DNS RobotDNS Propagation Checker
HomeDNS LookupWHOIS LookupIP LookupSSL Check
DNS RobotDNS Propagation Checker

Next-generation DNS propagation toolkit

Privacy PolicyTerms of ServiceAbout UsBlogContact

DNS Tools

DNS LookupDomain to IPNS LookupMX LookupCNAME LookupView all

Email Tools

SPF Record CheckerDMARC CheckerDKIM CheckerSMTP Test ToolEmail Header AnalyzerView all

Website Tools

WHOIS LookupDomain AvailabilitySubdomain FinderCMS DetectorLink AnalyzerView all

Network Tools

Ping ToolTraceroutePort CheckerHTTP Headers CheckSSL Certificate CheckView all

IP Tools

IP LookupWhat Is My IPIP Blacklist CheckIP to HostnameASN LookupView all

Utility Tools

QR Code ScannerQR Code GeneratorMorse Code TranslatorText to Binary ConverterSmall Text GeneratorView all
© 2026 DNS Robot. Developed by ❤ Shaik Brothers
All systems operational
Made with
Home/Blog/NET::ERR_CERT_AUTHORITY_INVALID: How to Fix (Chrome, Edge, Firefox)

NET::ERR_CERT_AUTHORITY_INVALID: How to Fix (Chrome, Edge, Firefox)

Shaik VahidMar 4, 20269 min read
NET::ERR_CERT_AUTHORITY_INVALID fix guide showing certificate trust chain failure and step-by-step solutions for Chrome, Edge, and Firefox
NET::ERR_CERT_AUTHORITY_INVALID fix guide showing certificate trust chain failure and step-by-step solutions for Chrome, Edge, and Firefox

Key Takeaway

NET::ERR_CERT_AUTHORITY_INVALID means your browser does not trust the SSL certificate presented by the website. The most common causes are expired certificates, self-signed certificates, and missing intermediate certificates. For visitors, fixing your system clock, clearing SSL state, or updating your OS usually resolves it. For website owners, installing a valid certificate from a trusted CA with the complete chain is the permanent fix.

What Is NET::ERR_CERT_AUTHORITY_INVALID?

NET::ERR_CERT_AUTHORITY_INVALID is a browser security error that appears when Chrome, Edge, or another Chromium-based browser does not trust the certificate authority (CA) that signed the website's SSL certificate. The browser blocks the connection and shows a "Your connection is not private" warning to protect you from potentially fraudulent websites.

Unlike ERR_SSL_PROTOCOL_ERROR, which means the TLS handshake itself failed, ERR_CERT_AUTHORITY_INVALID means the handshake completed but the certificate validation step failed. The browser received the certificate, inspected it, and decided it was not trustworthy.

The internal Chromium error code is net::ERR_CERT_AUTHORITY_INVALID (error code -202). It belongs to the certificate error family, which includes related errors like ERR_CERT_DATE_INVALID and ERR_SSL_VERSION_OR_CIPHER_MISMATCH.

Note

This error is about trust, not encryption. The connection might be fully encrypted, but your browser cannot verify who is on the other end. A self-signed certificate encrypts traffic just fine, but since no trusted third party vouched for the server's identity, Chrome treats it as suspicious.

What ERR_CERT_AUTHORITY_INVALID Looks Like in Each Browser

Different browsers display different error messages for the same underlying problem. Knowing what to look for helps you diagnose whether you are dealing with a certificate authority issue or a different SSL error.

BrowserError Page TitleError Code
ChromeYour connection is not privateNET::ERR_CERT_AUTHORITY_INVALID
EdgeYour connection isn't privateNET::ERR_CERT_AUTHORITY_INVALID
FirefoxWarning: Potential Security Risk AheadSEC_ERROR_UNKNOWN_ISSUER or MOZILLA_PKIX_ERROR_SELF_SIGNED_CERT
SafariThis Connection Is Not PrivateNo specific error code shown
OperaYour connection is not privateNET::ERR_CERT_AUTHORITY_INVALID
BraveYour connection is not privateNET::ERR_CERT_AUTHORITY_INVALID

Tip

Firefox uses its own certificate store, separate from the OS. If you see this error in Chrome but not Firefox (or vice versa), the problem is in the browser-specific or OS-specific trust store — not the certificate itself.

How SSL Certificate Trust Works (Chain of Trust)

To understand why this error happens, you need to know how browsers verify SSL certificates. Every certificate is part of a chain of trust that leads back to a root certificate authority (CA).

