- DigiCert product docs
- What's new
- Release notes
- Trust Lifecycle Manager
Trust Lifecycle Manager
Release notes RSS
Recent releases
December 16, 2025
DigiCert® ONE version: 1.11494.5 | Trust Lifecycle Manager: 1.5047.0
Included in this release:
New
CyberArk secrets manager connector - Integration with F5 and AWS unified (ACM)
DigiCert® Trust Lifecycle Manager now supports CyberArk in the Secrets manager connector category. This integration enables Trust Lifecycle Manager connectors to securely retrieve credentials from CyberArk, which are used during certificate delivery and automation workflows. It eliminates the need for hard-coded or locally stored passwords and ensures authentication leverages centrally managed, rotated secrets. This connector supports integration with CyberArk using the Central Credential Provider (CCP) service and client-based authentication.
This release enables the F5 connector and the AWS unified connector to authenticate using CyberArk-managed credentials for secure, enterprise-grade certificate lifecycle management. For more information, see the CyberArk connector guide.
Enhancements
Agent release 3.1.6
This agent update introduces the ability for admins to change the proxy configuration for an existing agent.
Fixes
Inventory total certificate count mismatch
Resolved an issue where the Total certificates count in Inventory > Certificates tab did not match the maximum number of records shown at the bottom of the data grid.
Unable to create a custom certificate report when selecting "Expires in (days)" field
Resolved an issue with generating custom certificate reports when the Expires in (days) field was selected from the Inventory page.
SAML SP metadata download
Resolved an issue where the SAML service provider (SP) metadata could not be downloaded from the Account > Settings > Self-service portal page for the authenticated self-service portal .
Custom certificate report does not retain filters when edited
Resolved an issue where edited custom certificate reports did not retain the original filter conditions.
Missing trust type value in authenticated self-service portal - Certificate request tab
Resolved an issue where the Public server trust type was missing from the authenticated self-service portal's Certificate request > Trust type dropdown. Additionally, resolved an issue where only 10 profiles were displayed in the table. The portal now displays up to 5,000 profiles.
December 10, 2025
DigiCert® ONE version: 1.11494.2 | Trust Lifecycle Manager: 1.5040.0
Included in this release:
New
Adaptive auto-renew logic
Starting with this release, DigiCert® Trust Lifecycle Manager introduces enhanced automation to keep renewal schedules aligned with real-world certificate changes. The system now continuously monitors refreshed and newly discovered certificates, automatically adjusting renewal timing whenever changes are detected. This new feature includes the following:
Certificate change detection: Automatically identifies when a refreshed or newly discovered certificate differs from the previously installed version.
Dynamic auto-renew scheduling: Renewal schedules are recalculated based on the newly discovered certificate's validity and properties.
Immediate renewal conditions: Renewal is immediately triggered when the:
Remaining certificate validity falls below the configured auto-renew window.
Certificate has already expired.
Updated certificate attributes: If certificate metadata (such as Subject Alternative Name, and other subject details) changes, the updated metadata is automatically used in any subsequent renewal requests.
Auto-renew configuration continuity: If the original certificate had auto-renewal configured, the replacement certificate automatically inherits this setting.
Consistent retry behavior: Renewal retries honor the existing auto-renew window and configured settings, ensuring reliable processing even after initial failures.
Enhancements
"Last seen" column added to Agents page
To improve visibility into agent availability, a new Last seen column has been added to the Discovery & automation tools > Agents page. This column displays when an agent was last active and includes advanced filtering options. This allows you to quickly identify agents that have and haven’t been seen within a specified number of days or hours.
Additional fields for custom certificate reports
With this release, Trust Lifecycle Manager supports the Operating system and Ciphers columns that you can include in your custom reports. Select these columns in the Server management details section of the Create custom report wizard.
Updates to the profile "Extensions" screen
With this release, the following improvements are made to the Extensions screen of the Create certificate profile wizard:
The Standard extensions dropdown list is now ordered alphabetically.
The Issuer alternative name (IAN) label is updated to Issuer alternative name (IAN) - Directory name reflecting that directory name is the only IAN attribute type that is supported.
"Other recipients" field for Public S/MIME profiles
Profiles created using the Public S/MIME Secure Email (via CertCentral) base template can now be configured with the Other recipients field. This allows administrators to receive a copy of all certificate lifecycle emails enabled on the profile.
Certificate REST API endpoint support for setting seat email
Enhanced the POST /mpki/api/v1/certificate REST API endpoint to support setting the seat email value (seat_email) without having to use a separate seat endpoint request.
Sensor release 3.9.14
This sensor update includes the following:
Trust Lifecycle Manager is the default option during sensor installation.
Improved retry logic for failed sensor upgrades.
Important security and stability fixes.
Fixes
Custom reports display duplicate entries and do not match certificate inventory
Resolved an issue where custom reports generated from the default All certificates view show duplicate entries and don’t match the certificate inventory. This issue occurred because the All certificates view displayed a filtered view of certificates while the custom report retrieved certificates irrespective of whether the same certificate was issued, discovered, or imported into the inventory.
With this release, if the selected column matches the All certificates view column set, the system executes the same unique inventory query so that the results match. If additional columns are selected in the custom report, the system falls back to the original reporting query. This query retrieves all certificates matching the filter criteria, regardless of duplicate certificates.
CSV upload fails
Resolved an issue with not being able to upload a CSV file that contains the security_identifier field.
Duplicate entries in custom certificate report
Resolved an issue where duplicate certificate entries were displayed in the custom reports.
AEConfig file download fails for profiles without an EKU
Resolved an issue with not being able to download an AEConfig file for profiles that don't have an Extension key usage (EKU) extension configured.
Certificate renewals fail for "Citrix FAS Smartcard Logon" profiles
Resolved an issue where renewals associated with the Citrix FAS Smartcard Logon profiles would fail with a duplicate certificate error. This issue occurred when the renewal window configured was less than 50% of the certificate validity period. Follow the profile configuration changes listed in the Troubleshooting topic to resolve this issue.
Renewal notifications fail for iOS/iPadOS enrollment method
Resolved an issue where end-users didn’t receive renewal email notifications for profiles configured with the iOS/iPadOS enrollment method. This issue occurred because the renewal email template was missing from the profile configuration.
"DNS name" field in the certificate displays an IP address
Resolved an issue where certificates issued through the Admin web request enrollment method displayed an IP address in the DNS name field, for profiles configured using the CA Manager Private Server Certificate base template.
Tenable connector remains in "Running" state after error
Resolved an issue where the Tenable connector would remain in the Running state when there is an error.
November 24, 2025
DigiCert® ONE version: 1.11351.13 | Trust Lifecycle Manager: 1.5003.0
Included in this release:
New
BeyondTrust - Secrets manager support for AWS Certificate Manager (ACM)
DigiCert® Trust Lifecycle Manager now supports secure credential retrieval from BeyondTrust vaults for authenticating AWS Certificate Manager (ACM) automation flows using the AWS unified connector. This eliminates the need for hard-coded secrets, enabling the use of centrally managed secrets stored in the BeyondTrust privileged access management (PAM) platform.
For more details, see the AWS unified connector guide.
AutoEnrollment Server version 2.25.3.0 - Support for Trusted Platform Module and diagnostics
This release of the DigiCert® Autoenrollment Server supports the following:
Microsoft Platform Crypto Provider - Trusted Platform Module (TPM)
Allows secure access to the machine's TPM v2.0 chip via the Microsoft Platform Crypto Provider for generating user and/or device keys and certificates.
Authorized profile administrators can create or edit profiles and choose the Microsoft Platform Crypto Provider to enforce a policy for non-exportable keys to be securely generated on the TPM.
For more details, see Create the autoenrollment certificate profile.
Diagnostics
This feature simplifies troubleshooting and issue diagnosis by automatically gathering all configuration, user, and log files into a password-protected
.zipfile containing:diagnostics.json: Detailed information about machine, OS,RequestBufferdatabase, Active Directory (AD), and registry.DCOM Permission Information (
DCOM.log): List of DCOM permissions includingAppID-specific permissions andMachine-widesettings.Group Policy Information (
gpresult.log): Information about configuredGroup Policy Objects(GPOs).User information: Information about the current logged-in user, including groups, claims, and privileges.
AEServer.log: Logs related toAEServeractivity for the past seven days.AEConfig.log: Logs related toAEConfig.ConfigureAES.log: Log generated during the latest execution of theConfigureAES.batfile.
For more details, see Diagnostics.
Enhancements
Manually trigger automation for scheduled sites
Administrators can now manually trigger automation for sites that already have a scheduled automation flow. This can be done without canceling the existing automation schedule or affecting future auto-renewals. This enhancement also provides greater flexibility to accommodate ad hoc changes while preserving the planned automation lifecycle.
New "Stop refresh" action for DigiCert agents
A new Stop refresh action has been introduced this release to help manage agents that remain in the Refreshing configuration state for an extended period. This allows administrators to cancel the existing refresh operation when required.
Notice
Although this option is available, it is recommended to allow the refresh process to complete to ensure that the agent accurately reflects the latest server state.
Fixes
Certificate API response doesn’t include OU field in subject
Resolved an issue where the organizational unit (OU) field was missing from the subject JSON block (subject.organizational_units) in responses from the GET /mpki/api/v1/certificate/{serial} endpoint.
CSR enrollments failed for profiles configured with optional Email field
Resolved an issue with certificate profiles configured with the CSR enrollment method and the optional Subject DN Email field, where enrollments failed if the CSR didn't contain a matching Email attribute.
Send automation lifecycle notifications to certificate owner
Resolved an issue where automation notifications configured in the certificate profile weren’t being sent to the certificate owner(s) defined in the profile.
Connector going to "Action needed" state every few hours
Resolved an issue where the Microsoft CA connector went into the Action needed state every few hours due to a synchronization issue with the Trust Lifecycle Manager plugin manager.
Tenable connector not importing all certificates
Resolved an issue with the Tenable connector was not importing all the certificate data.
November 19, 2025
DigiCert® ONE version: 1.11351.11 | Trust Lifecycle Manager: 1.4991.0
Included in this release:
New
BeyondTrust connector - Secrets manager support in Trust Lifecycle Manager
In this release, DigiCert® Trust Lifecycle Manager introduces the BeyondTrust connector that can be be accessed from the new Secrets manager category on the Integrations > Connectors > Add connector page. This connector allows Trust Lifecycle Manager connectors to securely retrieve and use credentials stored in the BeyondTrust vault during delivery and automation flows. This eliminates the need for hard-coded or locally stored passwords, and ensures endpoint authentication uses centrally managed and rotated secrets from the customer's vault.
This release also includes the ability for the F5 BIG-IP LTM connector to use credentials stored in the BeyondTrust vault. For more information, see the BeyondTrust connector guide.
Enhancements
DigiCert ONE login - Public Client Authentication support for DigiCert Trust Assistant
In this release, the Public Client Authentication (via CertCentral) base template has been updated to support the DigiCert ONE Login authentication method for certificate profiles configured with the DigiCert Trust Assistant enrollment method.
Define custom Qualys server URL
With this release, administrators can define a custom Qualys server URL. This enhancement enables organizations to direct scans and integrations to their own Qualys deployments, in addition to the standard Qualys cloud environments.
Agent release 3.1.5
This agent update includes the following:
Important security fixes to improve overall system stability.
Fix for an issue where proxy settings were being unintentionally cleared after a restart. Proxy configuration now persists as expected.
Sensor release 3.9.13
This sensor update includes the following:
Important security fixes to improve overall system stability.
Resolution for an issue where the Microsoft CA plugin timeout was being reset to 15 minutes.
Enhancements to support privileged access management (PAM) use cases.
Resolution for an issue where discovered certificates in the All certificates view could not be deleted.
Fixes
Unable to edit or save certificate profile containing Unique Identifier field
Resolved an issue that prevented editing or saving a certificate profile when the Required checkbox was toggled and the source for the field's value was set to Fixed value.
Incorrect Japanese label
Updated an incorrect Japanese label in the Certificate options > Renewal options section of the certificate profile configuration wizard.
Browser PKCS12 certificate renewal fails when tag is assigned
Resolved an issue where the Browser PKCS12 certificate renewal process with the Manual approval authentication method fails when a tag is assigned to the certificate.
Unable to filter owners in the Certificate Owners page
Resolved an issue with not being able to filter owners in the Account > Settings > Contacts > Certificate owners page.
Microsoft CA enrollment failures with non-expected fields in CSR
Resolved an issue where certificate enrollment would fail if the submitted certificate signing request (CSR) included fields that were not defined in the certificate profile. Starting from this release, additional fields no longer trigger errors, and the request is forwarded to the defined Microsoft CA for issuance. The issued certificate may or may not include the additional fields.
Notice
A similar fix is implemented for all external private CAs. However, the CA vendor may or may not include the additional fields in the CSR.
External email address display issue
Resolved an issue that prevented external email addresses from appearing in the notification recipients list.
November 13, 2025
DigiCert® ONE version: 1.11351.8 | Trust Lifecycle Manager: 1.4969.0
Enhancements
DigiCert Trust Assistant - AD Publisher script support for Generic User Certificate base template
With this release, the DigiCert® Trust Assistant Active Directory (AD) Publisher system script has been updated to support the Generic User Certificate base template. This enhancement allows you to push the issued certificate to your AD.
CT logs monitoring - instant discovery
Updated the CT logs monitoring feature to instantly discover certificates when they appear in the Certificate Transparency (CT) logs.
November 12, 2025
DigiCert® ONE version: 1.11351.7 | Trust Lifecycle Manager: 1.4964.0
Included in this release:
New
Certificate Transparency (CT) logs monitoring
With this release, DigiCert® Trust Lifecycle Manager introduces the monitoring of Certificate Transparency (CT) logs for proactive discovery of public certificates issued across your organization's domains. Benefits of CT logs monitoring:
Continuously monitor the public CT logs to identify certificates issued for your domains or organization that are not already present in your certificate inventory.
