When it involves SSL/TLS certificates, you will encounter a spread of problems, some associated with the browser or a drag during a website’s back-end.
One similar mistake is “Unacceptable TLS certificate” in Linux system.
In my case, I detected the difficulty once adding the Flathub repository via the terminal, a step that allows you to access the huge assortment of Flatpaks once putting in Flatpak.
However, you'll be able to conjointly expect to encounter this error once putting in a Flatpak app or employing a Flatpak official file from a third-party repository via the terminal.
Some users detected this issue once mistreatment their organization’s counseled VPN service for work on UNIX.
So, however does one fix it? Why is that this a problem?
Well, technically, it’s either of 2 things:
➨Your system doesn't settle for the certificate (and tells that it’s invalid).
➨The certificate does not contest the domain linking to the user. If this is the second time, then you need to reach out to the website administrator and fix them from the end.
1. Fix “Unacceptable TLS certificate” once victimisation Flatpak or adding GNOME on-line Accounts
If you're attempting to feature Flathub remote or a replacement Flatpak application and spot the error within the terminal, you'll merely Type in:
"sudo apt-get install --reinstall ca-certificates"
In my occurrence, one time attempting to property the Flathub repository, I experienced the mistake, that was solved by typing the command in the terminal.
So, i feel that any Flatpak-related problems with TLS certificates are often mounted victimisation this methodology.
2. Solve “Unacceptable TLS certificate” when using with VPN work
If you're victimisation your organization’s VPN to access materials associated with work, you may ought to add the certificate to the list of sure CAs in your UNIX operating system distro.
Remember that you simply want to like a VPN service or in your organization’s administrator to share the .CRT version of the essential certificate to rebuke started.
Next, you may duty to navigate your /usr/local/share/ca-certificates directory.
You can produce a directory under that and use any name to spot your organization’s certificate. And, then add the .CRT file to it directory.
Do note that you simply would like root privileges to feature certificates or build a directory underneath the ca-certificates directory.
Once you have got another the required certificate, all you have got to try and do is update the certificate support list by writing in:
"sudo update-ca-certificates"
And, the certificate ought to be treated valid by your system whenever you are attempting to attach to your company’s VPN.