<rss xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:media="http://search.yahoo.com/mrss/"
    xmlns:wp="http://wordpress.org/export/1.2/"
    xmlns:excerpt="http://wordpress.org/export/1.2/excerpt/" version="2.0">
    <channel>
        <title>DoD Cyber Exchange</title>
        <description>DoD Cyber Exchange</description>
        <link>https://public.cyber.mil</link>
        <lastBuildDate>Mon, 12 May 2025 19:49:05 +0000</lastBuildDate>
        <item>
            <title>
<![CDATA[ PKI CA Certificate Bundles: PKCS#7 for WCF B&#038;I PKI Only - Version 5.17 ]]>
</title>
            <link>
<![CDATA[ https://public.cyber.mil/unclass-certificates_pkcs7_wcf/ ]]>
</link>
            <pubDate>Mon, 03 Mar 2025 00:05:55 +0000</pubDate>
            <dc:creator>Ciaran Salas</dc:creator>
            <dc:identifier>49148</dc:identifier>
            <dc:modified>2025-03-03 21:05:31</dc:modified>
            <dc:created unix="1740960355">2025-03-03 00:05:55</dc:created>
            <guid isPermaLink="true">
<![CDATA[ https://public.cyber.mil/unclass-certificates_pkcs7_wcf/ ]]>
</guid>
            <category>186</category>
            <description>
<![CDATA[ PKI CA Certificate Bundles: PKCS#7 for WCF B&I PKI Only - Version 5.17 This zip file contains the DoD Web Content Filtering (WCF) PKI Certification Authority (CA) certificates in PKCS#7 certificate bundles containing either PEM-encoded or DER-encoded certificates. Instructions for verifying the integrity of all .p7b files using the signed SHA-256 hashes file (.sha256) are ]]>
</description>
            <content:encoded>
<![CDATA[ This zip file contains the DoD Web Content Filtering (WCF) PKI Certification Authority (CA) certificates in PKCS#7 certificate bundles containing either PEM-encoded or DER-encoded certificates. Instructions for verifying the integrity of all .p7b files using the signed SHA-256 hashes file (.sha256) are included in the README. ]]>
</content:encoded>
            <enclosure url="" />
            <media:content url="" height="" width="" type="application/zip" />
        </item>
        <item>
            <title>
<![CDATA[ PKI CA Certificate Bundles: PKCS#7 for ECA PKI Only - Version 5.12 ]]>
</title>
            <link>
<![CDATA[ https://public.cyber.mil/unclass-certificates_pkcs7_eca/ ]]>
</link>
            <pubDate>Mon, 03 Mar 2025 00:05:24 +0000</pubDate>
            <dc:creator>Ciaran Salas</dc:creator>
            <dc:identifier>49146</dc:identifier>
            <dc:modified>2025-03-03 21:07:45</dc:modified>
            <dc:created unix="1740960324">2025-03-03 00:05:24</dc:created>
            <guid isPermaLink="true">
<![CDATA[ https://public.cyber.mil/unclass-certificates_pkcs7_eca/ ]]>
</guid>
            <category>186</category>
            <description>
<![CDATA[ PKI CA Certificate Bundles: PKCS#7 for ECA PKI Only - Version 5.12 This zip file contains the External Certification Authority (ECA) PKI Certification Authority (CA) certificates in PKCS#7 certificate bundles containing either PEM-encoded or DER-encoded certificates. Separate PKCS#7 certificate bundles are also included for each root CA, for relying parties who may wish to only ]]>
</description>
            <content:encoded>
<![CDATA[ This zip file contains the External Certification Authority (ECA) PKI Certification Authority (CA) certificates in PKCS#7 certificate bundles containing either PEM-encoded or DER-encoded certificates. Separate PKCS#7 certificate bundles are also included for each root CA, for relying parties who may wish to only accept certificates issued with the key and signature hash combinations (e.g. RSA-2048/SHA-256) issued by a given root. Instructions for verifying the integrity of all .p7b files using the signed SHA-256 hashes file (.sha256) are included in the README. ]]>
</content:encoded>
            <enclosure url="" />
            <media:content url="" height="" width="" type="application/zip" />
        </item>
        <item>
            <title>
<![CDATA[ InstallRoot 5.6 NIPR Non-Administrator 64-bit Windows Installer ]]>
</title>
            <link>
<![CDATA[ https://public.cyber.mil/installroot_5-3/ ]]>
</link>
