In addition to encrypting network traffic, HTTPS is commonly used to authenticate a server. That is, to provide customers with information about who owns the server, etc. To do this, the client must check the trust chain in the certificate published by the server. For this to happen automatically, the client machine must have an installed certificate that describes the certification authority that issued the server certificate. Typically, these certificates are located on your computer in a store called Trusted Root Certification Authorities, and most OSs come with a set of common CAs already installed.
, - , , . - , , . " " HTTPS, .
, - , , , . , ( ), .