User-Controlled Certificate Authority Trust Store
OpenAuthority is a trust store where every certificate authority is limited to its own domains. No unconstrained roots. No unlimited signing power. Just certificates for the domains you actually control—verified through DNS and monitored continuously.
A fundamentally different approach to certificate trust.
Every CA must have name constraints. A CA for example.com can only sign certificates for example.com and its subdomains. Unconstrained roots are prohibited.
CAs aren't verified once—they're checked continuously. Probationary CAs every 6 hours, active CAs every 24 hours. Remove your DNS record and your CA is automatically revoked.
Even if a CA is compromised, attackers can only issue certificates for domains in that CA's constraints—not for any domain on the internet.
The current certificate ecosystem is controlled by a handful of authorities.
Let's Encrypt certificates last only 90 days. The CA/Browser Forum is pushing to reduce all public certificates to just 47 days by 2029.
A small group of CAs and browser vendors control which certificates your devices trust. You have no say in the matter.
Certificate Transparency is presented as comprehensive monitoring, but not all CAs participate. Your certificates are exposed publicly while malicious certificates may go unlogged—a false sense of security.
A transparent, verifiable system where domain owners prove they control their CA.
Generate a root CA certificate that includes Name Constraints—limiting which domains it can sign for. This is mandatory.
Publish a TXT record containing your CA's SHA-512 fingerprint at _openauthority.yourdomain.com.
Your CA enters a probationary period where we verify the DNS record every 6 hours for 7 days.
Once verified, your CA is included in the OpenAuthority trust store for anyone to download.
Run your own CA for your homelab without browser warnings.
Full control over your internal PKI with custom certificate lifetimes. No more relying on external CAs.
Build a business offering hosted CA services with verifiable trust.
Add a new certificate authority to the trust store
_openauthority.yourdomain.com TXT "openauthority-ca-sha512=<fingerprint>"; Example DNS TXT record _openauthority.example.com. IN TXT "openauthority-ca-sha512=abc123..."
Probationary CAs are verified every 6 hours. Active CAs are verified every 24 hours.
Complete history of all verification checks. Logs are cryptographically signed for integrity verification.
Download all verified CA certificates. Only fully active certificates are included.
Choose the format that works best for your platform
.mobileconfig for iOS & macOS
Individual .crt files
Concatenated PEM for servers
For developers & automation
Select your platform
Download the .mobileconfig profile.
⚠️ Important Limitation
Since Android 7, user-installed CA certificates are not trusted by most apps by default. Only apps that explicitly opt-in (via networkSecurityConfig) will trust these certificates. System apps, Chrome, and most third-party apps will not trust user-installed CAs.
What works: Your own apps (if configured), some browsers like Firefox, apps you control.
What doesn't: Chrome, system WebView, most third-party apps.
Download the ZIP archive and install each certificate:
Download the ZIP archive:
PowerShell (Admin):
Get-ChildItem *.crt | ForEach-Object { Import-Certificate -FilePath $_.FullName -CertStoreLocation Cert:\LocalMachine\Root }Debian/Ubuntu:
sudo cp openauthority-trust-store.pem /usr/local/share/ca-certificates/openauthority.crt sudo update-ca-certificates
Fedora/RHEL:
sudo cp openauthority-trust-store.pem /etc/pki/ca-trust/source/anchors/ sudo update-ca-trust
Everything you need to know about OpenAuthority
_openauthority.yourdomain.com containing openauthority-ca-sha512=<fingerprint>. This proves you control the domain. The record must remain in place for your CA to stay in the trust store.By using OpenAuthority, you agree that:
CaramelFox Networks LLC is not liable for any damages arising from use of this service.
Transparency about who we are and how this works.
OpenAuthority is maintained by CaramelFox Networks LLC, a registered LLC in the State of New York.
OpenAuthority currently operates at zero cost using Cloudflare's free tier. The only expense is annual domain renewal.
No venture capital. No ads. No data sales. No premium tiers.
OpenAuthority is designed with security as a core principle:
OpenAuthority doesn't have user accounts and doesn't collect personal information.
What we store:
What we don't store:
Cloudflare, as our infrastructure provider, may collect standard web traffic data per their privacy policy.