Certificate Installation Issues
KyberGate uses a CA (Certificate Authority) certificate to inspect HTTPS traffic for content filtering. This certificate must be installed and trusted on every managed device. If the certificate is missing or not trusted, students will see browser security warnings instead of the KyberGate block page.
How KyberGate Uses Certificates
KyberGate operates as a proxy-based MITM (Man-in-the-Middle) filter. When a device connects through the KyberGate proxy:
- The proxy intercepts HTTPS requests
- It presents a certificate signed by the KyberGate CA
- If the device trusts the KyberGate CA, the connection proceeds seamlessly
- If the CA is not trusted, the browser shows a certificate error (NET::ERR_CERT_AUTHORITY_INVALID)
Verifying Certificate Installation
On iPad / iPhone
- Go to Settings → General → About → Certificate Trust Settings
- Look for KyberGate CA in the list
- Ensure the toggle next to it is enabled (green)
- Also check Settings → General → VPN & Device Management for the MDM profile containing the certificate
On macOS
- Open Keychain Access (Applications → Utilities → Keychain Access)
- Select the System keychain
- Search for KyberGate
- Double-click the KyberGate CA certificate
- Expand Trust and verify it shows Always Trust for SSL
On Windows
- Press Win + R, type
certmgr.msc, and press Enter - Navigate to Trusted Root Certification Authorities → Certificates
- Look for KyberGate CA in the list
- If present, double-click to verify it's valid and not expired
On Chromebook
- Go to Settings → Security and Privacy → Manage Certificates
- Click the Authorities tab
- Look for KyberGate CA in the list
- Verify it shows trust for "identifying websites"
Installing the Certificate
Via MDM (Recommended)
Apple devices (iPad, iPhone, Mac) — .mobileconfig profile:
- In your MDM (Jamf, Mosyle, Kandji, etc.), create a Certificate payload
- Upload the KyberGate CA certificate (.cer or .pem file)
- Set trust level to Full Trust for SSL
- Deploy the profile to your device groups
- For iPads: The MDM automatically enables certificate trust — no user action needed
Windows devices — GPO:
- Open Group Policy Management on your domain controller
- Create or edit a GPO linked to your device OU
- Navigate to Computer Configuration → Policies → Windows Settings → Security Settings → Public Key Policies → Trusted Root Certification Authorities
- Right-click → Import → Select the KyberGate CA certificate
- Run
gpupdate /forceon target machines or wait for the next policy refresh
Chromebooks — Google Admin Console:
- Go to Google Admin Console → Devices → Chrome → Settings → Device Settings
- Under Network → Certificates, click Upload Certificate
- Upload the KyberGate CA .pem file
- Select Use this certificate as an HTTPS certificate authority
- Apply to the relevant OUs
Manual Installation (Testing Only)
- Download the certificate from your KyberGate dashboard: Settings → Certificates → Download CA Cert
- On the device, open the downloaded file
- Follow the OS-specific prompts to install and trust the certificate
- Note: Manual installation is not recommended for production — use MDM for consistent deployment
Tips
- Always use MDM — Manual certificate installation doesn't scale and is easily removed by users
- Check expiration dates — KyberGate CA certificates are valid for 10 years, but verify if you generated a custom CA
- Test after deployment — Visit
https://check.kybergate.comon a managed device to confirm the certificate is working - Re-enroll problem devices — If a single device has cert issues, remove the MDM profile and re-deploy it
- Supervised mode (iPad) — Supervised iPads accept MDM certificates silently; unsupervised iPads may require user approval
Troubleshooting
| Issue | Solution |
|---|---|
| NET::ERR_CERT_AUTHORITY_INVALID in Chrome | Certificate is not installed or not trusted — follow installation steps above |
| "Profile Installation Failed" on iPad | Ensure the device is supervised and enrolled in MDM |
| Certificate installed but still showing errors | Restart the browser after installation; on Mac, restart the device |
| Certificate not appearing in Keychain Access | Check it was imported to the System keychain, not Login |
| GPO not applying on Windows | Run gpresult /r to verify the GPO is linked; check OU membership |
| Certificate shows "expired" | Download a fresh certificate from the KyberGate dashboard and redeploy |
Related Articles
- Device Enrollment and PAC Configuration
- Block Page Customization
- Chrome Extension Troubleshooting