267132309182708240448498661348512665107073999732856646929018396173198330263123250437843539423058016931819585909930722777911810602343648072242057544907722745084396183282108656460269852953286425396812484327480155756548659526313360964682894582382235274342437027647253087438215902238258864660184196096697258470366262799331220520659864038167956178919359694813832331631452064038103534616401745400614131755860303410560369809348344791665358900436187615898798529052808269476322954324456335878617788203650930039183072516267508512781373691153292651780389365882300459636704177116767123204123820444790881607166503407302329113872476087296077959301837415989722239744047376573220584483102869724211685775290088354657309159687572320320980743955820570935942819285519649933899147425051826659360705660328240725172778339369882861159699373063090450354301940581497413892710363887076985529450214778727378139684303291254436496020232088349320768561677288162130576870216035088595068755648140921276216525790498746558104065162024938003929343970540185146218842611784394628722248766183738839784359833120325064486435590128447666480494080803275677682348370420604519202555366116342776395641
9 public exponent: 65537
10 Validity: [From: Thu Sep 06 06:31:36 CEST 2012,
11 To: Mon Sep 06 06:31:36 CEST 2032]
12 Issuer: CN=EMR Direct Test CA, OU=Certification Authority (certs.emrdirect.com), O=EMR Direct, L=San Diego, ST=CA, C=US
13 SerialNumber: [ 01]
14
15 Certificate Extensions: 6
16 [1]: ObjectId: 2.5.29.35 Criticality=false
17 AuthorityKeyIdentifier [
18 KeyIdentifier [
19 0000: 31 D6 84 2F 49 98 6E 00 01 D0 67 A1 F8 9E 1C B0 1../I.n...g.....
20 0010: 6F A7 A2 AC o...
21 ]
22 ]
23
24 [2]: ObjectId: 2.5.29.19 Criticality=true
25 BasicConstraints:[
26 CA:true
27 PathLen:2147483647
28 ]
29
30 [3]: ObjectId: 2.5.29.31 Criticality=false
31 CRLDistributionPoints [
32 [DistributionPoint:
33 [URIName: http://certs.emrdirect.com/EMRDirectTestCA.crl]
34 ]]
35
36 [4]: ObjectId: 2.5.29.32 Criticality=false
37 CertificatePolicies [
38 [CertificatePolicyId: [2.5.29.32.0]
39 [] ]
40 ]
41
42 [5]: ObjectId: 2.5.29.15 Criticality=true
43 KeyUsage [
44 Key_CertSign
45 Crl_Sign
46 ]
47
48 [6]: ObjectId: 2.5.29.14 Criticality=false
49 SubjectKeyIdentifier [
50 KeyIdentifier [
51 0000: 31 D6 84 2F 49 98 6E 00 01 D0 67 A1 F8 9E 1C B0 1../I.n...g.....
52 0010: 6F A7 A2 AC o...
53 ]
54 ]
55
56 ]
57 Algorithm: [SHA256withRSA]
58 Signature:
59 0000: 6C 5D B6 3C 07 B1 5C 22 C9 32 78 1F C2 18 42 3B l].<..\".2x...B;
60 0010: EC 66 83 30 37 CA 58 6B 1E 24 96 25 25 8C F6 15 .f.07.Xk.$.%%...
61 0020: E2 09 80 FB 6A 74 F8 73 9F 48 E1 41 45 5C C2 BF ....jt.s.H.AE\..
62 0030: FF 80 2E 63 D5 A0 11 96 EB 2C 1B 78 0C AF C3 9A ...c.....,.x....
63 0040: 8E 94 A9 3A AA 9F 5C 48 F3 B8 84 DE AB E1 F1 B2 ...:..\H........
64 0050: 9F AE AE C8 89 5C E6 4A 86 EA D8 E4 D2 4A 67 7D .....\.J.....Jg.
65 0060: 2E 94 50 F1 39 9F 7B 6D 65 54 60 F4 DF CB 2D 6A ..P.9..meT`...-j
66 0070: 52 BB 2A 9C D9 56 F0 B2 5C 0A 73 73 67 6B 83 48 R.*..V..\.ssgk.H
67 0080: 99 F7 D8 5B A0 52 D5 9E D0 41 20 44 CD 74 FF C4 ...[.R...A D.t..
68 0090: 36 20 95 CB B8 88 44 40 B6 F0 97 AA BB 3D C0 E2 6 ....D@.....=..
69 00A0: 3E 44 FF C9 58 7F F4 BE AE 97 66 CE FD 95 E9 EC >D..X.....f.....
70 00B0: 37 92 3D E3 9A 7D 63 AE 0A 84 CD 6C AC 60 06 E9 7.=...c....l.`..
71 00C0: 63 6A 39 B6 54 D0 79 F9 7C 7F AD 2B 8F 9E 84 D1 cj9.T.y....+....
72 00D0: 86 C6 97 86 47 BE 9D BD D9 6C 61 C9 D9 94 6E FD ....G....la...n.
73 00E0: 0E 39 F8 E0 75 C2 CE D5 79 D9 CC 72 2D B9 39 5A .9..u...y..r-.9Z
74 00F0: 3E C9 5A 47 F2 D9 76 28 5F 6E D4 95 4D B5 FE 66 >.ZG..v(_n..M..f
75 0100: 63 7F FF 1C 4C 11 F0 E7 CF 3D 16 5E 40 2A AA B8 c...L....=.^@*..
76 0110: 44 95 AD 08 D9 20 B6 BA 3A DE E5 54 88 68 34 8E D.... ..:..T.h4.
77 0120: B3 91 90 29 DD 36 96 60 18 BD E2 EA 55 91 E0 3D ...).6.`....U..=
78 0130: BA A5 48 0B B7 01 A6 23 B3 FB A5 D7 44 37 49 0C ..H....#....D7I.
79 0140: CB A1 EB 1B 00 DA DA B6 13 90 58 E7 51 F9 A5 FB ..........X.Q...
80 0150: 24 5C 10 46 80 7C 43 43 9E 91 DD 1B 24 67 BA BF $\.F..CC....$g..
81 0160: 35 A2 92 8A A0 40 22 7B 9E 1B B4 D5 5B E7 51 FB 5....@".....[.Q.
82 0170: EA D3 DA 7F 70 93 32 47 2A 90 3E 61 2D 33 1E 87 ....p.2G*.>a-3..
83 0180: 6F 22 80 7B D4 A3 6A D4 FF FD 72 1A 02 31 C0 6B o"....j...r..1.k
84 0190: 36 98 79 9F 7D 82 F0 3A 4E 94 5F A1 8B 79 0E 93 6.y....:N._..y..
85 01A0: 08 F0 72 17 E4 CC 2E 57 4B E6 62 A3 95 58 3B 20 ..r....WK.b..X;
86 01B0: 95 D4 2F 82 60 9E EC C3 5A 6C 93 5C 98 01 63 E6 ../.`...Zl.\..c.
87 01C0: F6 B9 D4 99 FA E6 3B 6E C7 5E FE A5 5B 46 7D 12 ......;n.^..[F..
88 01D0: 97 94 BB EF B9 D8 24 98 8D 9B 31 DC 4E 09 D4 54 ......$...1.N..T
89 01E0: 74 4E E9 73 B0 3F 01 42 D1 51 2F A6 8F 7E E4 A0 tN.s.?.B.Q/.....
90 01F0: F3 9A 24 3A CC 70 6F FA 74 01 D2 13 C5 13 B4 BD ..$:.po.t.......
91
92 ]