BIMI VMC Certificate Email Blue Tick Verified Logo & Email Blue Tick from
$780view

How to Install a Cross-Signed Certificate on Windows IIS

This walkthrough explains how to add the cross-signed version of “Sectigo Public Server Authentication Root R46/E46” (issued by “USERTrust RSA Certification Authority”) on a Windows server and remove the self-signed version of that same root certificate if it exists.

When the self-signed root remains in the store, Windows may build a local trust path that differs from the public browser trust chain. The result can be trust warnings even though the server certificate itself is valid.

By the end of this guide, you will:

  • Install the correct cross-signed certificate into the proper Windows store
  • Remove the conflicting self-signed root certificate
  • Verify that Windows builds the expected certificate chain
  • Confirm the SSL binding in Microsoft IIS

After completing these steps, IIS will present a complete and publicly trusted certificate chain.

Prerequisites

You will need:

  • The cross-signed intermediate certificate file (.crt, .cer, or .p7b)
  • Administrative access to the Windows server running IIS
  • Direct access to the Local Computer certificate store

Perform these steps on the actual IIS server.

Step 1 – Import the Cross-Signed Intermediate

  1. Install the correct cross-signed intermediate into the machine store.
    • Press Win + R
    • Type certlm.msc
    • Click Enter

    certmgr

    This opens the Local Machine certificate store.

  2. Navigate to:
    Intermediate Certification Authorities → Certificates

    Intermediate Certification Authorities Certificate

  3. Right-click Certificates → All Tasks → Import

    Import Certificate

  4. The Certificate Import Wizard starts.
    • Select Next
    • Browse to the downloaded cross-sign certificate (R46 for RSA, E46 for ECC)
    • Select Place all certificates in the following store
    • Confirm Intermediate Certification Authorities
    • Finish the wizard
  5. Download the correct cross-signed intermediate certificate based on your key type:
    • If your SSL certificate uses RSA, download the Sectigo R46.
    • If your SSL certificate uses ECC, download the Sectigo E46.

After import, you should see the cross-signed certificate listed in that folder.

Cross-signed Certificate-List

If it lands somewhere else, delete it and re-import correctly. Don’t leave duplicates floating around.

Step 2 – Remove Self-Signed R46/E46 Root (If Present)

If the self-signed R46 or E46 root is sitting in the Trusted Root store on the server, remove it. Look at the following screenshot to find the Self-Signed R46/E46 Certificates.

Remove Self Signed R46/E46 Root

  1. Open:
    Certlm.msc
  2. Go to:
    Trusted Root Certification Authorities → Certificates
  3. Find:
    • Sectigo Public Server Authentication Root R46
      OR
    • Sectigo Public Server Authentication Root E46
  4. Check the issuer column. If the certificate issued itself, that’s the one.
  5. Right-click → Delete

    Delete Sectigo Public Server Authentication Root E46

  6. Confirm.

Leave the cross-signed version in Intermediate Certification Authorities. Only remove the self-signed root copy from the Trusted Root store.

Step 3 – Export the SSL Certificate as a PFX

You need the leaf (domain) certificate exported together with its private key as a .pfx file for IIS import.

  1. Open either:
    • certlm.msc (Local Machine), or
    • certmgr.msc (Current User)

    Use whichever store actually contains the certificate and private key.

  2. Navigate to:
    Personal → Certificates
  3. Find your domain certificate.
  4. Right-click → All TasksExport
  5. When prompted:
    • Choose Yes, export the private key
    • Select .PFX
    • Enable:
      • Include all certificates in the certification path
      • Export all extended properties
      • Enable certificate privacy

Set a strong password.

Save the file somewhere secure. Don’t drop it on a shared desktop folder and forget about it. You now have a portable PFX with the full chain included.

Step 4 – Import the PFX into IIS and Bind It

Once the PFX file has been exported using Certmgr.msc, proceed by importing the newly generated PFX file into IIS Manager and then assign the certificate to the appropriate website by completing the steps below.

  1. Open IIS Manager.
  2. On the left, click the server name.
  3. Double-click Server Certificates.

    Server Certificates

  4. In the right panel, click Import.

    import

  5. Select the PFX file.
    Enter the password.
    Click OK.

    Import pfx

  6. Once it appears in the list, bind it to the site.

    Navigate to:
    Sites → Your Website
    Click Bindings on the right.

    Bindings

  7. In the Site Bindings window:
    • Click Add (or Edit if HTTPS already exists)
    • Type: https
    • IP Address: All Unassigned (or the correct specific IP)
    • Port: 443
    • SSL Certificate: select the newly imported certificate

    Click OK.

Close the bindings window. At this stage, IIS is using the new certificate.

Step 5 – Restart IIS (Optional but Direct)

If you want the change applied immediately across all services:

  1. Open Command Prompt as Administrator.
  2. Run:
    iisreset
    That forces IIS to reload.
  3. You can also recycle the application pool instead, but when you’re fixing trust issues, a full reset removes guesswork.

Step 6 – Verify the Chain

After everything is in place, check the public chain.

Use an external SSL checker such as:

https://www.ssl2buy.com/wiki/ssl-installation-checker

Enter your domain and inspect the chain.

Verify the Chain

You should see:

  • Your leaf certificate
  • The cross-signed intermediate
  • A trusted root

If older systems were failing before, they should now build the chain correctly through the cross-signed path.

Operational Notes

  • Import into Local Computer, not Current User.
  • Use Intermediate Certification Authorities, not Trusted Root.
  • Do not rebind the certificate in IIS unless the private key changed.
  • Remove duplicate or legacy intermediates if Windows keeps selecting the wrong chain.

IIS does not use a manual chain file like Apache or NGINX. Windows builds the chain from what exists in its certificate stores. If the correct cross-signed intermediate is present in the Intermediate store, IIS serves it automatically.

Deploy Sectigo SSL with the Correct Trust Chain
Sectigo’s transition to the R46/E46 hierarchy changes how Windows builds certificate chains. Without the correct cross-signed intermediate, IIS may present an incomplete trust path. Install a properly aligned Sectigo SSL certificate and maintain uninterrupted browser trust at competitive pricing from SSL2Buy.

Related Article:

About the Author
Meet Solanki

Meet Solanki

Meet Solanki, an IT maestro with 8+ years of hands-on expertise in the realms of network and server administration. Armed with a Bachelor's degree in Computer Science, Meet takes pride in being more than a tech enthusiast - he ensures that the systems run seamlessly and maintain the highest standards of security. His technical acumen is a testament to his commitment to optimizing system performance and ensuring robust security protocols.

Trusted by Millions

SSL2BUY delivers highly trusted security products from globally reputed top 5 Certificate Authorities. The digital certificates available in our store are trusted by millions – eCommerce, Enterprise, Government, Inc. 500, and more.
PayPal
Verizon
2Checkout
Lenovo
Forbes
Walmart
Dribbble
cPanel
Toyota
Pearson
The Guardian
SpaceX