TL;DR
You have a problem where multiple certificates share the same subject name (often seen with older or misconfigured Certificate Authorities). This can cause issues with trust and validation. This guide shows you how to identify and resolve this, focusing on practical steps for common scenarios.
Identifying Duplicate Certificates
- Check your Trust Store: The first step is to find out which certificates are installed. How you do this depends on your operating system:
- Windows: Use the
certmgr.msctool (search for ‘Manage computer certificates’). Look in the ‘Trusted Root Certification Authorities’ store. - macOS: Open Keychain Access (Applications > Utilities). Check the ‘System’ keychain and look under ‘Certificates’.
- Linux: The location varies. Common places include
/etc/ssl/certsor/usr/local/share/ca-certificates. You can list them withls /etc/ssl/certs | grep <subject_name>
- Windows: Use the
- Examine Certificate Details: For each certificate with the same subject name, open its details.
- Look at the ‘Issuer’ field. If multiple certificates have the same Issuer and Subject, you likely have a duplicate or conflicting CA root certificate.
- Check the ‘Valid From’ and ‘Valid To’ dates. If they overlap significantly, it’s more likely to be an issue.
Resolving Duplicate Certificates
- Determine the Correct Certificate: You need to identify which certificate is the legitimate one.
- Contact your CA provider (the company that issued the certificates) for guidance. They can tell you which certificate should be trusted.
- If you’re managing internal CAs, check your documentation or CA server logs.
- Remove Incorrect Certificates: Once you know which certificate is incorrect, remove it from the trust store.
- Windows: In
certmgr.msc, right-click the unwanted certificate and select ‘Delete’. You’ll likely need administrator privileges. - macOS: In Keychain Access, drag the unwanted certificate to the Trash. You may be prompted for your password.
- Linux: Use a command like
sudo rm /etc/ssl/certs/<certificate_file>. Be very careful when deleting files in this directory! Back up the certificate first if possible.
- Windows: In
- Update Applications: Some applications cache certificate lists. You may need to restart them or clear their caches for the changes to take effect.
- Restart your web browser.
- Restart any services that use SSL/TLS connections (e.g., web servers, email clients).
- Update Certificate Chain: If you’ve recently updated a CA certificate, ensure all intermediate certificates are also up to date.
- Web servers often require the full chain of trust (root + any intermediate certificates) to be configured correctly.
Preventing Future Issues
- Automated Certificate Management: Use tools like Let’s Encrypt or ACME clients to automate certificate renewal and deployment.
- Centralized Trust Store: For large environments, consider using a centralized trust store solution. This makes it easier to manage certificates consistently across all systems.
- Regular Audits: Periodically audit your trust stores to identify and remove outdated or duplicate certificates.