When your browser connects to a website over HTTPS, the server sends its SSL certificate along with any intermediate certificates. The browser then walks the chain: it checks that the leaf certificate (the website's cert) was signed by an intermediate CA, and that the intermediate CA was signed by a root CA that the browser already trusts. Modern browsers and operating systems ship with approximately 150 pre-installed root CA certificates from organizations like DigiCert, Let's Encrypt (ISRG Root), Sectigo, and GlobalSign.

If any link in this chain is broken — the root CA is missing, an intermediate certificate is not included, or the signing CA is unrecognized — the browser throws ERR_CERT_AUTHORITY_INVALID. For a deeper explanation, see our guide on what is an SSL certificate chain.

  • Root CA — self-signed, pre-installed in your OS/browser trust store (~150 trusted roots)

  • Intermediate CA — signed by the root CA, must be sent by the server during the TLS handshake

  • Leaf certificate — your website's certificate, signed by the intermediate CA

  • Validation — the browser walks the chain from leaf to root; every signature must verify

Note

Let's Encrypt certificates use a cross-signed chain through ISRG Root X1. Older devices that don't have ISRG Root X1 in their trust store may show ERR_CERT_AUTHORITY_INVALID on Let's Encrypt sites. Updating the OS resolves this.

What Causes NET::ERR_CERT_AUTHORITY_INVALID?

This error has both server-side causes (the website's problem) and client-side causes (your device's problem). If the error appears on one website only, the issue is almost certainly server-side. If it appears on multiple or all HTTPS websites, the issue is on your end.

CauseSideHow CommonQuick Check
Self-signed certificateServerVery commonCheck certificate issuer in browser padlock
Missing intermediate certificateServerCommonUse DNS Robot's SSL Checker to verify chain
Expired SSL certificateServerCommonCheck cert dates in browser or SSL Checker
Certificate issued for wrong domainServerOccasionalCompare cert CN/SAN with the URL domain
Incorrect system date/timeClientCommonCheck your device clock
Outdated OS or browserClientCommonMissing new root CAs like ISRG Root X1
Antivirus SSL interceptionClientModerateAntivirus replaces cert with its own CA
Corporate proxy/firewallClientModerateMITM proxy injects untrusted certificate
Cached stale certificateClientOccasionalOld cert in browser SSL cache
Browser extension interferenceClientRareVPN or security extensions modify traffic

Fixes for Website Visitors (Client-Side)

If you are seeing NET::ERR_CERT_AUTHORITY_INVALID while browsing a website you don't control, try these fixes in order. Start with the quickest checks first — the problem is often simpler than you think.

Fix 1: Check Your System Date and Time

An incorrect system clock is one of the most overlooked causes of certificate errors. SSL certificates have a validity window (Not Before and Not After dates). If your device thinks it is 2020 when it is actually 2026, a certificate issued in 2025 appears "not yet valid" and the browser rejects it.

This fix takes 10 seconds and resolves the issue more often than people expect — especially after a BIOS battery failure, virtual machine snapshot restore, or dual-boot time drift.

bash
# Windows — check and sync system time
w32tm /query /status
w32tm /resync

# macOS — enable automatic time sync
sudo sntp -sS time.apple.com

# Linux — sync with NTP
sudo timedatectl set-ntp true
timedatectl status

Tip

On Windows, right-click the clock in the taskbar > Adjust date/time > toggle Set time automatically off and on. On macOS, go to System Settings > General > Date & Time and enable automatic date and time.

Fix 2: Try Incognito/Private Browsing Mode

Opening the website in an incognito window rules out browser cache, cookies, and extension interference all at once. If the site loads fine in incognito, the problem is a cached certificate state or a misbehaving extension — not the website itself.

To open incognito mode: press Ctrl+Shift+N in Chrome or Edge, or Ctrl+Shift+P in Firefox.

Note

If the error also appears in incognito, the problem is either your system clock, your OS trust store, an antivirus SSL scanner, or the website's actual certificate. Move on to the next fixes.