            <pubDate>Thu, 11 Jan 2024 19:54:09 +0000</pubDate>
            <dc:creator>cyberx-sk</dc:creator>
            <dc:identifier>50773</dc:identifier>
            <dc:modified>2024-01-11 21:22:44</dc:modified>
            <dc:created unix="1705002849">2024-01-11 19:54:09</dc:created>
            <guid isPermaLink="true">
<![CDATA[ https://public.cyber.mil/installroot_5-3/ ]]>
</guid>
            <category>186</category>
            <description>
<![CDATA[ InstallRoot 5.6 NIPR Non-Administrator 64-bit Windows Installer This tool allows users to install DoD production PKI, Joint Interoperability Test Command (JITC) test PKI, and External Certification Authority (ECA) CA certificates into their Windows and Firefox certificate stores. InstallRoot 5.5 is packaged with a command line version as well as an InstallRoot service, which can check ]]>
</description>
            <content:encoded>
<![CDATA[ This tool allows users to install DoD production PKI, Joint Interoperability Test Command (JITC) test PKI, and External Certification Authority (ECA) CA certificates into their Windows and Firefox certificate stores. InstallRoot 5.5 is packaged with a command line version as well as an InstallRoot service, which can check for updated Trust Anchor Management Protocol (TAMP) messages that contain the latest certificate information from DoD. The following operating systems are supported: Windows 10, Windows 11, and Windows Server 2012, 2016, 2019, and 2022. ]]>
</content:encoded>
            <enclosure url="" />
            <media:content url="" height="" width="" type="application/x-msi" />
        </item>
        <item>
            <title>
<![CDATA[ InstallRoot 5.6 NIPR 64-bit Windows Installer ]]>
</title>
            <link>
<![CDATA[ https://public.cyber.mil/installroot_5-2/ ]]>
</link>
            <pubDate>Thu, 11 Jan 2024 19:53:47 +0000</pubDate>
            <dc:creator>cyberx-sk</dc:creator>
            <dc:identifier>50772</dc:identifier>
            <dc:modified>2024-01-11 21:09:48</dc:modified>
            <dc:created unix="1705002827">2024-01-11 19:53:47</dc:created>
            <guid isPermaLink="true">
<![CDATA[ https://public.cyber.mil/installroot_5-2/ ]]>
</guid>
            <category>186</category>
            <description>
<![CDATA[ InstallRoot 5.6 NIPR 64-bit Windows Installer This tool allows users to install DoD production PKI, Joint Interoperability Test Command (JITC) test PKI, and External Certification Authority (ECA) CA certificates into their Windows and Firefox certificate stores. InstallRoot 5.5 is packaged with a command line version as well as an InstallRoot service, which can check for ]]>
</description>
            <content:encoded>
<![CDATA[ This tool allows users to install DoD production PKI, Joint Interoperability Test Command (JITC) test PKI, and External Certification Authority (ECA) CA certificates into their Windows and Firefox certificate stores. InstallRoot 5.5 is packaged with a command line version as well as an InstallRoot service, which can check for updated Trust Anchor Management Protocol (TAMP) messages that contain the latest certificate information from DoD. The following operating systems are supported: Windows 10, Windows 11, and Windows Server 2012, 2016, 2019, and 2022. ]]>
</content:encoded>
            <enclosure url="" />
            <media:content url="" height="" width="" type="application/x-msi" />
        </item>
        <item>
            <title>
<![CDATA[ InstallRoot 5.6 NIPR Non-Administrator 32-bit Windows Installer ]]>
</title>
            <link>
<![CDATA[ https://public.cyber.mil/installroot_5/ ]]>
</link>
            <pubDate>Thu, 11 Jan 2024 19:52:32 +0000</pubDate>
            <dc:creator>cyberx-sk</dc:creator>
            <dc:identifier>50771</dc:identifier>
            <dc:modified>2024-01-11 21:20:07</dc:modified>
            <dc:created unix="1705002752">2024-01-11 19:52:32</dc:created>
            <guid isPermaLink="true">
<![CDATA[ https://public.cyber.mil/installroot_5/ ]]>
</guid>
            <category>186</category>
            <description>