Automatically add matching certificates to your centralized inventory, where you can track and configure notifications for them.
Tag and categorize the discovered certificates using custom rules, simplifying search and management.
Detect certificate misuse and fraudulent activity to help protect your systems and brand.
CT logs monitoring gets configured at the account level from your global discovery settings. For more information, see CT logs monitoring.
DigiCert Trust Assistant - Custom scripts
In addition to the existing System scripts feature, this release introduces a new feature called Custom scripts. This new feature enables profile administrators to upload and manage their own scripts. Each uploaded script is automatically scanned for basic malware and executed after DigiCert® Trust Assistant completes certificate enrollment, renewal, or recovery operations.
Custom scripts allow profile administrators to deliver 'last mile integrations' following successful certificate provisioning, such as configuring a Wi-Fi access point or VPN client. This enables a seamless, end-to-end, zero-touch experience for end users while supporting various certificate-based use cases.
Warning
DigiCert® does not validate the functionality of any uploaded custom script and is not liable for actions executed by the script.
Enhancements
Manage agent auto-update settings at account level
With this release, a new account-level setting is added to the Account > Settings > Tool deployment page to enable or disable software auto-updates for agents.
When disabled at the account level, newly provisioned agents in the account will have software auto-update turned off by default.
Existing agents can optionally be set to have auto-update enabled or disabled based on the account-level settings.
Notice
Administrators can enable or disable auto-update at the account level at any time, and can always override this behavior at the individual agent level.
New Cipher filter in Inventory
With this release, administrators can filter their inventory using discovered cipher data available in Trust Lifecycle Manager. This enhancement enables the identification of sites using weak ciphers, allowing administrators to manage and strengthen their security posture.
Fixes
Certificate issuance failure when configuring a profile with a fixed Unique Identifier value
Resolved an issue where certificate requests submitted using REST API failed when a certificate profile's Unique identifier field was configured with a fixed value as it's source.
Inventory filters do not change when switching views
Resolved an issue where filters on the Inventory page do not change when switching between saved views.
Profile deletion timeout error
Resolved an issue where the delete profile action would time out. This error was because the system fetched all enrollments associated with the profile, regardless of enrollment status, instead of only retrieving the pending enrollments. Pending enrollments are canceled before the profile deletion process is completed.
Certificate owner creation via REST API
Resolved an intermittent issue with the creation of certificate owners through REST API.
Apache configuration issue on Windows when switching from HTTP to HTTPS
Resolved an issue where the automation process failed to copy the virtualhost configuration when switching from port 80 (HTTP) to port 443 (HTTPS).
Notifications not sent to email addresses configured as account admin contact
Resolved an issue where notifications were not being sent to email addresses configured under Account > Settings > Contacts > Admin.
November 6, 2025
DigiCert® ONE version: 1.11351.3 | Trust Lifecycle Manager: 1.4939.0
Included in this release:
Enhancements
DigiCert Trust Assistant v1.2.9
This release resolves an issue where browser-based authentication flows failed for DigiCert® Trust Assistant users whose Windows OS default language was set to a non-English language.
Fixes
Microsoft Outlook post-processing script failure
Resolved an issue where Microsoft Outlook post-processing script failed to match emails for DigiCert® Trust Assistant when running on a non-English language OS.
November 5, 2025
DigiCert® ONE version: 1.11351.1 | Trust Lifecycle Manager: 1.4933.0
Enhancements
Updates to ACME Renewal Information window
The default ACME Renewal Information (ARI) window has been updated to better align with shorter certificate lifecycles.
Certificates with a total validity of 60 days or less will now have a 7-day default ARI window.
Certificates with a validity period greater than 60 days will continue to use the existing 30-day default ARI window.
November 3, 2025
DigiCert® ONE version: 1.11134.10 | Trust Lifecycle Manager: 1.4929.0
Included in this release:
New
Sectigo CA integration
DigiCert® Trust Lifecycle Manager now supports integration with Sectigo Certificate Management (SCM) via a new Sectigo CA connector. This integration enables you to:
Discover and import all certificate types from your Sectigo account for centralized monitoring in Trust Lifecycle Manager.
Issue public TLS server certificates from Sectigo using the new
Sectigo Public CA Server Certificatebase template in Trust Lifecycle Manager.Manage public Sectigo certificates (issuance, revocation, renewal) directly from your Trust Lifecycle Manager inventory.
Automate lifecycle management for Sectigo certificates using ACME or the managed automation solution for Trust Lifecycle Manager.
The new Sectigo Public CA Server Certificate template in Trust Lifecycle Manager supports the following enrollment and authentication methods:
Enrollment methods | Authentication methods |
|---|---|
|
|
|
|
| N/A |
Important
To issue Sectigo certificates from Trust Lifecycle Manager, make sure the following requirements are satisfied in the connected Sectigo account:
At least one certificate profile is configured in Sectigo Certificate Manager (SCM).
At least one prevalidated organization and domain is available for certificate issuance in Sectigo. All certificate enrollment methods in Trust Lifecycle Manager require the organizations and domains to be prevalidated in Sectigo.
For more information, see the Sectigo CA connector guide.
DigiCert Trust Assistant v1.2.8
The DigiCert® Trust Assistant v1.2.8 release includes the following new features:
Support for new extensions:
Fetch button added to obtain the SID value for domain-joined users during certificate enrollment via
DigiCert One Loginauthentication method.LEI, LEI-Role, and IAN Directory attributes via
Manual authentication,Enrollment code,andSAML IdPauthentication methods.
IoT Device Manager support for the
.smpb(Structured Managed PKI Batch) extension enabling decryption of certificate and key batches generated from legacy MPKI systems for Manufacturing accounts.Support for multi-byte characters in usernames and installation directories.
Support for download instructions for certificate profiles configured with the
DigiCert One Loginauthentication method.Support for viewing Issuer details on the Certificate details page.
Support for viewing real-time certificate revocation status on the Tokens page.
Enhanced system post-processing scripts to help support multiple languages.
Multi-user support for Windows Server 2019 and Windows 11 available across physical machines and virtual desktop infrastructure (VDI) environments. This allows a user to run multiple DigiCert® Trust Assistant (DTA) instances simultaneously.
Warning
Known issue: For DTA users whose Windows OS default language is set to a non-English language, browser-based authentication flows (such as
Manual approval,Enrollment code, andSAML IdP) may fail. Currently, multi-user functionality is supported on systems with English set as the default OS language. This issue will be resolved in an upcoming DTA release.
Self-service portal authorization for certificate requests
With this release, Trust Lifecycle Manager allows self-service portal administrators to configure the Authenticated portal with SAML attributes. This applies to each SSP-enabled certificate profile that uses either the SAML IdP or Manual approval authentication method.
Users accessing the Authenticated portal can be configured in your IdP with attributes that are sent to DigiCert® as part of SAML assertion. These attributes can be used to authorize access by displaying the certificate profiles the user is permitted to view and enroll in.
To configure SAML attributes, go to Settings > Self-service portal and select the edit icon in the new Attributes column of the Portal-enabled certificate profiles table. You can then enter one or more attributes that are evaluated as OR conditions. For more information, see Self-service portal.
Audit log API endpoint returns total records for a filtered request
Starting with this release, the new audit log GET /mpki/api/audit-log/count API endpoint retrieves the total number of events and records for a filtered request. See the API documentation for more information.
Link CertCentral and UltraDNS for automated domain validation
With this release, Trust Lifecycle Manager supports linking DigiCert CertCentral® and UltraDNS accounts to enable continuous automated domain validation. For more information, see Link UltraDNS to CertCentral.
Enhancements
DigiCert Trust Assistant - User Info as SID extension source
When you create a certificate profile, you can now select User Info as a source for the Security Identifier (SID) extension. This allows the SID value to be automatically retrieved from your IdP during certificate issuance.
Additional Subject DN fields for Public Client Authentication base template
Updated the Public Client Authentication (via CertCentral) base template to support these additional Subject Distinguished Name (DN) fields:
Job title(multi-valued string)Serial number(single string value)User Id(single string value)Unique Identifier(single string value)
Order Id field
With this release, a new Order Id column and filter has been added to the Inventory > Certificates page, allowing you to filter CertCentral certificate records by their order id. The order id is displayed on the Certificate details page, and can also be included in custom reports.
Sensor release 3.9.12
New DigiCert sensor release with the following updates:
Updated version support for A10 connector
Versions qualified: 4.1.4-GR1, 5.2.1-P12, 6.0.4
Versions no longer qualified: 2.x.x
Upgraded the Docker OS to version 24.04
Allow full import action for CertCentral connector
With this release, the CertCentral integration is enhanced to allow full imports to be triggered at any time. When a full import is triggered, Trust Lifecycle Manager retrieves all certificate data from CertCentral based on configured import settings.
Fixes
Data missing in custom certificate reports
Resolved an issue where custom certificate reports were missing data when using DigiCert Agents operating on restricted ports.
Fixes included in DigiCert Trust Assistant v1.2.8
Added a remediation action for the following shell error encountered during DigiCert® ONE Login:
Error: Failed to open: Error (0x13D)Added a fix for an issue where certificates weren’t replicating from the DigiCert Software KeyStore to the Microsoft personal store.
Certificate installation on iOS devices fails with an unknown error
Resolved an issue with certificates not getting installed on iOS devices for profiles configured with iOS/ipadOS enrollment method. This was caused by an internal timeout during the certificate installation process.
A10 integration shows intermediate certificates instead of end-entity certificates
Resolved an issue with the A10 integration where intermediate CA certificates appeared in the Trust Lifecycle Manager inventory instead of the end-entity certificates.
Discovered certificates count mismatch
Resolved an issue where the discovery count was duplicated when the same certificate was detected from different sources.
October 16, 2025
DigiCert® ONE version: 1.11134.7 | Trust Lifecycle Manager: 1.4877.0
Fixes
Azure Key Vault appended with a random string
Resolved an issue where a random string was incorrectly appended to Azure Key Vault's certificate reference.
CertCentral connector goes into "Action needed"
Resolved an issue where a CertCentral connector goes into the Action needed state when the user triggers a Run now action and there are no certificates to import.
October 13, 2025
DigiCert® ONE version: 1.11134.4 | Trust Lifecycle Manager: 1.4870.0
Included in this release:
New
New CertCentral client authentication product type
Updated the Public Client Authentication (via CertCentral) base template to enable a new certificate product type called Client Auth, which supports the following additional Subject Distinguished Name (DN) and Subject Alternative Name (SAN) attributes under Certificate options. If there are multiple issuing CAs in your CertCentral account, you can now select the one that meets your requirements under Primary options.
Certificate field | Attributes |
|---|---|
Subject DN |
|
SAN |
|
Notice
Known limitations
The initial release of the new Client Auth product type won’t support the following:
RSA-PSSandECDSA SHA-512signing algorithmsDigiCert ONE Loginauthentication method for DigiCert® Trust Assistant
Enhancements
Adobe base templates - support for SDN:email
With this release, the following Adobe base templates now support the Subject DN email attribute, which can be added when creating or editing a profile from either template:
Adobe Individual in Organization (via CertCentral)Adobe Organization (via CertCentral)
October 8, 2025
DigiCert® ONE version: 1.11134.2 | Trust Lifecycle Manager: 1.4859.0
Included in this release:
New
Enhanced extensibility support
With this release, we are introducing enhanced extensibility capabilities that empower teams beyond engineering to create and manage custom sensor-based integrations. This functionality is available through the Developer role in DigiCert® Trust Lifecycle Manager, enabling developers to:
Build and upload custom integrations directly to their account
Leverage these integrations to add new automation connectors
To help you get started we provide an example plugin repository, so you can focus on the unique aspects of your integration rather than the initial project setup.
Notice
To enable this feature for your account, contact your DigiCert Solutions Engineer or Sales representative.
Extension ordering and the option to remove Basic Constraints extension
With this release, you can now customize profiles created from any of the three generic base templates using these two new features:
Ability to remove the Basic Constraints extension for applications not requiring it or looking at issuing smaller certificates.
Set the order of the extension fields by selecting the Up or Down arrows for applications relying on a specific order of an extension.
Note
Ordering will be reflected when parsing a certificate with an ASN.1 standard decoder or OpenSSL. Correct ordering may not be present if parsing with a Windows or MacOS inbuilt UI parser.
The SAN extension will always be at the top of the extensions list, and the CDP extension, if present, will be included in the ASN.1 structure before the AKI extension. This is because the CDP extension is not visible within the Trust Lifecycle Manager profile.
These features enable DigiCert® to issue certificates that comply with the Japan Electronic Signature Law.
Enhancements
SAML IdP for "External Private CA" and "Private Code Signing" templates
Updated the following base templates to support the SAML IdP authentication method, allowing you to externalize the authentication of certificate requests to your SAML IdP provider:
External Private CAPrivate Code Signing
CertCentral support for Browser PKCS12 enrollments
Updated the following CertCentral base templates to support the Browser PKCS12 enrollment method, allowing issuance of certificates into a PKCS12 file with its associated password:
CertCentral Public Server CertificateCertCentral Private Server Certificate
Note
This flow generates the keys and CSR at the client machine (not the server) via the user’s browser, and discards them upon the successful download of the certificate.
Sensor release 3.9.11
New DigiCert sensor release resolves a URL encoding issue when acting as a SCEP proxy.
Fixes
Sensor issue when used as SCEP proxy with the Certmonger SCEP client
Resolved an issue where the DigiCert sensor was not proxying SCEP requests correctly due to URL-encoding the target SCEP Server URL. This occurred when using the Certmonger client. This fix is included in sensor version 3.9.11.
Issues with enrollment pages on mobile devices
Resolved an issue with public-facing enrollment pages not auto-resizing on mobile devices.
Note
Public-facing enrollment flows are only officially qualified for Windows and Mac computers. However, with this fix the browser display on mobile devices is functional.
