If you go to your SSL Dragon account, then to your SSL Certificate details page, you will find the 3 large pieces of codes that your SSL Certificate is made of:

1) The CSR code is the one that you generated along with your Private Key, and which you used to configure your SSL Certificate.
2) The CRT code which is your actual SSL Certificate code.
3) The CA Bundle code contains the root and intermediate certificates in it. 

Also, listed below you will find all the Sectigo Root and Intermediate CA certificates and the bundle files required to complete the SSL certificate installation across various servers and email clients.

DV ECC Files

DV RSA files

  • Sectigo RSA DV CATXT file
  • USERTrust RSA CATXT file
  • RSA DV Bundle TXT file
  • RSA DV Bundle with SHA-1TXT fileincludes SHA-1 AddTrust External Root CA required for legacy platforms and Zimbra.

OV ECC files

OV RSA files

  • Sectigo RSA OV CATXT file
  • USERTrust RSA CATXT file
  • RSA OV BundleTXT file
  • RSA OV Bundle with SHA-1TXT fileincludes SHA-1 AddTrust External Root CA required for legacy platforms and Zimbra.

EV ECC files

EV RSA files

  • Sectigo RSA EV CATXT file
  • USERTrust RSA CATXT file
  • RSA EV BundleTXT file
  • RSA EV Bundle with SHA-1 –  TXT fileincludes SHA-1 AddTrust External Root CA required for legacy platforms and Zimbra.

Code Signing – Intermediate

Standard

  • Sectigo RSA Code Signing CA – TXT file

EV Code Signing

  • Sectigo RSA Extended Validation Code Signing CA – TXT file

For Code Signing Certificates, issued on or after June 1, 2021

Standard

  • Sectigo Public Code Signing CA R36 – TXT file
  • SectigoPublicCodeSigningRootR46_AAA [ Cross Signed ] – TXT file

EV Code Signing

  • Sectigo Public Code Signing CA EV R36 – TXT file
  • SectigoPublicCodeSigningRootR46_AAA [ Cross Signed ] – TXT file

Secure Email 

  • Sectigo RSA Client Authentication and Secure Email CA – TXT file

Note: Few legacy systems that no longer receive updates from their vendor may not trust Sectigo SHA-2 Certificates. To enable them to trust the SHA-2 Certificates, Sectigo recommends including the Cross Signed Certificate into the Server Certificate chain. This will enable those legacy systems to trust the SHA-2 Certificates.

Source: Sectigo’s Knowledge Base