Managing root certificates
When the Server Agent scans local file systems and keystores, it discovers all X.509 certificates, including root and intermediate root certificates.
After you discover the root and intermediate root certificates deployed on local systems, you can bring those certificates under management for monitoring. You can also download and share the root and intermediate root certificates with other systems.
Additionally, Trust Protection Platform allows you to manually upload root and intermediate root certificates, which can also be monitored and shared.
TIP To browse topics in this section, use the menu on the left side of this page.