Unable to filter by scan status
Resolved an internal server error when filtering by the Scan status column on the Discovery & automation tools > Agents page.
September 29, 2025
DigiCert® ONE version: 1.10937.17 | Trust Lifecycle Manager: 1.4832.0
Fixes
IIS automation fails when a hostname is configured for a site
Resolved an automation issue where certificate installation failed on IIS when a hostname was configured for a site.
Important
To resolve the issue, run the Refresh configuration action on the failed agent and try automation again.
DigiCert Trust Assistant sign-in failures
Starting on September 23, 2025, users in the United States DigiCert® ONE production instance experienced issues with invalidated DigiCert® Trust Assistant login sessions, affecting customers with a certificate profile configured with DigiCert Trust Assistant and the DigiCert ONE Login authentication method.
This issue was resolved with the September 26, 2025, release. All users logged in during the time of the issue must re-login to continue using the auto-enrollment and auto-renewal features for DigiCert Trust Assistant.
September 24, 2025
DigiCert® ONE version: 1.10937.15 | Trust Lifecycle Manager: 1.4822.0
Included in this release:
Enhancements
Agent release 3.1.4
A new ACME client is now available for all new and upgraded DigiCert agents.
Note
With the new ACME client:
All automation logs are consolidated under
<agent_home>\logs\agent.logAutomated certificates are located in
C:\Digicertor/etc/digicert
The agent is also updated to retain proxy configuration if no DigiCert sensor is available.
Fixes
Requesters not receiving enrollment emails
Resolved an issue where enrollment emails associated with the CertCentral Public Server Certificate and CertCentral Private Server Certificate base templates were not sent to the requester email value, but to the seat email value. With this fix, the enrollment emails are sent to the requester email value.
Tags and CA vendor filtering issue for custom certificate reports
Resolved an issue where custom certificate reports were not being initiated when filtering by Tags or CA vendor from the Inventory page.
September 19, 2025
DigiCert® ONE version: 1.10937.12 | Trust Lifecycle Manager: 1.4803.0
Fixes
Cannot override the validity period of MSCA profiles
Resolved an issue with not being able to override the validity period for profiles configured from the Microsoft CA Private Server Certificate base template with the Manual Approval authentication method. This is because the DigiCert® Trust Lifecycle Manager profiles dynamically read the validity period from the Microsoft CA templates and cannot be changed at the time of admin approval. The option to override the validity period is now removed.
DigiCert agent - blocked automations
Resolved an issue where large-sized file scans caused delays in DigiCert agent automation operations and uploads. From this release, automation tasks for DigiCert agents can now run concurrently while system scans are in progress, reducing bottlenecks and improving overall agent efficiency.
September 17, 2025
DigiCert® ONE version: 1.10937.9 | Trust Lifecycle Manager: 1.4791.0
Included in this release:
Enhancements
Show SNI domain name with bindings for an endpoint
Enhanced the bindings section under Inventory > Endpoints to show the domain name used to identify the Server Name Indication (SNI) site. This enhancement allows administrators to identify sites more accurately.
Fixes
Duplicate certificate errors not detected at enrollment stage
Resolved an issue where duplicate certificate requests (outside the renewal window) weren't detected at the time of request submission for profiles configured with the Manual Approval authentication method.
Security Identifier (SID) extension with non-supported prefix characters
Resolved an issue where non-supported prefix characters in the Security Identifier (SID) extension were included in the CSR generated with Microsoft's certreq tool, which the DigiCert® Private CA platform was trapping and stopping certificate issuance. From this release, DigiCert® Trust Lifecycle Manager will trim any leading characters encountered before the SID (S-x-x-...) value.
Browser PKCS12 certificate installation page
Reordered the steps to download the PKCS12 certificate. From this release, the Download button is enabled only after you copy the PKCS12 password to the clipboard.
Scan status filter not working
Fixed an issue with the Scan status filter.
Certificate drill-down not working
Corrected the filter count by including revoked certificates to show the accurate number of total certificates.
September 12, 2025
DigiCert® ONE version: 1.10937.7 | Trust Lifecycle Manager: 1.4767.0
Included in this release:
Enhancements
DigiCert PKI Platform 8 CA connector - retry process for key recovery failures
Enhanced the PKI Platform 8 CA connector to include a retry process for failed imports of recovery certificates.
Fixes
PKI Platform 8 CA connector data discrepancy
Resolved an issue where a data discrepancy was discovered in the PKI Platform CA connector process.
Intune GCC integration
Resolved an issue with certificate issuance using Azure GCC High Intune integration.
September 11, 2025
DigiCert® ONE version: 1.10937.5 | Trust Lifecycle Manager: 1.4763.0
Fixes
Admin web request - unable to submit
Resolved an issue where administrators were unable to use the Admin web request method to enroll a certificate with automated delivery.
September 10, 2025
DigiCert® ONE version: 1.10937.3 | Trust Lifecycle Manager: 1.4755.0
Included in this release:
New
DigiCert® Private CA connector support for additional enrollment flows
Enhanced the On-prem CA connector to support the three generic base templates (Device, Server or User) for issuing non-escrow certificates through the enrollment and authentication methods defined by each template, as listed in the following table:
Enrollment method | Authentication method |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
For more information, see DigiCert On-prem CA connector guide.
DigiCert Trust Assistant v1.2.7
The DigiCert® Trust Assistant version 1.2.7 release introduces the following new features and fixes:
Certificate recovery via PKI Platform 8 connector
Enhanced support to recover imported certificates from DigiCert® Trust Lifecycle Manager using the DigiCert® PKI Platform 8 connector. For more information, see DigiCert PKI Platform 8 connector Guide.
DigiCert Software KeyStore for Windows upgrade
DigiCert Software KeyStore (for Windows) has been upgraded to enhance security and capabilities. DigiCert recommends upgrading DigiCert Software KeyStore Provider to version 1.0.7.
On Windows computers, you may see a banner prompting you to update both the User and Administrator PINs within 30 days. After this period, the keystore will be locked until the PINs are updated. DigiCert recommends following the instructions in the banner.
Resume option for non-escrow certificates
New option to resume certificate enrollment when a non-escrow certificate fails to install in DigiCert Trust Assistant during the issuance or enrollment process.
Fixes
Resolved the issue where users encountered a Failed to generate the CSR error when signing in to DigiCert Trust Assistant.
Resolved the issue where users encountered the error message Service config not found for PostScriptService.
Resolved the issue where users did not receive a clear message when port 8900 was already in use. DigiCert® Trust Assistant now displays a proper error message in this scenario.
Resolved the following issues when using certificates stored in the DigiCert Software KeyStore:
Windows: PIN prompt not appearing in the foreground. Requires upgrade to DigiCert Software KeyStore Provider v1.0.7.
macOS: Sign operation failing. Requires upgrade to DigiCert Software KeyStore Token v1.0.5.
Enhancements
PKI Platform 8 connector enhancements to support pushing/pulling of escrowed certs into Intune/DigiCert Trust Assistant
Enhanced the PKI Platform 8 connector to support three new options for imported/recovered PKCS12 certificates when selecting the recovery option in the connector:
Push imported escrowed certificates to a customer Intune tenant for onward provisioning.
Pull imported escrowed certificates into DigiCert Trust Assistant when configured with the
DigiCert ONE Loginauthentication method, allowing manual or automated import of PKI Platform 8 escrowed certificates into DigiCert Trust Assistant.Allow the imported certificate to be searchable via LDAP.
Fixes
Edit custom report not retaining previous field selection
Resolved an issue with the Edit Report functionality where previously configured schedules and permission settings were not retained. All configurations now remain intact when editing existing custom reports.
Whitespace trimming of DNS Name values during enrollment
Resolved an issue where DNS Name values entered with leading or trailing whitespaces caused validation failures during web-based enrollment. The system now trims any whitespace before or after the DNS Name value to prevent such errors.
Report download fails from the download link included in the email
Resolved an issue where the deep link included in report notification emails failed to download large custom reports with multiple entries in the database.
Custom certificate report data inconsistency
Resolved an issue with data inconsistencies in custom certificate reports, where only the last partition of the report was streamed back to the UI during download.
Incorrect order of steps for non-English languages
Resolved an issue where the steps on the certificate pickup page appeared in the wrong order for non-English languages when using the Browser PKCS12 enrollment method.
Key type and size not retained when updating a profile
Resolved an issue where profiles did not retain the key type and key size(s) values set by a profile administrator upon saving the profile, and instead used the default key type and size(s).
September 3, 2025
DigiCert® ONE version: 1.10937.2 | Trust Lifecycle Manager: 1.4708.1
Fixes
5xx error in Health Check API
Resolved an issue where the Health Check API intermittently returned 5xx error codes, specifically 503 Service Unavailable, caused by response times exceeding 15 seconds due to downstream service calls.
August 25, 2025
DigiCert® ONE version: 1.10789.8 | Trust Lifecycle Manager: 1.4708.0
Fixes
DigiCert agents stuck in REFRESHING_CONFIG
Resolved an issue where DigiCert agents got stuck in the REFRESHING_CONFIG status during the internal daily batch refresh job.
August 21, 2025
DigiCert® ONE version: 1.10789.7 | Trust Lifecycle Manager: 1.4699.0
Included in this release:
New
DigiCert AutoEnrollment Server v.2.25.2.0
This release of the DigiCert AutoEnrollment Server supports the following:
Clear Data functionality (aka vacuum): New options to manually or automatically clear the records in
RequestBufferDatafor requests that are in aCompletedstate. This helps reduce the internal database size and save space on the physical or virtual machine the AES server is running on.ConfigureAES.bat script improvements: Enhanced the
ConfigureAES.batscript to allow skipping specific configuration steps or exiting execution entirely.Proxy UI enhancement: Added a separate field to specify the Proxy Port.
Platform support: Qualified support for Windows Server 2025.
REST API - GET custom-attributes/certificate endpoint
In this release, a new GET /custom-attributes/certificate API endpoint is introduced to retrieve the list of custom attributes for a specific certificate ID. For details, see the API endpoint documentation.
Enhancements
Inventory view enhancements
Updated DigiCert® Trust Lifecycle Manager Inventory views to improve accuracy and clarity. Certificates marked as Replaced or Replaced external no longer appear in the active inventory. Instead, they are moved to the respective endpoint’s history, ensuring that only active certificates are displayed in the Inventory while maintaining full traceability in historical records.
CA Manager Profile – ACME Support for domain controller extension
With this release, the CA Manager Private Server Certificate profile is enhanced to support adding a Domain Controller as a Microsoft certificate template name extension while issuing certificates through a third-party ACME flow.
Fixes
Incorrect Discovery seat value in dashboard widget
Resolved an issue where the Seat usage by seat type widget in the dashboard displayed an incorrect Discovery seat value.
Unable to activate suspended profile
Resolved an issue where suspended profiles could not be activated.
Custom seat report not generating
Resolved an issue where custom seat reports were not being generated successfully.
August 13, 2025
DigiCert® ONE version: 1.10789.5 | Trust Lifecycle Manager: 1.4665.0
Included in this release:
New
Script distribution enhancements for agent workflows
With this release, Trust Lifecycle Manager introduces streamlined management and secure distribution of agent scripts that significantly reduces manual effort and improves operational efficiency in agent-related workflows. Key features:
Script repository: You can now access a centralized Scripts section in the Trust Lifecycle Manager web console to manage all custom scripts associated with agent workflows. For example: Admin web request post-delivery, agent pre/post-installation, and SNI.
Full CRUD support: You can perform
Create,Read,Update, andDeleteoperations on your uploaded scripts directly through the web console.Script upload with file association: During script creation, you can upload script files (up to 100KB), which are securely stored and tracked alongside metadata.
Automatic script distribution: Once a script gets assigned, Trust Lifecycle Manager securely distributes the script to all the applicable target agents, removing the need for manual file transfers.
Security and validation:
Pre-storage security scan: Uploaded script files are automatically scanned for malicious content before storage and distribution.
Allowed file size: Script uploads are restricted to a maximum file size of 100kB.
For more information, see Agent scripts.
Note
The new script management features are available for US and EMEA customers. Support for other regions will be rolled out soon.
Enhancements
Agent version 3.1.2
This agent update includes enhancements to support the new script management system with automatic script distribution.
DigiCert® Trust Assistant - Microsoft Outlook configuration script update
Microsoft Outlook configuration script now supports both the 32-bit and 64-bit versions of the Microsoft Outlook application.
Important
The DigiCert Software keystore is not supported with the 32-bit Outlook application. You must switch to 64-bit Outlook or configure the DigiCert Trust Assistant profile with a different keystore (for example, Windows OS or Hardware token).
OID values for Extended Key Usage extension
For all Extended Key Usage (EKU) extension values configured within a profile, the OID value is now displayed alongside its friendly name.
Fixes
Same certificate recovery password
Resolved an issue where an administrator-initiated certificate recovery flow generated the same PKCS12 password for different certificates when performed in the same browser tab, instead of creating unique PKCS12 passwords.
Note
Initiating the recovery of a different certificate from a different tab is yielding a different password, as expected
User full name email template variable not included in customized email
Resolved an issue where custom email templates did not include the value for the {{userFullName}} variable in emails delivered to users.
Inventory – filter profiles with same name
Resolved an issue where an error displayed on the Inventory page when filtering by profiles with duplicate names.
Incorrect Discovery seat value in dashboard widget
Resolved an issue where the Seat usage by seat type widget displayed an incorrect Discovery seat value in the Dashboard.
August 6, 2025
DigiCert® ONE version: 1.10789.2 | Trust Lifecycle Manager: 1.4645.0
Included in this release:
New
Public Certificate scanning using a cloud-based scanner via DigiCert® Trust Lifecycle Manager
With this release, Trust Lifecycle Manager introduces a new cloud-based scanning capability that enables you to discover TLS certificates on your public internet-facing infrastructure without the need to deploy any sensors. This feature leverages DigiCert’s cloud scanning infrastructure to provide you with early visibility into your TLS environments. Key features of the cloud scanner include:
Cloud scanner as a new source: Added as a certificate discovery method in Trust Lifecycle Manager.