Fix 3: Clear Browser Cache and Cookies

Browsers cache SSL certificate information to speed up subsequent connections. If a website recently renewed or replaced its certificate, your browser might still hold the old (invalid) certificate in its cache, causing the ERR_CERT_AUTHORITY_INVALID error even though the server now has a valid certificate.

bash
# Chrome: Clear cache via keyboard shortcut
# Windows/Linux: Ctrl+Shift+Delete
# macOS: Cmd+Shift+Delete
# Select "Cached images and files" and "Cookies" → Clear data

# Firefox: Clear cache
# Ctrl+Shift+Delete → select "Cache" and "Cookies" → Clear Now

Fix 4: Clear SSL State (Windows)

Windows maintains a separate SSL certificate cache at the OS level, independent of browser caches. Clearing this cache forces Windows to re-fetch and re-validate certificates from scratch.

bash
# Method 1: Via Internet Options
# Open Internet Options (inetcpl.cpl) → Content tab → "Clear SSL State" button

# Method 2: Via command line
# Open Command Prompt as Administrator:
certutil -URLcache * delete

Warning

On macOS there is no equivalent "Clear SSL State" button. Instead, open Keychain Access, select System keychain, and delete any cached certificates you suspect are causing the problem. Be careful not to delete system root certificates.

Fix 5: Disable Browser Extensions

Security extensions, VPN extensions, ad blockers, and privacy tools can interfere with SSL connections. Some extensions act as a local proxy, intercepting HTTPS traffic and replacing certificates — which triggers ERR_CERT_AUTHORITY_INVALID.

Temporarily disable all extensions to test: go to chrome://extensions/ and toggle each one off, then reload the website. If the error disappears, re-enable extensions one by one to find the culprit.

Fix 6: Update Your OS and Browser

Root CA certificates are distributed through OS and browser updates. If your operating system is outdated, your trust store may not include newer root CAs. For example, the ISRG Root X1 certificate (used by Let's Encrypt) was only added to older Android and Windows versions through updates. Devices running Android 7.0 or earlier may lack this root entirely.

Chrome and Edge rely on the OS trust store on Windows and macOS, while Firefox ships its own. Keeping both your OS and browser updated ensures you have the latest trusted root certificates.

Tip

If you are on an old device that can't be updated, Firefox is your best workaround — it uses its own trust store that includes recent root CAs regardless of OS version.

Fix 7: Disable Antivirus SSL/HTTPS Scanning

Antivirus software like Kaspersky, Avast, ESET, and Bitdefender often include an "HTTPS scanning" or "SSL interception" feature. This feature works by acting as a man-in-the-middle: it decrypts your HTTPS traffic with its own certificate, scans it, and re-encrypts it. If the antivirus CA certificate is not installed in your browser's trust store, every HTTPS site shows ERR_CERT_AUTHORITY_INVALID.

To test: temporarily disable the HTTPS scanning feature in your antivirus settings (not the entire antivirus — just the SSL/web scanning component). If the error disappears, you can either keep scanning disabled or re-install the antivirus root certificate into your browser.

Warning

Disabling HTTPS scanning reduces your antivirus protection for web traffic. Only keep it disabled as a permanent solution if you understand the tradeoff. The better fix is to ensure the antivirus CA certificate is properly installed in your trust store.

Fix 8: Flush DNS Cache

In rare cases, a stale DNS cache can point your browser to the wrong IP address — one that serves a different (invalid) SSL certificate. Flushing DNS ensures your device resolves the domain to the correct server. For a complete guide, see how to flush DNS cache.

bash
# Windows
ipconfig /flushdns

# macOS
sudo dscacheutil -flushcache && sudo killall -HUP mDNSResponder

# Linux
sudo systemd-resolve --flush-caches

# Chrome internal DNS cache
# Navigate to: chrome://net-internals/#dns → "Clear host cache"

Fix 9: Try a Different Network

Corporate networks, school Wi-Fi, and some public hotspots use transparent proxies that intercept HTTPS connections. These proxies replace the website's SSL certificate with their own, causing ERR_CERT_AUTHORITY_INVALID. Switching to mobile data or a different Wi-Fi network confirms whether the network is the problem.

If the error only appears on your work or school network, contact the network administrator — they may need to install the proxy's root certificate on your device, or whitelist the domain from SSL inspection.

Fixes for Website Owners (Server-Side)

If visitors are reporting ERR_CERT_AUTHORITY_INVALID on your website, the problem is with your SSL certificate configuration. Here are the server-side fixes, ordered from most to least common.

Fix 1: Install a Certificate from a Trusted CA

Self-signed certificates are the #1 cause of ERR_CERT_AUTHORITY_INVALID for website owners. If you generated your own certificate using OpenSSL or a similar tool, browsers will never trust it — the signing authority (you) is not in any browser's trust store.

