Devices, such as a phone or a laptop, may include a device certificate to identify the device. This certificate can be used for device verification. For example, in a laptop there is a certificate that identifies both you and the laptop. That certificate is issued by a Certificate Authority. For the device to be trusted, you need to upload the CA certificate that issued the device certificate as a Trusted CA.
Configure a Trusted CA
1.      Click 
 
 > 
 Resources 
 > Certificate Authorities. 
 The Certificate Authorities 
 page appears.
2. Click Trusted Certificate Authority. The Trusted Certificate Authority page appears.
3.      Click 
 
. The Add Trusted 
 Certificate dialog box appears. 
4. Enter a Name for the Trusted CA.
5. Select the State of the certificate. You can Disable a Trusted CA if you no longer want it to be used for device certificate verification.
6.      Click 
 
 next to Upload 
 Certificate and browse to select 
 your .p7b or your .cer 
 CA certificate file.
7.      If 
 required, click 
and browse 
 to select Additional Certificates.
This step is required if in the previous step you uploaded only the CA certificate file. If you only uploaded the CA file, you need to upload all intermediate CA certificate files up to the root CA certificate.
8. Optional. Select Use as User Certificate CA if you want to enable User Certificate authentication for first-factor (passwordless) or second-factor authentication.
9. Optional. Select Enable Revocation Checking if you want to be able to revoke the certificate.
10. Optional. Enter the OCSP Responder URL Location.
11.  Optional. 
 Click 
and browse to select the OCSP 
 Responder Certificate.
Note: OCSP 
 Responder Location and OCSP Responder Certificate are both optional. The OCSP responder location is used 
 only if  the certificate does not include the Authority Information 
 Access (AIA) extension. The OCSP responder certificate is used only if 
 provided and if the responder signs the response and the signature requires 
 verification. 
IDaaS supports public OCSP responders and public HTTP CRL distribution 
 points defined in the certificate. 
12. Click Add. The CA is added to the Trusted Certificate Authority page.
13.  If 
 required, on the Trusted Certificate 
 Authority page, click 
 to include 
 the existing Issuing CAs as trusted CAs that can also be used for device 
 certificate authentication.