Scan initiation from web console: You can initiate and configure cloud scans directly from the Trust Lifecycle Manager web console.
Target inputs: Import FQDNs/IP addresses for scanning.
Deep scan support: Includes TLS handshake and cipher suite details.
Port restriction: Scans are limited to port 443.
Scan management: Real-time progress display, scan cancellation, and timestamp of the last scan.
Scheduling: Supports both one-time and recurring scan schedules.
Caching: Scan results are cached for 8 hours.
Important
This feature is available for customers in the US and EMEA regions who have enabled the Network Discovery feature. Support for other regions will be rolled out soon.
Enhancements
Agent version 3.1.1
This agent update includes stability enhancements and resolves upgrade issues, including improvements related to ACME client support.
Sensor version 3.9.9
This sensor update includes a fix for a Citrix ADC installation issue that occurs when the sensor does not have access to all nodes in a high availability (HA) configuration.
Jamf Pro SCEP integration - automatic seat creation
The SCEP integration for Jamf Pro now supports automatic creation of seats in Trust Lifecycle Manager when Jamf-managed devices enroll certificates. This simplifies the configuration process by eliminating the need to manually create seats in advance.
For details about setting up the Jamf Pro SCEP integration with automatic seat creation, see SCEP integration guide.
Fixes
Button to download the DigiCert® Trust Assistant client not showing
Resolved an issue where the button to download the DigiCert Trust Assistant client did not appear on the web page when it was not installed on the user’s computer.
DigiCert® Trust Assistant AD publishing script for Mac
Resolved an issue where the DigiCert Trust Assistant automation script failed to publish to Active Directory when executed on macOS.
Allowed list validation logic with optional profile fields
Resolved an issue where certificate profiles configured with optional SAN:dnsName and/or SAN:ipAddress fields, along with an allowed/blocked list, triggered validation errors when those fields were missing from the certificate request.
Incorrect Discovery seat value in dashboard widget
Resolved an issue where the Seat usage by seat type widget displayed inaccurate Discovery seat values in the Dashboard.
July 30, 2025
DigiCert® ONE version: 1.10498.15 | Trust Lifecycle Manager: 1.4619.0
Included in this release:
New
New UI design and field visibility controls for public-facing enrollment pages
Enhanced all public-facing web enrollment pages with a new UI design. This enhancement delivers a new user experience, eliminates white space on the right-hand side of the page, optimizes page components to use a more appealing look and feel, and allows further control over both the branding and content being displayed on the page. Key enhancements include:
Customize the background color of public-facing pages directly from Settings > General > Branding.
Option to show or hide certificate fields that have a source of Fixed value when creating or editing a profile, allowing control over their visibility and corresponding values on public-facing pages.
Toggle to show or hide the Seat ID and Requestor email fields on public-facing pages when creating or editing a profile.
Enhancements
Revocation status sync with CertCentral
With this release, DigiCert® Trust Lifecycle Manager automatically synchronizes the revocation status of certificates revoked in CertCentral. The updated status is reflected in the Trust Lifecycle Manager Inventory, ensuring accurate and up-to-date certificate tracking.
Underscore character support for dnsServer field
The SAN dnsServer field logic has been updated to support the underscore (_) character at the beginning of a hostname for private certificates only.
Note
If you already have a profile created with a SAN dnsServer field and need to use values with the underscore (_) character, you must remove the field from the profile and save it, then add it back after editing or saving the profile. Alternatively, you can create a new profile.
Fixes
Intune connector "Action needed" status
Resolved an issue where Intune-based profiles did not update to the Action needed status when the Intune secret was invalid. This issue affected test connection functionality and all certificate lifecycle operations, including enroll, import, and revoke.
From this release, when an invalid Intune secret is detected, all associated Intune profiles will be updated to the Action needed status. Profile administrators are notified by email and must update the secret before resuming all Intune operations.
Google Cloud Platform (GCP) connector stability improvement
This release includes a fix for an issue where the GCP unified connector could remain stuck in a Running status if a misconfigured load balancer was encountered during discovery. The connector now handles such scenarios and completes the discovery process as expected.
July 24, 2025
DigiCert® ONE version: 1.10498.11 | Trust Lifecycle Manager: 1.4601.0
Included in this release:
New
Intune‑SCEP support for Microsoft CA
With this release, the Intune base template supports issuing certificates from a Microsoft CA via Intune. To configure this feature, create a profile, select the Azure Auth authentication method, and choose your Intune connector.
AWS unified connector - allow ARN reuse
With this release, administrators can now configure the AWS unified connector to reuse existing ARNs by reimporting renewed certificates. This eliminates the need to update bindings across AWS resources such as ELBs and EC2 instances. This allows you to:
Save time by avoiding manual rebinding after renewal.
Maintain consistency across your AWS environments.
Simplify renewals for certificates bound to multiple targets.
Note
The following conditions apply when you reimport a certificate:
You can add or remove domain names.
You cannot remove all domain names from a certificate.
If Key Usage (KU) extensions are available in the originally imported certificate, you can add new extension values, but you cannot remove existing values.
If Extended Key Usage (EKU) extensions are available in the originally imported certificate, you can add new extension values, but you cannot remove existing values.
The key type and size cannot be changed.
You cannot apply resource tags when reimporting a certificate.
Enhancements
Regenerate RA certificate for MSCA profiles
For Microsoft CA profiles configured with the SCEP enrollment method, a new Re-generate RA Certificate button is now available on the Profile details page. This will help you regenerate the RA certificate used by the solution to decrypt SCEP requests before submitting request to the Microsoft CA for certificate issuance. This enhancement helps you to:
Prevent issues caused by an expiring RA certificate that may not be automatically renewed by DigiCert® Trust Lifecycle Manager.
Generate a new RA key and certificate for a profile at any time, by supporting compliance with internal security policies.
Custom certificate serial number size
A new option in the profile wizard allows you to select a smaller serial number size (16 to 19 bytes) instead of the default 20 bytes (40 hexadecimal characters) for profiles configured with any of the three generic base templates.
This feature is useful when you want to reduce the size of a certificate, particularly in IoT use cases. However, DigiCert recommends using the default serial number size of 20 bytes, as it offers better security and reduces the possibility of serial number collisions.
Profiles listing feature for DigiCert Trust Assistant scripts
Enhanced the DigiCert® Trust Assistant's Discovery & Automation tools > Scripts page to support a new Profiles configured with this script action. This action is added for every script and shows all the associated profiles configured with that script.
Sensor release v3.9.8
New Trust Lifecycle Manager sensor release with the following updates:
Bug fixes
Stability and vulnerability updates
Fixes
Unable to delete certificate owner
Resolved an issue that prevented deleting a certificate owner if the contact being deleted had the email address of a previously removed contact.
Unable to update certificate owner in certificate details page
Resolved UI issue when updating certificate owners via the Inventory > Certificate details page.
Unable to revoke certificates in bulk
Resolved an issue that was preventing bulk revocation of certificates when using Inventory 2.0 from the new certificate list page.
Resolved an issue that prevented bulk revocation of certificates when using the new Inventory UI -certificate list page.
Download custom report issue
Resolved issue where users were unable to download custom or scheduled certificate reports after they were generated.
Public S/MIME duplicate certificate issue
Resolved an issue where the duplicate check did not consider seat type or profile, causing issuance to fail for the same DN across different seat types. The logic now includes seat type or profile when performing duplicate checks.
July 18, 2025
DigiCert® ONE version: 1.10498.10 | Trust Lifecycle Manager: 1.4577.0
Fixes
CertCentral subdomain validation failures
Resolved an issue where CertCentral subdomains were not allowed to be submitted as part of web-based enrollment requests, even though the parent base domain had already been approved in CertCentral. The issue was introduced in the July 16 release, which implemented upfront CertCentral domain validation but considered only base domains.
July 17, 2025
DigiCert® ONE version: 1.10498.9 | Trust Lifecycle Manager: 1.4574.0
Fixes
DV flow failures on Linux sensor or agent
Resolved an issue where DV flow was failing for the Linux sensor or agent.
July 16, 2025
DigiCert® ONE version: 1.10498.8 | Trust Lifecycle Manager: 1.4572.0
Included in this release:
New
New inventory page and revamped table component
With this release, DigiCert® Trust Lifecycle Manager introduces the new Inventory page, delivering enhanced functionality and a more intuitive user experience. Access to the Inventory page is available only if the feature is enabled for your account. This includes the following:
Streamlined interface: A cleaner layout with improved readability for more straightforward actions and data review.
Enhanced filters and Views: Quickly find what you need with robust filtering and customizable views.
Customizable table: Customize the table view to your workflow by displaying only the data that matters most, and resize or reorder columns as needed.
Clear bulk actions: Easy-to-find actions designed to help first-time users navigate all inventory options.
Total counters: New cards dynamically display total counts based on the applied table filters.
Enrollments: The Enrollments menu option has been moved to a dedicated tab within the Inventory page for ease of management.
For more information, refer to Inventory.
The new table component has also been implemented on most other pages that display lists in table format.
Note
You will not see these updates if your organization has chosen to continue using the legacy inventory and tables. The legacy displays will be decommissioned on August 30, 2025, after which all remaining accounts will automatically migrate to the new interface. To learn more and prepare for the transition, refer to Inventory (Legacy).
DigiCert Trust Assistant v1.2.6
The DigiCert® Trust Assistant v1.2.6 release introduces the following new features:
Delete inactive certificates
Profile administrators can now configure an option for DigiCert Trust Assistant to delete inactive certificates and their associated private keys from the target keystore upon successful enrollment or renewal. This is particularly important for hardware tokens where storage space is premium.
Inactive certificates are defined as those with expired, revoked, or superseded (already renewed) status. Authorized profile administrators configure this option when setting up a profile with DigiCert Trust Assistant and any supported authentication method.
Note
This feature is not available for profiles configured with a Key encipherment, Key agreement or Data encipherment key usage extension to avoid accidentally deleting an encryption certificate and losing the ability to decrypt associated data.
AD publishing script for macOS machines
New Active Directory Publisher system script for domain-joined macOS machines is available under the Discovery & Automation tools > Scripts menu option. Like any other system script, it executes after a successful certificate enrollment, renewal, or recovery operation. From this release onward, the script can be bound to profiles configured with the DigiCert Trust Assistant enrollment method.
UI updates for the post-processing configuration section
With this release, profile administrators can now manage post-processing configuration settings directly from the UI, such as:
Enable or disable the Always Sign or Always Encrypt options directly from the UI. DigiCert Trust Assistant will automatically apply these settings upon successful certificate enrollment, renewal, or recovery for the Outlook script.
Configure an Active Directory FQDN directly from the UI for the macOS AD publishing script.
Outlook script enhancements
The enhanced Outlook system script now supports:
Multiple security profiles without requiring deletion of existing Outlook settings.
Configuration of multiple Outlook accounts on a single end-user machine.
Adobe terms and conditions
Support for displaying Adobe terms and conditions to users via the DigiCert Trust Assistant UI. Users must explicitly accept these terms before proceeding with the issuance or renewal of an Adobe Individual certificate on a hardware token. This applies to profiles configured with the DigiCert ONE Login authentication method.
Yubico management key encryption
DigiCert Trust Assistant now supports all the key combinations for Yubico management key encryption.
Domain validation for public-facing enrollments
For CertCentral public TLS Server CSR-based certificate requests, the submitted domain(s) are now validated against the list of validated domains in your CertCentral account. If all the domains are found in the validated list, the enrollment process continues. Otherwise, an error is displayed indicating the domain(s) that have not been validated.
Enhancements
Multivalue support for custom attributes
Enhanced custom attributes of the Dropdown field type to support setting multiple values via the UI and REST API.
Additionally, REST API-enabled profiles can now be configured with custom attributes of both Text field and Dropdown types. As part of this release, existing API endpoints have been enhanced and new endpoints introduced, as follows:
Enhanced the
certificateandredeemendpoints to support the submission of custom attribute values.Introduced two new APIs to add and delete custom attributes assigned to a certificate.
PUT /mpki/api/v1/custom-attributes/certificate/{id}- to add custom attributes for a certificateDELETE /mpki/api/v1/custom-attributes/certificate/{id}- to delete custom attributes associated to a certificate
For more details, refer to API documentation.
Fixes
Internal server error when issuing via CSR with SAML IdP
Resolved an issue where manual enrollments were not being issued after approval if large internal notes were present. This has been fixed by splitting the Internal notes section under the Certificate details > Additional details tab into two separate sections:
Internal notes: Displays notes set against a certificate at the time of import
Enrollment notes: Displays the enrollment notes set during manual approval of an enrollment.
Error when manually approving a request
Resolved an issue where PUT requests failed when cookies were not accepted during login to Trust Lifecycle Manager. For example, saving a profile or approving an enrollment request failed.
July 9, 2025
DigiCert® ONE version: 1.10498.4 | Trust Lifecycle Manager: 1.4540.0
Included in this release:
New
Profile v3 API endpoints
With this release, Trust Lifecycle Manager introduces new version v3 of the GET profiles API endpoints to address inconsistencies in the Subject DN metadata for profiles based on the Public S/MIME Secure Email via CertCentral base template. With the v3 endpoints, these profiles now return multiple=true for the Subject DN given_name and surname fields, ensuring consistency with all other profile types.
For organizations with profiles based on the Public S/MIME Secure Email via CertCentral base template, DigiCert recommends switching to version v3 of the GET profiles endpoints to ensure consistent results and avoid data conversion issues that may impact certificate issuance workflows.
For more information, refer to the API reference.
Additional DNS integrations
DigiCert® Trust Lifecycle Manager now supports 150+ new DNS integrations that you can use for domain validation in automation flows for both DigiCert agents and sensors.
