I am configuring TLS for a tool, which contains a webserver component. This tool provides a Web-UI, which I can access vie HTTPS. Additionally it uses LDAPS for User Authentication (in a second step/internally).
I have imported a new Client/Server certificate (EndPointCert) in the truststore (cacerts) of this tool and the corresponding private key in its keystore. This EndPointCert is signed by an intermediateCA.
Now, if I have not pinned/imported the RootCA certificate of our company in the truststore of this tool, the LDAPS fails. However, SSL/TLS connection to the webserver part works fine. If I include the RootCA certificate also LDAPS authentication works.
In the AIA attribute of the EndPointCert the url to a intermediateCA cert is included. If I chase this down, I can download the intermediateCA cert and then with using this AIA field I can download a RootCA certificate. I am using jks.
Is there any general rule that I have to include the RootCA cert in truststores? Or is this just a "speciality" or feature (=bug) of this tool.
Thank you!