<![CDATA[ InstallRoot 5.6 NIPR Non-Administrator 32-bit Windows Installer This tool allows users to install DoD production PKI, Joint Interoperability Test Command (JITC) test PKI, and External Certification Authority (ECA) CA certificates into their Windows and Firefox certificate stores. InstallRoot 5.5 is packaged with a command line version as well as an InstallRoot service, which can check ]]>
</description>
            <content:encoded>
<![CDATA[ This tool allows users to install DoD production PKI, Joint Interoperability Test Command (JITC) test PKI, and External Certification Authority (ECA) CA certificates into their Windows and Firefox certificate stores. InstallRoot 5.5 is packaged with a command line version as well as an InstallRoot service, which can check for updated Trust Anchor Management Protocol (TAMP) messages that contain the latest certificate information from DoD. The following operating systems are supported: Windows 10, Windows 11, and Windows Server 2012, 2016, 2019, and 2022. ]]>
</content:encoded>
            <enclosure url="" />
            <media:content url="" height="" width="" type="application/x-msi" />
        </item>
        <item>
            <title>
<![CDATA[ InstallRoot 5.6 NIPR 32-bit Windows Installer ]]>
</title>
            <link>
<![CDATA[ https://public.cyber.mil/installroot_5-4/ ]]>
</link>
            <pubDate>Thu, 11 Jan 2024 13:30:03 +0000</pubDate>
            <dc:creator>cyberx-sk</dc:creator>
            <dc:identifier>50792</dc:identifier>
            <dc:modified>2024-01-17 13:56:37</dc:modified>
            <dc:created unix="1704979803">2024-01-11 13:30:03</dc:created>
            <guid isPermaLink="true">
<![CDATA[ https://public.cyber.mil/installroot_5-4/ ]]>
</guid>
            <category>186</category>
            <description>
<![CDATA[ InstallRoot 5.6 NIPR 32-bit Windows Installer This tool allows users to install DoD production PKI, Joint Interoperability Test Command (JITC) test PKI, and External Certification Authority (ECA) CA certificates into their Windows and Firefox certificate stores. InstallRoot 5.5 is packaged with a command line version as well as an InstallRoot service, which can check for ]]>
</description>
            <content:encoded>
<![CDATA[ This tool allows users to install DoD production PKI, Joint Interoperability Test Command (JITC) test PKI, and External Certification Authority (ECA) CA certificates into their Windows and Firefox certificate stores. InstallRoot 5.5 is packaged with a command line version as well as an InstallRoot service, which can check for updated Trust Anchor Management Protocol (TAMP) messages that contain the latest certificate information from DoD. The following operating systems are supported: Windows 10, Windows 11, and Windows Server 2012, 2016, 2019, and 2022. ]]>
</content:encoded>
            <enclosure url="" />
            <media:content url="" height="" width="" type="application/x-msi" />
        </item>
        <item>
            <title>
<![CDATA[ InstallRoot 5.6: User Guide ]]>
</title>
            <link>
<![CDATA[ https://public.cyber.mil/unclass-rg-installroot_niprnet_user_guide/ ]]>
</link>
            <pubDate>Wed, 10 Jan 2024 19:14:46 +0000</pubDate>
            <dc:creator>cyberx-sk</dc:creator>
            <dc:identifier>50738</dc:identifier>
            <dc:modified>2024-01-11 18:19:30</dc:modified>
            <dc:created unix="1704914086">2024-01-10 19:14:46</dc:created>
            <guid isPermaLink="true">
<![CDATA[ https://public.cyber.mil/unclass-rg-installroot_niprnet_user_guide/ ]]>
</guid>
            <category>186</category>
            <description>
<![CDATA[ InstallRoot 5.6: User Guide This guide provides installation and usage instructions for the DoD PKE InstallRoot tool. ]]>
</description>
            <content:encoded>
<![CDATA[ This guide provides installation and usage instructions for the DoD PKE InstallRoot tool. ]]>
</content:encoded>
            <enclosure url="" />
            <media:content url="" height="" width="" type="application/pdf" />
        </item>
        <item>
            <title>
<![CDATA[ FBCA Cross-Certificate Remover 1.18 ]]>
</title>
            <link>
<![CDATA[ https://public.cyber.mil/unclass-fbca_crosscert_remover_v118/ ]]>
</link>