These new DNS integrations include Akamai EdgeDNS, Azure DNS, Constellix, Google Cloud, Sonic, and many more.
Enhancements
Support additional EKUs for ECDSA profiles
Updated the three "Generic" base templates to support the following Extended Key Usages (EKUs) for profiles configured with the ECDSA key type:
Key enciphermentData encipherment
Note
These EKUs are supported for legacy compatibility. However, DigiCert strongly recommends using the Key agreement EKU for ECDSA-based profiles instead of Key encipherment or Data encipherment.
Display email addresses for certificate owners
Enhanced the public-facing and self-service portal pages to display the email addresses of certificate owners.
Removal of custom identifiers for certificate owners
As an administrator, you can now remove custom identifiers when adding or updating a certificate owner from the Account > Settings > Contacts > Certificate owners page.
Public S/MIME for Intune support for "Secure Email for Business"
Updated the Public S/MIME Secure Email for Intune (via CertCentral) base template to support the Secure Email for Business (sponsor-validated) certificate type for both Multipurpose and Strict generation certificates.
Internal notes in certificate details
Enhanced the Inventory > Certificate details pages to show internal notes added by administrators for enrollment requests that are manually reviewed and either approved or rejected. These notes are shown in the Additional details > Internal notes section of the certificate details.
Fixes
Unlimited expiration of enrollment code for CSV upload flow
Resolved an issue where the unlimited expiration setting for enrollment codes was not applied to enrollments submitted through the CSV upload flow.
Network scans not completing
Resolved an issue where network scans remained stuck in the In progress status and failed to complete as expected.
Admin web request with ECDSA not working for AWS ACM
Resolved an issue where certificate delivery to AWS Certificate Manager (ACM) failed with error message CSR Generation failed when using the Admin web request enrollment method with the ECDSA key algorithm.
July 1, 2025
DigiCert® ONE version: 1.10272.9 | Trust Lifecycle Manager: 1.4501.0
Included in this release:
Enhancements
Public S/MIME for Intune support for Multipurpose generation certificates
Updated the Public S/MIME Secure Email for Intune (via CertCentral) base template to support Multipurpose generation certificates prior to the deprecation of Legacy generation certificates. Currently, Multipurpose generation only works with the organization-validated CertCentral Secure Email for Organization product type, where the Subject DN common name (CN) field will contain your validated email address.
Warning
Important notes:
You must create a new Intune Multipurpose profile before the Legacy generation certificate deprecation deadline (July 10, 2025).
If you do not create a new profile before the deadline, your Legacy profile will be automatically converted to use Multipurpose certificates and the CertCentral
CertCentral Secure Email for Organizationproduct type.Support for sponsor-validated S/MIME certificates will be added in a subsequent release.
Upfront CSR validation
Updated the CSR parsing logic for profiles configured with the CSR enrollment method and Manual Approval authentication method. The system now performs upfront validation of the following items at the time of request submission, instead of failing at the time of issuance or when downloading the certificate after approval:
Duplicate certificates
MD5 signing algorithm
Fixes
Exception while fetching the certificate from Microsoft CA
Resolved an issue where requests for private server certificates through a Microsoft CA connector failed with the following error message:
Exception occurred while fetching the MS CA certificate, Please try again!
Seat creation time in the future
Resolved an issue where the seat creation time sometimes showed a time in the future. Seat creation times are now shown in GMT format.
Intune connector not available
Resolved an issue where the Intune connector type was not available unless the Automation account feature was enabled for your account. From this release, Intune connectors only require the Connectors account feature.
Profile details page not responding
Resolved an issue with the profile details page not responding due to an incorrect internal permission.
June 25, 2025
DigiCert® ONE version: 1.10272.7 | Trust Lifecycle Manager: 1.4478.0
Included in this release:
New
Policy-based rules for assigning custom attributes, owners, and tags to discovered certificates
With this release, Trust Lifecycle Manager introduces a new feature under Policies > Rules that allows administrators to configure rules to conditionally assign custom attributes, certificate owners, and tags to discovered or imported certificates.
Each rule defines the following options:
Conditions: Which certificates to assign the metadata to, based on certificate attributes such as the CA vendor, security rating, subject DN, issuing CA, and cryptographic properties. Multiple conditions can be combined using AND/OR operators.
Assignments: The metadata fields to assign to the matching certificates, which can include a mix of custom attributes, certificate owners, and tags.
Targets: The source of the imported or discovered certificates, which can include connectors, network scans, or system scans.
Once the rule is created, all subsequent import or discovery operations on the defined targets will automatically apply the metadata assignments to any certificates that match the conditions.
For more information, see Assignment rules.
Enhancements
DigiCert ONE Clients 1.2.0
DigiCert ONE Clients 1.2.0 is now available for download from the Discovery & Automation Tools > Client Tools page.
For more details, refer to DigiCert ONE Clients release notes.
June 24, 2025
DigiCert® ONE version: 1.10272.5 | Trust Lifecycle Manager: 1.4469.0
Included in this release:
Enhancements
Enable automation for endpoints with IP Unreachable status
Automation actions are now enabled for endpoints listed in the Inventory > Unsecured view with an IP Unreachable automation status. This allows users to proceed with automation workflows on such endpoints, even if certificate discovery is unsuccessful.
Redirect port field removed for port 443 endpoints
While automating an unsecured endpoint on a Citrix appliance, the automation flow previously required a Redirect port, as Citrix uses this to convert HTTP to HTTPS (using the redirect URL as a bridge). However, since 443 is the default HTTPS port, users typically do not create HTTP endpoints on port 443. Additionally, in some cases, an HTTPS endpoint might already exist on port 443 without a certificate, requiring a certificate to be installed on the same port.
With this release, the Redirect port field has been removed from the Create automation page for Citrix endpoints using port 443.
Fixes
Self-service portal - additional download options
Resolved an issue where users were unable to download certificates from the self-service portal when selecting a certificate format under the Show additional download options section.
CSR enrollment failure for CertCentral connector
Resolved an issue where certificate issuance failed for CertCentral Public Server Certificate profiles using the CSR enrollment method if the submitted CSR did not include a SAN:dnsName. The issue was addressed by adding a checkbox in the profile configuration wizard to specify whether the SAN:dnsName field is required or optional (default is required). From this release, the certificate will be issued if the SAN:dnsName field is configured as optional, regardless of the source.
Internal server errors in CertCentral certificate requests for domains pending validation
Resolved an issue where users encountered an "Internal server error" when requesting a CertCentral Public Server Certificate for one or more domains in the pending validation state. These requests now display a friendly error to identify the cause of the error and indicate the domains that are pending validation.
Warning
Until all domains have been validated, the request will not go through and the certificate will not be issued.
June 18, 2025
DigiCert® ONE version: 1.10272.3 | Trust Lifecycle Manager: 1.4450.0
Included in this release:
New
Intune support for the Generic Private Server Certificate base template
From this release, the Intune integration now supports issuance of private server certificates via SCEP. To enable this, you need:
An Intune connector with your Intune tenant credentials to use for authenticating SCEP-based enrollment requests.
A certificate profile created from the
Generic Private Server Certificatebase template, configured with enrollment methodSCEPand authentication methodAzure Authusing the Intune connector.
In the Intune portal, you need a SCEP profile that corresponds to the certificate profile in Trust Lifecycle Manager.
For more details, refer to the Microsoft Intune SCEP integration guide.
Jamf Pro API integration with Trust Lifecycle Manager
Announcing the tight API integration of Jamf Pro with Trust Lifecycle Manager, in addition to the existing SCEP integration. Both integrations work to facilitate certificate issuance through your Jamf Pro mobile device management (MDM) environment.
For detailed setup instructions, refer to the Jamf Pro integration guide.
Enhancements
New comment section in certificate renewal form
Added a new Comments section to the certificate renewal page for manual approvals. When you receive the Your certificate is about to expire email (sent according to the profile configuration), you can now provide comments directly as part of the renewal process.
Fixes
Public S/MIME enrollment timeouts
Resolved timeout issues when requesting Public S/MIME certificates via instant flows, such as profiles configured with the REST API enrollment method.
Failure with EST profile creation
Resolved an issue that prevented creating or editing profiles using the EST enrollment method and Enrollment Code authentication method when no IP address was set in the allowed or blocked list.
Revocation requests with non-email address in Seat ID
Resolved an issue where revocation emails were not received by end users when certificates were revoked via API and Seat IDs contained non-email values. The system now checks for valid email addresses in other seat metadata (for example, Seat Email) or certificate fields (for example, SDN:email, SAN:rfc822Name), if available, instead of failing.
CertCentral Server SAN:dnsName field added to cert even though field is set as optional in the profile
Resolved an issue with the SAN:dnsName field being added to signed certificates associated with the CertCentral Public Certificate or CertCentral Private Certificate templates, even when the profile had the field set as optional. To address this issue, the profile configuration has been enhanced with the following functionality:
Added the Auto-copy to SAN:dnsName:
Yescheckbox as a default, disabled setting.The certificate preview will now show the DNS name even when it is not explicitly added as a SAN field in the profile.
Adobe Individual enrollment failure when multiple values are requested
Resolved an issue where Adobe Individual certificate requests failed when the profile was configured with the Given Name (GN) or Surname (SN) fields set to Multiple (the default configuration), but the request contained a single value.
From this release, the Multiple checkbox for GN and SN fields in Adobe Individual profiles has been removed. These fields now only support single values, as CertCentral supports only one value per field. For API requests that include an array of values, only the first value will be processed and all others will be ignored.
June 11, 2025
DigiCert® ONE version: 1.10272.2 | Trust Lifecycle Manager: 1.4416.0
Included in this release:
Enhancements
PKI Platform 8 connector - Partner Lab selection
Enhanced the DigiCert® PKI Platform 8 connector to support selecting the PKI Platform 8 system: either Production or Partner Lab. The Partner Lab option is available for customers with access to a test account in the Partner Lab environment.
IP allowlisting for EST profiles configured with passcode authentication
Added support for IP allowlisting on profiles configured with the EST enrollment method and the Enrollment Code authentication method. Devices submitting certificate requests via the EST protocol and authenticating with an enrollment code (passcode) can now be checked against an allowlist of valid IP addresses before certificate issuance. Configure the allowed devices in the Valid list of IP addresses section of the profile wizard.
Note
This feature is already supported for EST profiles configured with the TLS Certificate Auth authentication method.
Public key thumbprint and CSR hash
Updated the Certificate Signing Request (CSR) details pop-up to include the Public key thumbprint and CSR SHA-256 hash values. This pop-up is accessible from the Enrollment > Enrollment details pages (used by admins to manage enrollment requests) and from the public-facing enrollment pages.
The Inventory > Certificate details pages have also been updated to include a new property field called Thumbprint (SHA-256).
Audit log enhancements
Enhanced the Audit logs > Audit event details pages to reduce the amount of data stored per log event. Certificate-specific details are now available in a new siderail, allowing users to access this information separately. To open this new siderail, select the View certificate details link at the bottom of the event details page for a certificate.
Fixes
Incorrect trust type shown for profiles in the self-service portal
Resolved an issue where certificate requests created using the CertCentral Public Server Certificate base template displayed an incorrect Trust type value under the Certificate requests tab in the authenticated self-service portal.
June 4, 2025
DigiCert® ONE version: 1.10272.1 | Trust Lifecycle Manager: 1.4390.0
Included in this release:
New
DigiCert ONE Terraform provider
Announcing the release of the DigiCert Terraform Provider, enabling DevOps and platform engineering teams to seamlessly automate and manage the full lifecycle of DigiCert digital certificates using Infrastructure as Code (IaC) practices with Terraform.
Key features
Certificate request automation
Automate the issuance of SSL/TLS and other digital certificates from DigiCert across environments directly through Terraform.
Lifecycle management
Manage the entire certificate lifecycle, including requesting, renewing, and revoking certificates through declarative Terraform configurations.
API integration
Integrate with DigiCert® Trust Lifecycle Manager APIs to provide secure and policy-compliant automation aligned with enterprise requirements.
Stateful tracking
Use Terraform state to track issued certificates and changes across deployments.
Use cases
Automate certificate issuance as part of CI/CD pipelines.
Enforce consistent certificate configurations across cloud infrastructure.
Eliminate manual certificate renewal tasks.
Rotate certificates easily for compliance or security reasons.
Support for minimum validity for duplicate certificates
With this release, the CertCentral Public Server Certificate template supports a new flow option to set the Duplicate minimum validity days. This option allows users to specify the minimum number of days a duplicate certificate must be valid when requested from CertCentral.
The following enrollment methods support this new option:
DigiCert sensorDigiCert agent3rd-party ACME clientAdmin web request
Enhancements
Self-service portal - Certificate times in 24-hour format
Certificate times in the self-service portal are now displayed in 24-hour format.
Audit log enhancements for SCEP
Audit logs now include the Seat ID value in failure events related to duplicate seat creation errors during SCEP operations.
Support for filtering certificates with no tags
Introduced an option to select Not available in the tag filter to display certificates that do not have any tags attached.
Optional key type and key size selection for 3rd-party ACME
Introduced an option to select key type and key size for 3rd-party ACME client flows in profiles created from the CA Manager Private Server Certificate template. This enables users to select additional key usages when available. For example, if the key type is set as RSA, users can select "Key encipherment" as a key usage.
Fixes
Generic permissions error for "User and certificate manager" role
Resolved an issue where users assigned the User and certificate manager role encountered a generic permissions error when attempting to view certificate profiles or approve enrollment requests.
AWR creates single SAN when multiple are entered for Microsoft CA
Resolved an issue with adding the common name (CN) as a SAN in Microsoft CA AWR flows.
Certificates by CA vendor dashboard does not direct to inventory
Resolved an issue where the Certificates by CA vendor dashboard chart was not clickable and did not support drill-down into the Inventory view.