The fix is to install a certificate from a publicly trusted certificate authority. Let's Encrypt provides free, automated certificates trusted by all major browsers. For commercial sites, paid certificates from DigiCert, Sectigo, or GlobalSign offer extended validation (EV) and longer validity periods.

bash
# Install Let's Encrypt certificate with Certbot (Nginx)
sudo certbot --nginx -d example.com -d www.example.com

# Install Let's Encrypt certificate with Certbot (Apache)
sudo certbot --apache -d example.com -d www.example.com

# Verify the installed certificate
sudo certbot certificates

Tip

Let's Encrypt certificates expire every 90 days. Set up auto-renewal: sudo certbot renew --dry-run. Most Certbot installations create a cron job or systemd timer automatically.

Fix 2: Install the Complete Certificate Chain

A missing intermediate certificate is the second most common server-side cause. Your SSL certificate may be perfectly valid, but if the server does not send the intermediate CA certificate along with it, the browser cannot verify the chain of trust and throws ERR_CERT_AUTHORITY_INVALID.

Use DNS Robot's SSL Checker to verify your certificate chain. A healthy chain shows three certificates: Root CA > Intermediate CA > Your Certificate. If the intermediate is missing, you need to configure your server to send the full chain.

bash
# Check your certificate chain with OpenSSL
openssl s_client -connect example.com:443 -showcerts 2>/dev/null | grep -E 's:|i:'

# Expected output (3 certificates in chain):
# s:CN = example.com          (your cert)
# i:CN = R11                   (intermediate - Let's Encrypt)
# s:CN = R11
# i:CN = ISRG Root X1          (root CA)

# Nginx — configure full chain
# ssl_certificate should point to the fullchain file, not just the cert:
ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem;

# Apache — configure full chain
SSLCertificateFile /etc/letsencrypt/live/example.com/fullchain.pem
SSLCertificateKeyFile /etc/letsencrypt/live/example.com/privkey.pem

Warning

A common mistake is using cert.pem instead of fullchain.pem in your Nginx or Apache configuration. The cert.pem file only contains your leaf certificate. Always use fullchain.pem which includes both the leaf and intermediate certificates.

Fix 3: Renew an Expired Certificate

Expired certificates are rejected immediately by all browsers. Chrome specifically shows ERR_CERT_AUTHORITY_INVALID (not ERR_CERT_DATE_INVALID) in some cases when the expired certificate's CA has also rotated its intermediate. Check your certificate expiry date with the SSL Checker or via the command line.

bash
# Check certificate expiry date
openssl s_client -connect example.com:443 2>/dev/null | openssl x509 -noout -dates
# Output:
# notBefore=Jan  1 00:00:00 2026 GMT
# notAfter=Apr  1 00:00:00 2026 GMT

# Force renewal with Certbot
sudo certbot renew --force-renewal

# Restart web server after renewal
sudo systemctl reload nginx    # Nginx
sudo systemctl reload apache2  # Apache

Fix 4: Ensure the Certificate Matches Your Domain

An SSL certificate is issued for specific domain names listed in the Common Name (CN) and Subject Alternative Name (SAN) fields. If your website is accessed via www.example.com but the certificate only covers example.com, or if you access a subdomain not included in the SAN, Chrome may show ERR_CERT_AUTHORITY_INVALID.

Wildcard certificates (*.example.com) cover all subdomains but not the root domain unless it is explicitly listed as a SAN. Always include both example.com and *.example.com when generating a wildcard certificate.

Note

Use DNS Robot's SSL Checker to view the exact SAN list of any certificate. If your domain is missing from the list, reissue the certificate with the correct domain names.

Fix 5: Check Server TLS Configuration

Misconfigured TLS settings can cause certificate trust issues even with a valid certificate. Ensure your server supports TLS 1.2 and TLS 1.3 — older protocols like TLS 1.0 and 1.1 have been deprecated by all major browsers since 2020. Also verify that your server sends certificates in the correct order (leaf first, then intermediates).

bash
# Nginx recommended TLS configuration
ssl_protocols TLSv1.2 TLSv1.3;
ssl_prefer_server_ciphers on;
ssl_ciphers 'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384';

# Test your TLS configuration
openssl s_client -connect example.com:443 -tls1_2
openssl s_client -connect example.com:443 -tls1_3

ERR_CERT_AUTHORITY_INVALID on Localhost (Developers)

Developers frequently encounter this error when running local HTTPS servers for development. Since localhost certificates are always self-signed, Chrome blocks them by default. There are several ways to handle this.

