Intermediate Certificate (Intermediate Certificate)
Why Intermediate Certificate Is Important
Intermediate certificates exist primarily to protect root certificate private keys. If an intermediate CA key is compromised, the root CA can revoke just that intermediate without affecting certificates signed by other intermediates. If the root key itself were compromised, the entire CA would need to be distrusted.
The most common SSL configuration error is failing to install intermediate certificates on the server. When this happens, the server sends only its own certificate without the intermediates needed to complete the chain to the root. Some desktop browsers can work around this by fetching intermediates using the Authority Information Access (AIA) extension, but mobile devices and non-browser clients often cannot.
Most CAs provide a "full chain" or "bundle" file that includes all necessary intermediates. When configuring your web server (Apache, Nginx, etc.), you must include this bundle file alongside your server certificate. Missing intermediates cause intermittent failures that are hard to debug because they only affect certain clients.
Checking Your Setup
Use an SSL checker to verify your server sends the complete certificate chain. The tool will flag missing intermediates. If you see "incomplete chain" warnings, download the correct intermediate bundle from your CA and reconfigure your server to include it.