May 29, 2025
DigiCert® ONE version: 1.10046.9 | Trust Lifecycle Manager: 1.4361.0
Included in this release:
Enhancements
Updated PQC Dilithium OIDs
Updated the supported Dilithium ML-DSA OIDs to the final/approved set:
MLDSA-44:
2, 16, 840, 1, 101, 3, 4, 3, 17MLDSA-65:
2, 16, 840, 1, 101, 3, 4, 3, 18MLDSA-87:
2, 16, 840, 1, 101, 3, 4, 3, 19
Agent version 3.1.0
This agent update includes stability fixes and foundational enhancements to support future updates aimed at improving automation capabilities.
Fixes
Custom seat report failing with seat type filter
Resolved an issue where custom seat reports failed to generate when a Seat type filter was applied from the Seats page.
Custom certificate report ignoring CA vendor filter
Resolved an issue where custom certificate reports did not apply the CA vendor filter when selected from the Inventory page.
CSR enrollment failing for MSCA certificates with 4096-bit key size
Resolved an issue where 4096-bit key size enrollment failed for Microsoft CA certificate profiles due to the system incorrectly expecting a 2048-bit key size.
May 21, 2025
DigiCert® ONE version: 1.10046.5 | Trust Lifecycle Manager: 1.4342.0
Included in this release:
New
Support for DigiCert On-prem CA connector
With this release, DigiCert® Trust Lifecycle Manager introduces support for DigiCert On-prem CA as a new certificate authority (CA) connector. You can use this connector to issue and revoke certificates from your DigiCert On-premises Private CA, using the following profiles:
CA Manager Private Server CertificateCA Manager Private mTLS Certificate
The DigiCert On-Prem CA connector also supports certificate discovery from the on-premises CA through:
Full import when discovery is enabled
Periodic incremental import
Revocation status updates for existing certificates in Trust Lifecycle Manager inventory
Warning
To set up this integration, the DigiCert On-prem CA feature must be enabled for your account. Contact your DigiCert system administrator or account representative if you need help.
DigiCert Trust Assistant v1.2.5
The DigiCert® Trust Assistant v1.2.5 release includes the following enhancements and fixes.
Enhanced deliver escrowed certificates for matching enrollment requests option
Profile administrators can now enable the Deliver the escrowed certificate for matching enrollment requests option. This option is available for DigiCert Trust Assistant enabled profiles that are configured with the DigiCert ONE Login authentication method. When enabled, the same escrowed certificate (with the same serial number) is delivered to the end user after recovery. A new escrowed certificate (with a different serial number) is not issued. To use this feature, the following profile settings must be set:
Duplicate certificate: Checkbox not selected
DigiCert Cloud Key Escrow: Checkbox selected
Fixes
Resolved a timeout error that occurred during the first connection to the DigiCert backend when users signed in via DigiCert Trust Assistant.
Resolved an issue where a Sign-in process expired error was incorrectly displayed during a successful sign-in via DigiCert Trust Assistant.
Enhancements
Public S/MIME profile wizard enhancements
For profiles created from the Public S/MIME Secure Email (via CertCentral) base template, the profile wizard's clone and edit pages have been enhanced to allow all fields to be edited, including the Generation type. This enhancement allows selection of the Multipurpose or Strict generation types. These replace the soon-to-be-deprecated Legacy generation type.
Custom seat reports
Enhanced the custom reports for seats to support the Email address and Consumed fields.
Fixes
Inventory showing duplicate records
Resolved an issue where duplicate records appeared in the inventory when a network scan or agent discovered the same certificate.
Path length 0 for external private CA
Resolved an issue where setting the Basic Constraints extension with a Path length of 0 (indicating the end of the certification chain) was not supported. Additionally, a tooltip has been added to provide information about this value. It indicates that if the Path length value is left empty, the Path length will have a value of none.
May 15, 2025
DigiCert® ONE version: 1.10046.4 | Trust Lifecycle Manager: 1.4315.0
Included in this release:
Enhancements
Removal of non-ratified PQC keys/algorithms
Removed support for Composite and Falcon post-quantum cryptography (PQC) certificates, as these algorithms are still under active development and considered experimental. To learn more or test these PQC certificate types, visit the DigiCert LABS website.
Fixes
Enrollments page not loading for EST profiles
Resolved issue with loading the Enrollments page for customers issuing certificates from profiles configured with EST enrollment and the TLS Certificate Auth authentication method.
May 14, 2025
DigiCert® ONE version: 1.10046.3 | Trust Lifecycle Manager: 1.4309.0
Included in this release:
New
ServiceNow v1.7.0
ServiceNow app version 1.7.0 released for DigiCert® Trust Lifecycle Manager with the following new features and enhancements:
mTLS support on ServiceNow connector: The ServiceNow connector in DigiCert® ONE has been enhanced to optionally support mTLS certificate authentication for all connections to the target ServiceNow instance. Previously, only username and password authentication was supported.
Multi-format certificate download: Users can now download certificates in various formats directly from the Certificate details page, providing greater flexibility.
CSR update on renewal: Added the option to upload a new Certificate Signing Request (CSR) while renewing a certificate, providing more control over the renewal process.
Auto-approval for certificate renewals: Certificates within the renewal window can now be auto-approved when this feature is enabled in the associated profile, eliminating the need to manually approve renewals.
Microsoft CA Base Template: The
Microsoft CA Private Server Certificatebase template now supports theCSRenrollment method withManual Approval, which improves compatibility with Microsoft CA environments.Certificate enrollment flow: The Country Code field now uses a dropdown menu, enhancing accuracy and ease of use during the certificate enrollment process.
Compliance update / DigiCert Privacy Notice: A privacy notice has been added to all application pages to meet ServiceNow compliance requirements.
DigiCert AutoEnrollment Server v.2.25.1.1
This release of the DigiCert AutoEnrollment Server includes:
Enhancement: Upgraded the internal OpenSSL library to version 3.3.3.
Fix: Resolved an issue where the AutoEnrollment Server failed to run on Windows Server 2019 when the log level was set to
INFO.
Enhancements
Key recovery support for non-API profiles
Enhanced the certificate and recover API endpoints to allow the recovery of escrowed certificates for profiles that do not use the REST API enrollment method but have the DigiCert Cloud Key Escrow feature enabled.
Profile escrow option for DigiCert Trust Assistant - DigiCert ONE Login
For profiles configured with the below settings, a new option labeled Deliver the escrowed certificate for matching enrollment requests is now available under the Flow Options > Key escrow options > DigiCert Cloud Key Escrow section to allow delivery of the same escrowed certificate to end users for matching enrollment requests:
Enrollment method:
DigiCert Trust AssistantAuthentication method:
DigiCert ONE LoginDuplicate certificate: Checkbox not selected (The option is only available when this checkbox is not selected.)
DigiCert Cloud Key Escrow: Checkbox selected (This option is only available when the checkbox is selected.)
Deliver the escrowed certificate for matching enrollment requests: Checkbox selected
CertCentral domain validation check for web-based enrollments
Enhanced the web-based enrollment flow for public TLS server certificates requested from CertCentral to verify whether the requested domains have been prevalidated. If not, the following error is displayed before submitting the request:
Domains in email addresses must match a prevalidated domain in the CertCentral account. Check the following email address and try again: <email-address>
PKI Platform 8 CA connector - Seat ID value replication
Enhanced the DigiCert® PKI Platform 8 connector to match the Seat ID values from PKI Platform 8 when importing certificates into Trust Lifecycle Manager. Previously, Trust Lifecycle Manager assigned seat IDs for imported certificates using the common name plus a timestamp.
Important
If you already imported certificates from your PKI Platform 8 account into Trust Lifecycle Manager, and would prefer for the seat IDs to match the ones in PKI Platform 8, contact your DigiCert account representative for help.
For new imports, if the seat ID values in PKI Platform 8 match existing seat IDs already present in your Trust Lifecycle Manager account, the existing certificates and the newly imported certificates will be bound to the same seat IDs.
You can use the
certificate-searchAPI endpoint to search for imported certificates by seat ID and tags (if configured in the PKI Platform 8 connector). The response returns all associated certificates in an array.
Fixes
Truncated CN and dnsServer values on Enrollment details page
Resolved issue where common name (CN) and SAN:dnsServer values were truncated on the Enrollment details page for enrollment requests for certificate profiles that use the Manual Approval authentication flow.
Sensor version 3.9.7
This sensor update includes the following fixes:
Added support for organizations without a state value when used with NetScaler.
Resolved an issue where the Trust Lifecycle Manager plugin manager (TPM) would enter a panic state under specific conditions.
Agent version 3.0.16
This agent update resolves an issue where the TPM would enter a panic state in specific conditions.
Unable to cancel or delete enrollments with failed or rejected status
Resolved issue where users were unable to delete or cancel enrollments when the associated profile had been deleted. Users can now cancel the request.
SNI enabled agent is not able to parse large list of domains
Resolved issue where the agent failed to process large domain lists returned from custom SNI scripts.
May 7, 2025
DigiCert® ONE version: 1.10046.1 | Trust Lifecycle Manager: 1.4275.0
Included in this release:
New
Certificate owners
With this release, DigiCert® Trust Lifecycle Manager introduces a new feature that allows authorized administrators and users to create and manage certificate owners as additional contacts that can be associated with a certificate. This feature is supported for certificates associated with the following seat types:
Certificate management (excluding certificates issued from profiles associated with the
Microsoft CA User Certificatebase template)Discovery
Organization (excluding certificates issued from profiles associated with any of the
eIDASbase templates)Server
The email address of the certificate owner will be used to send certificate lifecycle notifications, such as renewal emails.
Where can I configure contact information for certificate owners?
You configure certificate owners from the Account > Settings > Contacts page, which now includes the following two tabs:
Admin: The admin contact details page.
Certificate owners: A new page where authorized users can create and manage certificate owners.
Who can view, create, and manage certificate owners?
The Account > Settings > Contacts > Certificate owners tab is visible only to users with the View certificate owners permission. Only administrators with the Manage certificate owners permission can create, edit, or delete certificate owners.
Trust Lifecycle Manager now includes a new Certificate owners manager user role. This role includes the Manage certificate owners permission and can be assigned to users who need to manage certificate owners.
How can I assign owners to a certificate?
You can assign owners to certificates in the following ways:
Certificate profiles: Admins can set owners within a certificate profile to assign the owners to every certificate issued or renewed from that profile.
Public-facing enrollment pages: For certificate profiles that use web-based enrollment methods (
Browser PKCS12,CSR, orDigiCert Trust Assistant), admins can use the following options to control whether users can assign additional owners at the time of enrollment:Allow assigning more owners: If enabled in the profile, the enrollment page includes a dropdown where the requester can select additional certificate owners from your account settings.
Allow creating/assigning custom owners: If enabled in the profile, the enrollment page includes an option for the requester to create a new owner and assign it to the certificate.
Self-service portal: To allow users to assign owners from the self-service portal, enable the Manage certificate owners action in the portal settings. If enabled, authenticated portal users can select Update certificate owners to manage the list of assigned owners for certificates they have access to.
REST API: You can manage and assign certificate owners via API for the following use cases:
Use the new Certificate owners API controller to view and manage owner contacts or assign owners to existing certificates in your account.
The
certificateendpoint now supports acert_owner_idsproperty in the JSON request body to assign one or more owners when issuing a certificate via API.For more details, refer to API reference for Trust Lifecycle Manager.
What will happen when I renew my certificate?
When you renew a certificate, it inherits certificate owners from the following sources:
The certificate being renewed.
The associated profile.
The certificate renewal form submitted by users, if the appropriate profile options are set.
For more information, see Certificate owners.
Enhancements
Additional delivery option for CertCentral Public Server Certificate template
Updated the CertCentral Public Server Certificate base template to support the PKCS#7 certificate delivery option for profiles configured with the REST API enrollment method. This option was previously supported for other web-based enrollment methods.
Qualys connector imports end entity certificates only
Enhanced the Qualys connector to import only end-entity certificates into inventory, excluding individual root and intermediate certificates.
Fixes
Hello API endpoint
Resolved issue where submitting a hello API request to a client-auth-enabled endpoint responded successfully even when no client certificate was included in the HTTP header. The endpoint now returns the error message JWS token is not provided if the certificate is missing.
MSCA - cannot issue more than 18 DNS SANs
Resolved issue with the character length limit that previously blocked the issuance of more than 18 DNS SANs. The new limit is now 100 SANs.
Admin web request fails to generate CSR
Resolved issue where the Admin web request enrollment flow failed to generate a CSR when the Subject DN contained an O field with a "/" character.
Connector flow is rating code signing and user certificates as not secure
Resolved issue where the Security rating was incorrectly evaluated for user, code signing, and user certificates.
Unable to add recipients to agent, sensor, scan, connector lifecycle notifications
Fixed regression issue where the Trust Lifecycle Manager web console did not allow adding new recipients to agent, sensor, scan, and connector notifications.
Automation notification not honoring the recipient list
Resolved issue where automation notifications were not being sent if the "Requester" was removed from the recipient list.
MSCA connector not reporting correct MSCA certificates
Resolved issue where managed certificates were incorrectly appearing under the "Discovered" category in the connector details page.
April 30, 2025
DigiCert® ONE version: 1.9735.9 | Trust Lifecycle Manager: 1.4248.0
Included in this release:
New
DigiCert Trust Assistant v1.2.4
The DigiCert® Trust Assistant v1.2.4 release includes the following new features.
Multi-language support
From this release, DigiCert Trust Assistant supports multiple languages across all pages and messages within the client.
If a translation for a new label or message is unavailable, the default language is English.
The user interface automatically reloads when a different language is selected.
Supported languages are English, Dutch, French, German, Italian, Japanese and Spanish.
Automated configuration enhancements
The extra-config.json file has been enhanced to allow administrators to configure new options that can be pushed to the users via GPO or any software distribution solution:
dcTlsClient>timeoutSecConfigure network timeout duration for the DigiCert Trust Assistant client.