  • mkcert — the easiest solution. Install mkcert, run mkcert -install to add a local CA to your trust store, then generate certs: mkcert localhost 127.0.0.1 ::1. Trusted automatically in Chrome, Firefox, and Edge

  • Chrome bypass — type thisisunsafe on the error page (no input field — just type on the keyboard). This bypasses the warning for the current session only

  • Chrome flag — navigate to chrome://flags/#allow-insecure-localhost and enable it. This suppresses certificate errors for localhost only

  • Vite/Next.js/Webpack — most dev servers support --https flags that generate self-signed certs. Combine with mkcert for a trusted local setup

bash
# Install mkcert (macOS)
brew install mkcert
mkcert -install

# Generate localhost certificate
mkcert localhost 127.0.0.1 ::1
# Creates: localhost+2.pem and localhost+2-key.pem

# Use with Node.js
const https = require('https');
const fs = require('fs');
https.createServer({
  cert: fs.readFileSync('localhost+2.pem'),
  key: fs.readFileSync('localhost+2-key.pem')
}, app).listen(3000);

Tip

The thisisunsafe keyboard shortcut works on any Chrome certificate error page. It is an intentionally hidden bypass — there is no button or field. Just click anywhere on the page and type the word. Chrome immediately loads the page.

Related SSL Certificate Errors

NET::ERR_CERT_AUTHORITY_INVALID is just one of several SSL certificate errors you might encounter. Each error points to a different problem in the certificate validation process.

Error CodeWhat It MeansDNS Robot Guide
ERR_CERT_AUTHORITY_INVALIDCertificate not signed by a trusted CAThis article
ERR_SSL_PROTOCOL_ERRORTLS handshake failed before certificate check[Fix guide](/blog/err-ssl-protocol-error-fix)
ERR_SSL_VERSION_OR_CIPHER_MISMATCHNo shared TLS version or cipher suite[Fix guide](/blog/err-ssl-version-or-cipher-mismatch)
ERR_CERT_DATE_INVALIDCertificate expired or not yet validCheck certificate dates
ERR_CERT_COMMON_NAME_INVALIDCertificate domain doesn't match URLCheck SAN/CN fields
NET::ERR_CERT_REVOKEDCertificate was revoked by the issuing CAReissue certificate

Note

You can diagnose any of these errors instantly with DNS Robot's SSL Checker. It shows the full certificate chain, expiry dates, protocol support, and any configuration issues.

Check your SSL certificate chain now

Use DNS Robot's free SSL Checker to verify your certificate chain, expiry dates, and TLS configuration. Instantly detect missing intermediates, expired certs, and domain mismatches.

Try SSL Checker

Frequently Asked Questions

It means your browser does not trust the certificate authority that signed the website's SSL certificate. The certificate might be self-signed, issued by an unknown CA, or missing its intermediate certificate chain.

Related Tools

SSL Certificate CheckDNS LookupHTTP Headers Check

Related Articles

ERR_SSL_PROTOCOL_ERROR: How to Fix It (Chrome, Edge, All Browsers)ERR_SSL_VERSION_OR_CIPHER_MISMATCH: How to Fix It (All Browsers)"Your Connection Is Not Private" — How to Fix It (All Browsers)What Is an SSL Certificate Chain? How It Works

Table of Contents

  • What Is NET::ERR_CERT_AUTHORITY_INVALID?
  • What ERR_CERT_AUTHORITY_INVALID Looks Like in Each Browser
  • How SSL Certificate Trust Works (Chain of Trust)
  • What Causes NET::ERR_CERT_AUTHORITY_INVALID?
  • Fixes for Website Visitors (Client-Side)
  • Fix 1: Check Your System Date and Time
  • Fix 2: Try Incognito/Private Browsing Mode
  • Fix 3: Clear Browser Cache and Cookies
  • Fix 4: Clear SSL State (Windows)
  • Fix 5: Disable Browser Extensions
  • Fix 6: Update Your OS and Browser
  • Fix 7: Disable Antivirus SSL/HTTPS Scanning
  • Fix 8: Flush DNS Cache
  • Fix 9: Try a Different Network
  • Fixes for Website Owners (Server-Side)
  • Fix 1: Install a Certificate from a Trusted CA
  • Fix 2: Install the Complete Certificate Chain
  • Fix 3: Renew an Expired Certificate
  • Fix 4: Ensure the Certificate Matches Your Domain
  • Fix 5: Check Server TLS Configuration
  • ERR_CERT_AUTHORITY_INVALID on Localhost (Developers)
  • Related SSL Certificate Errors
  • FAQ