Root Certificate (Root Certificate)
Why Root Certificate Matters
Root certificates are the ultimate trust anchors for the entire web PKI (Public Key Infrastructure). Every HTTPS connection ultimately depends on the browser trusting a root certificate. If a root CA's key is compromised, every certificate it has ever signed - directly or through intermediates - becomes suspect.
Because of this enormous trust, root CA keys are stored in heavily secured, air-gapped hardware security modules and are used infrequently. Day-to-day certificate issuance is done by intermediate CAs. The root signs the intermediate's certificate once, and then the root key goes back into secure storage.
Browser and OS vendors maintain root certificate programs (Apple Root Program, Mozilla Root Program, Microsoft Trusted Root Program) that set the requirements CAs must meet. CAs that fail to meet these standards can be removed, as happened with WoSign/StartCom and Symantec. Website operators do not directly interact with root certificates, but should be aware that the trustworthiness of their certificate chain depends on the root CA's standing in these programs.
How to Check
An SSL checker shows the complete certificate chain including which root CA anchors the trust. You can also view the root by clicking the lock icon in your browser and inspecting the certificate details. If your certificate chain does not lead to a widely trusted root, you will see trust warnings.