            <pubDate>Thu, 24 Oct 2019 19:50:06 +0000</pubDate>
            <dc:creator>Ciaran Salas</dc:creator>
            <dc:identifier>34986</dc:identifier>
            <dc:modified>2019-10-24 20:26:43</dc:modified>
            <dc:created unix="1571946606">2019-10-24 19:50:06</dc:created>
            <guid isPermaLink="true">
<![CDATA[ https://public.cyber.mil/unclass-fbca_crosscert_remover_v118/ ]]>
</guid>
            <category>186</category>
            <description>
<![CDATA[ FBCA Cross-Certificate Remover 1.18 This tool removes certificates which cause the cross-certificate chaining issue for DoD (and optionally ECA) users from Microsoft Local Computer and User Certificate stores. The following Operating Systems are supported: Windows Server 2003, Windows Server 2003R2, Windows Server 2008, Windows Server 2008R2, Windows Server 2012, Windows Server 2012R2, Windows XP, Windows ]]>
</description>
            <content:encoded>
<![CDATA[ This tool removes certificates which cause the cross-certificate chaining issue for DoD (and optionally ECA) users from Microsoft Local Computer and User Certificate stores. The following Operating Systems are supported: Windows Server 2003, Windows Server 2003R2, Windows Server 2008, Windows Server 2008R2, Windows Server 2012, Windows Server 2012R2, Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, and Windows 10. ]]>
</content:encoded>
            <enclosure url="" />
            <media:content url="" height="" width="" type="application/zip" />
        </item>
        <item>
            <title>
<![CDATA[ Editing CRLAutoCache Source Locations ]]>
</title>
            <link>
<![CDATA[ https://public.cyber.mil/unclass-editing_crlautocache_sources_dnlookup_locations/ ]]>
</link>
            <pubDate>Fri, 23 Aug 2019 15:29:45 +0000</pubDate>
            <dc:creator>Ciaran Salas</dc:creator>
            <dc:identifier>34621</dc:identifier>
            <dc:modified>2019-08-23 15:32:49</dc:modified>
            <dc:created unix="1566574185">2019-08-23 15:29:45</dc:created>
            <guid isPermaLink="true">
<![CDATA[ https://public.cyber.mil/unclass-editing_crlautocache_sources_dnlookup_locations/ ]]>
</guid>
            <category>186</category>
            <description>
<![CDATA[ Editing CRLAutoCache Source Locations This Quick Reference Guide (QRG) describes how to edit source location and DNLookupTable URLs used by CRLAutoCache for Windows to fetch and cache CRLs. ]]>
</description>
            <content:encoded>
<![CDATA[ This Quick Reference Guide (QRG) describes how to edit source location and DNLookupTable URLs used by CRLAutoCache for Windows to fetch and cache CRLs. ]]>
</content:encoded>
            <enclosure url="" />
            <media:content url="" height="" width="" type="application/pdf" />
        </item>
        <item>
            <title>
<![CDATA[ Editing Certificate Group Locations for InstallRoot via the GUI ]]>
</title>
            <link>
<![CDATA[ https://public.cyber.mil/unclass-editing_installroot_group_locations_via_gui/ ]]>
</link>
            <pubDate>Tue, 20 Aug 2019 13:58:23 +0000</pubDate>
            <dc:creator>Ciaran Salas</dc:creator>
            <dc:identifier>34603</dc:identifier>
            <dc:modified>2019-08-20 14:11:58</dc:modified>
            <dc:created unix="1566309503">2019-08-20 13:58:23</dc:created>
            <guid isPermaLink="true">
<![CDATA[ https://public.cyber.mil/unclass-editing_installroot_group_locations_via_gui/ ]]>
</guid>
            <category>186</category>
            <description>
<![CDATA[ Editing Certificate Group Locations for InstallRoot via the GUI This Quick Reference Guide (QRG) describes how to edit the default InstallRoot certificate group locations using the InstallRoot graphical user interface (GUI). ]]>
</description>
            <content:encoded>
<![CDATA[ This Quick Reference Guide (QRG) describes how to edit the default InstallRoot certificate group locations using the InstallRoot graphical user interface (GUI). ]]>
</content:encoded>
            <enclosure url="" />
            <media:content url="" height="" width="" type="application/pdf" />
        </item>
    </channel>
</rss>
<!--  end of xml string  -->