{ "setting": { "dcTlsClient": { "timeoutSec": <timeout in seconds> } } }PostScriptService>msTimeout-Configure the timeout value for the execution of post-processing client scripts
"services": [ { "name": "PostScriptService", "setting": { "msTimeout": <timeout in milliseconds> } } ] }CertMgmtService>notifyAfterEnrollRenewRetryCountDefine the number of auto-enroll/auto-renew retry attempts before displaying a failure notification to the user within the DigiCert® Trust Assistant dashboard. Each retry occurs at a 5-minute interval. If the operation succeeds during any retry, no notification is shown to the user. Even after a failure notification appears, DigiCert® Trust Assistant continues to retry silently every 5 minutes until the job succeeds. Once successful, the notification is automatically cleared, and subsequent executions follow the default 24-hour schedule.
{ "services": [ { "name": "CertMgmtService", "setting": { "notifyAfterEnrollRenewRetryCount": <retry count (default 5)> } } ] }Note
The notification is not pushed to the operating system’s notification center. Users will only see it if they explicitly open the DigiCert Trust Assistant dashboard.
Windows start menu - Launch DigiCert Trust Assistant dashboard with ease
You can now quickly open the DigiCert Trust Assistant Dashboard directly from the Windows Start menu using the new DigiCert Trust Assistant – Open Dashboard shortcut. This provides one-click access to the Dashboard.
Post-processing script certificate recovery enhancements
For profiles configured with the Digicert Cloud Key Escrow option, the DigiCert ONE Login authentication method and the auto-recovery feature, the scripts assigned to the profile are executed automatically upon successful auto-recovery (either via sign-in or initial sign-up). The key updates include:
Only valid (non-expired) certificates are considered.
If multiple certificates are recovered from the same profile, the script runs against the one with the longest validity, skipping the rest.
If auto-recovery succeeds, an Auto recovery success message is shown in the Notifications pane.
If auto-recovery succeeds but post-processing fails, a Failed post-processing scripts message appears in the Notifications pane, along with a link to Rerun failed scripts. This notification and link are no longer shown for the expired certificates.
Archive report enhancements
The archive report has been updated with the following enhancements:
A new UI option allows users to select the date and time for generating an encrypted ZIP file, which can be used to diagnose issues.
A new option is added to change the Log level value to
Detailed - Debug level.Display the file path where the ZIP file will be saved.
GCP unified connector - Support for application default credentials
From this release, the Google Cloud Platform (GCP) unified connector now supports an additional authentication option to allow users to configure the application default credentials so the sensor can use one of the following sources configured on the sensor host:
A service account key JSON file whose path is defined in the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable.A credentials file created using the
gcloud auth application-default logincommand and placed in the well-known path.
This approach enables users to manage credentials locally on the sensor used for integration. When configuring the connector, select Authentication type > Application default credentials.
Enhancements
Show CertCentral order id in certificate details
This enhancement applies only when the Automation feature is enabled for your account.
Added the CertCentral order ID for each certificate issued through the linked CertCentral account. To view the order ID in your Trust Lifecycle Manager inventory, select the certificate > Automation.
Enhanced SAN input user experience for automation flows
Added a new Add button to allow users to explicitly add SAN attributes without using the Enter key. This update applies to both certificate delivery and lifecycle automation flows.
Fixes
Renewal notifications
Resolved issue where certificate renewal reminder emails were sent 90 days before expiry, even when the default renewal window in the profile wizard was set to 30 days.
Entrust connector fails to import certificates
Resolved issue where the Entrust connector would fail if one of the certificates being imported had an issue. The connector has been updated to skip such certificates and proceed with importing the others.
Microsoft CA issuance not working for REST API flows
Resolved issue where Microsoft CA issuance was failing for the REST API enrollment method.
April 24, 2025
DigiCert® ONE version: 1.9735.7 | Trust Lifecycle Manager: 1.4217.0
Fixes
Public S/MIME (CertCentral) key escrow failing due to parsing error
Resolved issue with the recovery of public S/MIME escrow certificates that failed due to an internal parsing error in enrollment flows configured with the Digicert cloud key escrow profile option.
April 23, 2025
DigiCert® ONE version: 1.9735.5 | Trust Lifecycle Manager: 1.4215.0
Included in this release:
New
Key escrow and recovery for PQC certificates
Added support for the DigiCert cloud key escrow feature for post-quantum cryptography (PQC) certificates issued through Trust Lifecycle Manager. Supported PQC key types and algorithms include:
Dilithium
Falcon
SPHINCS+
To enable the cloud key escrow option for PQC certificates, create certificate profiles from one of the following base templates. Enable escrow in the Flow options section of the profile.
Private Secure Email S/MIMEGeneric User Certificate
Warning
Known issue: PQC certificates that contain the Unique Identifier field in the SAN extension are not being successfully recovered.
Support for UltraDNS
With this release, Trust Lifecycle Manager introduces support for UltraDNS as a DNS integration. The UltraDNS connector can be used to automate domain validation for the same enrollment methods as the other DNS connectors.
Enhancements
Support for Email and IP address fields for Microsoft CA certificates
The Microsoft CA Private Server Certificate template now supports Email and IP address attributes in the Subject DN and SAN fields.
Fixes
DigiCert Trust Assistant - Script removal from profile
Resolved issue where DigiCert® Trust Assistant scripts were not removable from associated profiles.
Custom role for add connector needs manage profile permission
Resolved issue where the Manage profile permission was incorrectly required to use the Add connector flow.
Private CA chaining issues when multiple ICAs are present
Resolved issue with the chaining logic when multiple intermediate CAs (ICAs) are present and signed by the same private CA root.
MSCA connector stuck in running state
Resolved issue with CA connectors where the connector remained in the Running status when the certificate Import option was disabled on the configured connector.
April 17, 2025
DigiCert® ONE version: 1.9735.4 | Trust Lifecycle Manager: 1.4183.0
Included in this release:
Enhancements
Public S/MIME Legacy warning and profile changes
As part of the Public S/MIME initiative to remove support for Legacy generation certificates on July 1, 2025 (see Knowledgebase article), the profile creation wizard now displays a warning if you select the Legacy generation option when creating a Public S/MIME certificate profile. The warning reminds users of the sunset date for Legacy certificates and strongly recommends choosing Multipurpose or Strict generation instead.
Fixes
Authenticated self-service portal errror
Resolved issue with accessing the authenticated self-service portal where, after successfully authenticating via single sign-on (SSO) to an identity provider (IdP), the portal was displaying a blank page with an im_auth_error messsage.
April 16, 2025
DigiCert® ONE version: 1.9735.3 | Trust Lifecycle Manager: 1.4177.0
Included in this release:
New
Workspace ONE integration with Digicert
Announcing the formal qualification of Omnissa’s WorkSpace ONE integration with DigiCert® Trust Lifecycle Manager, supporting a tight API integration for issuance of escrowed certificates.
For more details, see API integration guide.
Enhancements
SID extension for Citrix FAS Smartcard Logon
Updated the Citrix FAS Smartcard Logon based template to support the issuance of certificates including a Security Identifier (SID) extension (OID: 1.3.6.1.4.1.311.25.2).
Intune connector "Action needed" status
Enhanced the Microsoft Intune connector to capture error flows that occur after deleting a secret from the Azure portal and attempting to sync devices. From this release, the associated profiles are updated to the Action needed status. Failure audit log events are generated with the following message:
Unexpected error occurred during validation – update connector.
DigiCert Trust Assistant Enhancements
Outlook script - software not installed
Updated the error message displayed when Outlook is not installed on a target user's machine where the DigiCert® Trust Assistant attempts to execute the Outlook post-processing script, to include a reference to the required version: Outlook 2016 (64-bit). The following is the new error message:
Outlook is not installed. Make sure Outlook 2016 (64-bit) is installed on the target machine. Reach out to your administrator for further assistance.Active Directory (AD) publisher script - updated status for previously published certificates
Updated the AD Publisher script to show the status as
Completedinstead ofFailedwhen publishing a certificate that had already been published by a previous enrollment flow.
Fixes
Missing Subject DN and SAN fields section
Resolved issue with the Subject DN and SAN fields section not being shown after editing a profile configured with the CSR enrollment method, using the CertCentral Private Server Certificate template.
PKI Platform 8 connector
Resolved an issue where import attributes were not allowed in a new connector if they were set in a previous connector in an inactive state.
April 9, 2025
DigiCert® ONE version: 1.9735.2 | Trust Lifecycle Manager: 1.4152.0
Included in this release:
Enhancements
Intune S/MIME encryption certificates and template name change
Updated the Public S/MIME (Digital Signature only) for Intune (via CertCentral) template and renamed it to Public S/MIME for Intune (via CertCentral). This template now supports issuance of non-escrowed encryption certificates in addition to digital signature certificates. The template scope is now set to Unlimited, making it accessible to all customers.
Deprecation of Public S/MIME Secure Email (via PKI Platform 8) template
Removed the Public S/MIME Secure Email (via PKI Platform 8) base template, as PKI Platform 8 no longer supports the issuance of Public S/MIME certificates. From this release, Public S/MIME certificates must be issued using the equivalent base templates available in CertCentral. These templates use trusted public issuing CAs configured on real CertCentral accounts. Ensure your system is connected using a DigiCert CertCentral connector. For setup information, see Link to CertCentral.
Profile validity period
Additional validations have been added when setting the certificate validity period in a profile. If the defined validity period is more than the validity allowed by the base template and the expiration date of the associated issuing CA, then the following error message is displayed:
You have exceeded the max validity period for the certificate template or the issuing CA. We will round the value to match the maximum validity period.
CertCentral connector - Connect multiple CertCentral accounts via DigiCert single login
You can now add multiple CertCentral connectors for different CertCentral accounts via DigiCert single login. This enhancement allows admins to connect Trust Lifecycle Manager to multiple CertCentral accounts available from their DigiCert single login account.
GCP unified connector - Automate certificates for HTTP-to-HTTPS redirects
The Google Cloud Platform (GCP) unified connector now supports automating TLS certificate deployments for HTTP-to-HTTPS redirects for the following GCP load balancer types:
Global external Application Load Balancer
Global classic External Application Load Balancer
Regional external Application Load Balancer
Seat ID mapping support for SAN:URI
Updated the list of allowed profile fields for creating a Seat to include support for the SAN:URI (Uniform Resource Identifier) extension value.
Fixes
Missing Subject DN and SAN fields section
Resolved issue with the Subject DN and SAN fields section not being shown after editing a profile configured with the CSR enrollment method, using the CertCentral Private Server Certificate template.
April 2, 2025
DigiCert® ONE version: 1.9735.1 | Trust Lifecycle Manager : 1.4121.0
Included in this release:
New
Google Cloud Platform (GCP) support certificate delivery to certificate maps
GCP Unified Connector now supports certificate delivery to certificate maps configured in GCP Certificate Manager using the Admin web request function. With the enhanced GCP unified connector, user can deliver the certificate using the following options:
An existing certificate map with an existing certificate name.
An existing certificate map with a new certificate name.
A new certificate map with a new certificate name (created by DigiCert® Trust Lifecycle Manager during delivery).
Enhancements
Extended support for additional tag characters
You can now use letters (a–z, A–Z), numbers (0–9), number signs (#), spaces, colons (:), periods (.), ampersands (&), and at symbols (@) in addition to the existing characters, when setting tags . This enhancement helps you easily identify and manage certificates issued from specific profiles.
New system scan option for newly provisioned agents
With this release, DigiCert® Trust Lifecycle Manager introduces a new option under system Settings to enable and configure account-level system scans. This feature triggers a system scan on any newly provisioned agent. The scan runs only once after provisioning is complete, while subsequent scans can be configured in the same way as before this release.
Unassign business unit for discovered certificates
A user can take ownership of a discovered certificate by assigning it to their business unit. With this update, they can also move discovered certificates out of their business unit by unassigning them in case the assignment was made by mistake.
Support additional characters for user name in Qualys connector
Qualys connector configuration is enhanced to support additional special characters in the Username field. You can now use the following characters:
Alphanumeric (a–z, A–Z, 0–9)
Special characters: Plus sign (+), at symbols (@), period (.), underscore (_), and hyphen (-)
Intune connector URL validation
The Microsoft Intune Connector now includes enhanced validation logic for the Platform URL field. Administrators are required to enter only the domain, immediately following https://. This will avoid any misconfigurations of the URL upfront.
Fixes
Unable to add new Citrix ADC connector
Resolved issue with adding ADC connector when there is only one sensor in the account.
Sensor communication interval update missing in DigiCert® Trust Lifecycle Manager UI
Resolved issue with the sensor heartbeat interval update, ensuring users are informed when an update is in progress.
Nginx automation failing on Ubuntu 22
Resolved an issue where the agent installed on Ubuntu 22 failed to issue or renew certificates using NGINX due to missing client dependencies required for automation.
March 28, 2025
DigiCert® ONE version: 1.9525.8 | Trust Lifecycle Manager: 1.4106.0
New
Intune for Government Community Cloud High (GCCH)
Improved Intune service to support GCCH solution. The same Intune templates can be used for both standard Azure and GCCH platforms. However, you must enter the appropriate platform URL when configuring the Intune connector.
March 26, 2025
DigiCert® ONE version: 1.9525.6 | Trust Lifecycle Manager: 1.4096.0
Included in this release:
New
DigiCert Trust Assistant v1.2.3
The DigiCert® Trust Assistant v1.2.3 release includes the following new features and enhancements.
