Multiple users can use a chain of trust to create and use software on a system where digital certificates are verified in a chain configuration, and their keys are not stored directly in hardware. When you attempt to use the SBH300 without the software being digitally signed, the UI issues warnings. The signing authority only signs boot programs that enforce security, such as only running programs that are themselves signed, or allowing only signed code to have access to certain features of the machine. This process may continue for several layers, through one or more intermediate certificates. These create a chain of trust from the root certificate, issued by the CA, to the end-entity certificate that enables the final software to run.