In a nutshell, this is the certificate (signed by the CA) that this machine presents to clients who connect. The signature on this certificate proves that this machine is in fact who they are trying to connect to (instead of an evil hacker who has hijacked the Internet connection).