System and network requirements
Verify that your system and network meet the minimum requirements before you install a DigiCert® agent.
The agent must be installed on the same system as the automated TLS/SSL certificates.
System requirements
The DigiCert® agent software runs on Linux and Windows systems, with the following requirements:
CentOS/RHEL (7.x, 8.x, 9.x), Ubuntu (20.04 and later)
Root privileges
64-bit version and US locale required
2 GB RAM (4 GB recommended)
2 GB free disk space (minimum)
CLI utilities
awk
,grep
,sed
,lsof
, anddos2unix
must be installed
Microsoft Windows 10, Server (2016, 2019, 2022)
Run as administrator
64-bit version
Microsoft .NET Framework 4.x
2 GB RAM (4GB RAM recommended)
2 GB free disk space (minimum)
Network requirements
The DigiCert agent on each host must be able to resolve the fully qualified domain names (FQDNs) for the local web server, either via DNS or a local "hosts" file.
In addition, the agent must be able to reach the following URLs:
For users of the cloud-hosted DigiCert ONE service: The agent needs to access HTTPS (port 443) on the external DigiCert host
automation-service.digicert.com
and the two DigiCert platform URLs for one of the following regions:Region
URLs
Americas (U.S.A.)
one.digicert.com
,clientauth.one.digicert.com
APJ (Japan)
one.digicert.co.jp
,clientauth.one.digicert.co.jp
EMEA (Netherlands)
one.nl.digicert.com
,clientauth.one.nl.digicert.com
EMEA (Switzerland)
one.ch.digicert.com
,clientauth.one.ch.digicert.com
For users with an on-premises DigiCert ONE deployment: The agent needs to access HTTPS on the external DigiCert host
automation-service.digicert.com
plus the local DigiCert ONE instance and ClientAuth host (for example,my-org.one.digicert.com
andmy-org.clientauth.digicert.com
).
Notice
If the agent will use a local DigiCert® sensor as proxy, make sure port 48999 is open on the sensor and can be accessed by the agent.
Additional requirements for private on-premises DigiCert ONE users
Users with a private on-premises DigiCert ONE deployment need to install the private DigiCert ONE certificate into the local truststores of any systems that will run agent-based automations.
Below are basic instructions for how to meet these private trust requirements. For more details about how to install and manage the CA certificates in a local truststore, consult the documentation for your operating system version.
Note: These requirements only apply to private on-premises DigiCert ONE users. They do not apply to users of the cloud-hosted DigiCert ONE service.
Windows truststore requirements
To automate certificates on a Windows system via a private on-premises DigiCert ONE server, install the private DigiCert ONE certificate into the Windows truststore as described below.
Active Directory deployment
Refer to this page on the Microsoft website for instructions about how to distribute the DigiCert ONE certificate via Active Directory.
Standalone deployment
To install the DigiCert ONE certificate on a standalone Windows system:
Copy the private DigiCert ONE certificate to the Windows system as a PEM-encoded file (.crt file extension). Note the certificate file location.
Launch the Windows
certlm.msc
tool as an administrator to manage the certificates on the local machine.Use the Import action to browse and import the DigiCert ONE certificate file into the list of Trusted Root Certification Authorities > Certificates.
Linux truststore requirements
To automate certificates on a Linux system via a private on-premises DigiCert ONE server, install the private DigiCert ONE certificate into the Linux truststore as follows:
Copy the private DigiCert ONE certificate to the Linux system as a PEM-encoded file (.crt file extension). Note the certificate file location.
Make sure the Linux ca-certificates package is installed. Install it if needed, for example, by running
apt-get install ca-certificates
oryum install ca-certificates
as root.Copy the .crt file for DigiCert ONE into the CA certificates directory. The location of this directory depends on your Linux distribution and version. See the table below for some possible locations.
Run the command as root to update the local truststore based on the current CA certificate files. The name of this command depends on your Linux distribution and version. See the table below for some possibilities.
Linux distribution | CA certificates directory | Command to update truststore |
---|---|---|
CentOS/RHEL | /etc/pki/ca-trust/source/anchors/ |
|
SUSE | /usr/share/pki/trust/anchors/ |
|
Ubuntu | /usr/local/share/ca-certificates/ |
|