← Back to Home

PKI Repository

Public CA certificates for Continuum Trust Services

Continuum Systems Root CA

Self-signed Root Certificate Authority. Import this to your trust store to trust all certificates in the Continuum hierarchy.

Download

Certificate Details

subject
CN=Continuum Systems Root CA, O=Continuum Systems Ltd., C=KY
algorithm
ECDSA P-384, SHA-384
validity
2026-01-20 to 2051-01-14 (25 years)
key Usage
Certificate Sign, CRL Sign
root.crtPEM format

Continuum Trust Services E1

Intermediate Issuing CA for TLS and client certificates. This CA issues end-entity certificates.

Download

Certificate Details

subject
CN=Continuum Trust Services E1, O=Continuum Systems Ltd., C=KY
algorithm
ECDSA P-384, SHA-384
validity
2026-01-21 to 2036-01-19 (10 years)
key Usage
Certificate Sign, CRL Sign
e1.crtPEM format

Full Certificate Chain

Complete certificate chain including E1 and Root CA. Use this for server configurations that require the full chain.

Download

Certificate Details

contents
E1 Certificate + Root CA Certificate
format
PEM encoded, concatenated
chain.pemPEM format

Repository URLs

Root CA Certificate
https://pki.continuum.lat/root.crt
E1 Issuing CA Certificate
https://pki.continuum.lat/e1.crt
Full Chain
https://pki.continuum.lat/chain.pem
OCSP Responder
http://ocsp.continuum.lat

Certificate Fingerprints

Continuum Systems Root CA

SHA-256: Verify with: openssl x509 -in root.crt -noout -fingerprint -sha256

Continuum Trust Services E1

SHA-256: Verify with: openssl x509 -in e1.crt -noout -fingerprint -sha256

Installation

macOS

# Add to System Keychain (requires admin)
sudo security add-trusted-cert -d -r trustRoot \
  -k /Library/Keychains/System.keychain root.crt

Linux (Debian/Ubuntu)

sudo cp root.crt /usr/local/share/ca-certificates/continuum-root.crt
sudo update-ca-certificates

Windows

# PowerShell (as Administrator)
Import-Certificate -FilePath root.crt -CertStoreLocation Cert:\LocalMachine\Root