NET::ERR_CERT_AUTHORITY_INVALID means Chrome/Edge does not trust the site's SSL certificate — the certificate chain does not lead to a trusted root CA. 90% of cases are caused by a self-signed certificate, expired root CA, or incomplete chain. Fix: install a certificate from a public CA (Let's Encrypt, DigiCert) and configure the full chain on your server.
This error blocks access to your site and scares visitors away. In 90% of cases the problem is server-side — misconfigured SSL certificate. We cover all causes and give a step-by-step fix.
When a browser opens an HTTPS site, it validates the SSL certificate chain: site cert → intermediate CA → root CA. If any link is untrusted or missing, Chrome shows NET::ERR_CERT_AUTHORITY_INVALID.
This doesn't mean the site is hacked. Most commonly the cause is server administration:
ssl_certificate /path/to/fullchain.pem; (not just cert.pem).SSL/TLS is the encryption protocol that protects data between the browser and server. Our tool analyzes the certificate, chain of trust, TLS version, and knownvulnerabilities.
Issuer, validity period, signature algorithm, covered domains (SAN), and validation type (DV/OV/EV).
Full chain verification: from leaf certificate through intermediates to root CA.
Protocol version (TLS 1.2/1.3), cipher suites, Perfect Forward Secrecy (PFS) support.
Set up a monitor — get Telegram and email alerts 30/14/7 days before expiration.
SSL certificate monitoring
TLS config audit
HTTPS as ranking factor
customer trust
www and subdomains.Strict-Transport-Security header forces browsers to always use HTTPS.SSL certificate monitoring, check history and alerts 30 days before expiry.
Sign up freeNo. Chrome shows this error because it cannot verify site authenticity. Bypassing (chrome://flags or "thisisunsafe") makes your connection vulnerable to man-in-the-middle attacks. Only safe for your own dev servers.
Chrome and Firefox use different trust stores. Chrome uses its own root CA list (chrome-root-store), Firefox uses Mozilla's CA list. If your CA is in Mozilla but not Chrome, the error appears only in Chrome.
If only one site shows the error — fix server-side. If all HTTPS sites error out — check system clock, update Chrome, check corporate proxy (may be inspecting certificates).
Use the <a href="/en/ssl">Enterno.io SSL/TLS checker</a> — enter domain, get full certificate chain, expiry, issuer and warnings. Free, no signup.
Yes. Let's Encrypt is included in all major trust stores (Chrome, Firefox, Safari, Edge). Certificates valid for 90 days with automatic renewal via certbot.