Continuum Systems Root CA
Self-signed Root Certificate Authority. Import this to your trust store to trust all certificates in the Continuum hierarchy.
Certificate Details
- subject
- CN=Continuum Systems Root CA, O=Continuum Systems Ltd., C=KY
- algorithm
- ECDSA P-384, SHA-384
- validity
- 2026-01-20 to 2051-01-14 (25 years)
- key Usage
- Certificate Sign, CRL Sign
root.crt•PEM format
Continuum Trust Services E1
Intermediate Issuing CA for TLS and client certificates. This CA issues end-entity certificates.
Certificate Details
- subject
- CN=Continuum Trust Services E1, O=Continuum Systems Ltd., C=KY
- algorithm
- ECDSA P-384, SHA-384
- validity
- 2026-01-21 to 2036-01-19 (10 years)
- key Usage
- Certificate Sign, CRL Sign
e1.crt•PEM format
Full Certificate Chain
Complete certificate chain including E1 and Root CA. Use this for server configurations that require the full chain.
Certificate Details
- contents
- E1 Certificate + Root CA Certificate
- format
- PEM encoded, concatenated
chain.pem•PEM format
Repository URLs
- Root CA Certificate
- https://pki.continuum.lat/root.crt
- E1 Issuing CA Certificate
- https://pki.continuum.lat/e1.crt
- Full Chain
- https://pki.continuum.lat/chain.pem
- OCSP Responder
- http://ocsp.continuum.lat
Certificate Fingerprints
Continuum Systems Root CA
SHA-256: Verify with: openssl x509 -in root.crt -noout -fingerprint -sha256
Continuum Trust Services E1
SHA-256: Verify with: openssl x509 -in e1.crt -noout -fingerprint -sha256
Installation
macOS
# Add to System Keychain (requires admin)
sudo security add-trusted-cert -d -r trustRoot \
-k /Library/Keychains/System.keychain root.crtLinux (Debian/Ubuntu)
sudo cp root.crt /usr/local/share/ca-certificates/continuum-root.crt
sudo update-ca-certificatesWindows
# PowerShell (as Administrator)
Import-Certificate -FilePath root.crt -CertStoreLocation Cert:\LocalMachine\Root