Extended proxy support
You can now configure additional HTTP(S) proxy settings through the UI or by using a configuration file (extra-config.json) pushed by your IT team. The new proxy configuration includes:
HTTP/HTTPS
Proxy Auto-Config (PAC) file
Authenticated proxy (basic auth only via username/password)
Enhanced user sign-in experience for DigiCert ONE Login
The user sign-in process for profiles configured with the DigiCert ONE Login authentication method has been enhanced. You are no longer required to manually join your IdP account with DigiCert ONE. Instead, you will be automatically redirected to your organization's single sign-on (SSO) page. Upon successful authentication, a DigiCert ONE user account is automatically created, and DigiCert® Trust Assistant will auto-enroll the user against the configured profiles. If users are already authenticated, this step is skipped.
Option to recover an existing certificate
For certificate profiles configured with Cloud Key Escrow and the
Allow duplicate certificatessetting enabled, a new default option has been introduced to recover the same issued certificate instead of issuing a new duplicate. This option is enabled by default for new profiles. For existing profiles, it remains disabled to preserve the current behavior of issuing new duplicates. This feature is available for certificate profiles configured with theDigiCert Trust Assistantenrollment method and the following authentication methods:Enrollment codeManual approvalSAML IdP
Configuration enhancements
Support additional attributes that can be configured through Windows Group Policy Objects (GPO):
Auto-update configuration
Block updates through CDN
Keystore disabling
Login session validity configuration for keystore
Custom keystore addition
Proxy settings configuration
Support for configuring log levels through a UI setting when running the client in Advanced mode.
SCEP support for Microsoft CA templates
Updated the Microsoft CA templates listed below to support the SCEP enrollment method for issuing private certificates from a customer’s Microsoft CA via DigiCert sensor technology:
Microsoft CA Server CertificateMicrosoft CA User Certificate
Prerequisites
Ensure the following requirements are met:
You must have an available Imported seat in your account.
A decryption end-entity certificate will be automatically created to ensure the proper functionality of this feature. The certificate will be issued by the same private CA that issues the end-entity certificate, with an EKU (Extended Key Usage) of either
Server authenticationorCertificate request agent. The certificate must also include key usages ofKey enciphermentandData encipherment.
Additional information
During profile creation, a decryption certificate is created and linked to each Microsoft CA connector and issuing CA.
This decryption certificate is associated with the Imported seat and will have the common name:
TLM-SCEP-DECRYPT-CERT, followed by the account name and issuing CA name.The certificate can be located and retrieved from the inventory page, tagged as
TLM-SCEP-DECRYPT_CERT.
Warning
If the admin deletes the Imported seat associated with the decryption certificate, enrollment failures will occur. However, if the profile is updated or re-saved, a new decryption certificate will be automatically generated, resolving the issue and allowing enrollments to proceed.
Support for the creation of custom reports from the Seats list page
From this release, you can now edit existing custom reports from the reports library page, enabling you to add or remove fields without the need to create a new report.
Custom reports for Seats and edit existing reports
You can now create custom reports from the Account > Seats page. Use the seat table filters to list the applicable seat records, then select the download icon above the table and select the Create custom report button in the siderail that opens. You can customize which fields to include in the report and whether to run it once or on a recurring schedule.
From this release, you can also edit existing custom reports from the Reporting > Report library page. This allows you to add or remove fields without the need to create a new report.
Enhancements
Self-service portal - filter out public/private certificates
Enhanced the self-service portal to support a new optional filter, allowing end-users to distinguish between private and public certificates that chain up to a publicly trusted root CA. The new column/filter currently supports these two values:
Private: For Adobe certificates issued from CertCentral.
—: For imported and discovered certificates.
Duplicate certificates for CertCentral
Resolved an issue preventing the issuance of duplicate certificates across profiles associated with the Public S/MIME Secure Email (via CertCentral) template.
Fixes
Missing Subject DN and SAN fields section
Resolved issue with the Subject DN and SAN fields section not being shown after editing a profile configured with the CSR enrollment method, using the CertCentral Private Server Certificate template.
SAML errors in authenticated self-service portal
Resolved an issue causing SAML errors for the authenticated self-service portal users during enrollment.
Enrollment instant report
Resolved issue with creating instant enrollments reports.
Support multiple proxies using PAC file
Resolved an issue where DigiCert® Trust Assistant failed to connect with the backend server during SSO sign-in when multiple proxy URLs were specified in the PAC file.
Auto-enroll/renew timeout retry
Resolved an issue with auto-enroll/renew timeouts by implementing an automatic retry mechanism that checks every 5 minutes.
Increased timeout for post-processing script
Resolved a timeout issue with the post-processing script by increasing the timeout to 30 seconds.
Tmp.node file creation issue
Resolved an issue where a tmp.node file was being created under the system's temp folder during DigiCert® Trust Assistant boot when using AppLocker.
Error saving diagnosis zip file on non-english windows operating systems
Resolved an issue where the diagnostic zip file could not be saved on non-english Windows operating systems.
Powershell TypeError in post-processing scripts
Resolved an issue where a TypeError occurred during PowerShell calls invoked from post-processing scripts.
March 19, 2025
DigiCert® ONE version: 1.9525.5 | Trust Lifecycle Manager: 1.4064.0
New
Google Cloud Platform (GCP) support
DigiCert® Trust Lifecycle Manager now includes a Google Cloud Platform (GCP) connector for certificate discovery and lifecycle management.
With the new GCP unified connector, users can:
Discover organization hierarchies and projects.
Identify load balancers and certificates configured on them.
Find certificates and certificate maps in Google Certificate Manager.
Automate certificate management for load balancers via Compute Engine and Certificate Manager.
Deliver certificates to the Google Certificate Manager using the Admin web request function.
Supported load balancers for automation:
Global external Application Load Balancer
Regional external Application Load Balancer
Global external Classic Application Load Balancer
Global external Network Load Balancer
Global external Classic Network Load Balancer
Regional internal Application Load Balancer
Note
For DigiCert-hosted customers, contact your DigiCert representative to enable this connector in your account.
Enhancements
Email notification changes
Updated date format for suspend, resume, and revoke email variables: The email templates for certificate lifecycle operations (suspend, resume, revoke) now include both the date and time (in GMT) when the action was performed.
Email notification for profile resume status: Notifications now alert account administrators when a suspended profile is resumed.
Validity periods for Adobe and Public Client Authentication templates
The maximum certificate validity period for profiles created from the following templates is now 3 years:
Public Client Authentication (via CertCentral)Adobe Individual (via CertCentral)Adobe Organization (via CertCentral)
Fixes
DigiCert Trust Assistant renewal with SAML IdP
Resolved the login authorization error during certificate renewal for profiles using an outdated SAML authentication configuration.
DigiCert Autoenrollment Server - Unregistered certificate templates
Resolved the "Certificate template is not registered with the server" issue for clients requesting unregistered templates in the Autoenrollment Server.
Self-service portal p7b certificate download
Resolved an issue in the self-service portal where the .p7b certificate download did not include the full CA chain for profiles with the “advanced certificate delivery” option enabled.
March 11, 2025
DigiCert® ONE version: 1.9525.3 | Trust Lifecycle Manager: 1.4009.0
New
DigiCert AutoEnrollment Server v.2.25.1.0
This release of the DigiCert AutoEnrollment Server includes:
Automated AEConfig retrieval: AEConfig files can now be fetched via API using an API key or certificate-based credentials—no manual export/import is needed.
Automated system configuration: DCOM settings, firewall settings, and Group Policy Objects (GPO) can be now configured automatically.
Digitally signed package: All binary files in the Autoenrollment Server package are now digitally signed. The updated package is available for download on the Client tools page.
SAN:DNSName support: Now supports comma-separated DNS names.
Multi-valued AD attributes: Supports multiple values for Active Directory attributes/strings.
Log settings retention: Log configurations remain intact during uninstall or upgrade.
Improved security: PIN values for Data Protection on Demand (DPoD) HSM integrations are now hidden in server logs.
For details, see Autoenrollment Server.
Seat ID mapping support for SAML attributes
For profiles using SAML IdP authentication, you can now map a SAML attribute (for example, Name ID) to the Seat ID. The system retrieves the attribute's value from the SAML assertion and assigns it as the Seat ID.
Enhancements
Intune GCCH qualification
Qualified support for Intune services on the Government Community Cloud High (GCCH) platform.
Scoped dashboard data for business unit admins
Admins assigned to one or more business units now see dashboard data only for their assigned units. The business unit dropdown at the top of the page will also display only the units they have access.
Public S/MIME support update
The SCEP enrollment method is no longer supported by the Public S/MIME Secure Email (via CertCentral) template.
From this release, issuance of Public S/MIME certificates will be supported via the following flows:
Microsoft Intune using the
Public S/MIME (Digital Signature only) for Intune (via CertCentral)template.Web-based enrollment flows, including CSR, Browser PKCS12, and the DigiCert® Trust Assistant (supports auto-enrollment, renewal, and recovery).
UEM vendors integrating with DigiCert® Trust Lifecycle Manager via REST API.
Fixes
SAN Registered ID format
Resolved encoding issue with the SAN:registeredID field.
Intune connector “Action needed” status
Resolved an issue where the Intune connector remained stuck in the “Action needed” status.
Renewal reminders
Resolved an issue where the renewal reminder job failed to process deleted non-REST profiles.
March 7, 2025
DigiCert® ONE version: 1.9525.2 | Trust Lifecycle Manager: 1.4009.0
New
Intune support for Public S/MIME
CertCentral now supports issuing Public S/MIME sponsor-validated, non-escrowed RSA certificates via Intune SCEP profiles.
A new limited template called Public S/MIME (Digital Signature only) for Intune (via CertCentral) is now available for DigiCert-hosted platforms. Contact your DigiCert representative to assign this template to your account.
To configure Azure authentication, you need a Microsoft Intune connector in Trust Lifecycle Manager. For connector configuration details, see Microsoft Intune connector.
March 5, 2025
DigiCert® ONE version: 1.9525.1 | Trust Lifecycle Manager: 1.4003.0
New
Override validity period for CertCentral requests
Authorized administrators can now manually override the validity period for Public and Private TLS Server certificate requests in CertCentral that require review and approval.
New API endpoint for custom attributes
New REST API endpoints allow you to create, read, and delete custom attributes.
For details, see API endpoint documentation.
Enhancements
Generic templates - 20-year maximum validity
The Generic User, Device, and Server certificate templates now support a maximum validity of 20 years, up from the previous 10-year limit.
Adobe CDS template support for SAML IdP
Updated the Adobe CDS private/limited template to support the SAML IdP authentication method.
Audit log enhancements
Improved audit log failure events for:
Revocation events - Logs now include a message when a revocation request succeeds, but the profile is set to send a revocation email confirmation, and no email address is available for the user.
Intune failure events - New failure events are recorded, and logs now capture the Seat ID for related failures.
Fixes
Missing tags
Resolved an issue where profile tags were:
Not applied to certificates issued via the REST API.
Not inherited from the original certificate during renewal.
Intune import issue when importing via UPN
Resolved an issue where the Intune certificate import flow stopped working after importing more than 100 users.
February 26, 2025
DigiCert® ONE version: 1.9391.4 | Trust Lifecycle Manager: 1.3980.0
Enhancements
Enhanced support for custom attributes
Increased the maximum number of custom attributes to be configured per account from 10 to 15.
Fixes
Cert-Delivery plugin unable to download certificate files via proxy
Resolved an issue where the Cert-Delivery plugin could not download certificate files via proxy when the agent was provisioned through a sensor. A new plugin has been created to resolve this issue.
Certificates are not being delivered to the A10 load balancer
Resolved an issue where certificate installation failed on A10 load balancers due to a limitation in handling chunked ICA uploads for files larger than 4 KB. The chunk size has been increased to 16 KB, allowing up to six intermediates (each 2.5 KB), ensuring successful ICA binding for larger files.
Open self-service portal revocation issue
Resolved an issue where certificate revocation requests failed in the open self-service portal for customers with the revocation feature enabled.
Profile API response
Resolved an issue where the profile response API endpoint did not return the correct values for the following parameters when configured in a profile:
duplicate_certificate_allowedgrace_period_enabled
February 12, 2025
DigiCert® ONE version: 1.9391.0 | Trust Lifecycle Manager: 1.3921.0
New
EST support for Microsoft CA templates
The following Microsoft CA templates now support the EST enrollment method, enabling private certificate issuance from a customer’s Microsoft CA through DigiCert sensor technology:
Microsoft CA Server CertificateMicrosoft CA User Certificate
Manage business unit admins via REST API
New REST API endpoints enable administrators to be assigned or removed from a business unit using their GUID. Here are the new endpoints and links to the Swagger API reference documentation for them:
Endpoint to assign an admin to a business unit:
PUT /mpki/api/v1/business-unit/{id}/adminEndpoint to remove an admin from a business unit:
DELETE /mpki/api/v1/business-unit/{id}/admin/{adminId}
Email notifications for profile status changes
Added new email notification templates to notify customers about profile status changes, including:
Profile suspension
Profile deletion
These notifications can be enabled or disabled and customized from the Policies > Notifications page in Trust Lifecycle Manager, filtering for Profile management in the Category column.
Enhancements
Adobe Individual - REST API
Enhanced the Adobe Individual in Organization (via CertCentral) template to support the REST API enrollment method and allow API-based integrations for the issuance of private Adobe CDS certificates and lifecycle operations.
Note
To issue a certificate, the API request must include the accept_adobe_rules parameter with a yes value, explicitly accepting the terms and conditions. If this parameter is missing, the following error will be displayed:
Failed to issue the certificate. You must read and accept the Adobe T&Cs by including the 'accept_adobe_rules' parameter with a 'yes' value.
Adobe CDS - DigiCert ONE Login
The Adobe CDS template now supports the DigiCert ONE Login authentication method. This enables integration with IdP users via SAML or OIDC, linking them to a DigiCert ONE account for advanced DigiCert® Trust Assistant auto-enroll and auto-renew features.
Shortened EST server URLs
Starting with this release, all Enrollment over Secure Transport (EST) enrollment and renewal URLs have been shortened to accommodate devices with size or format restrictions and better comply with RFC standards.
Here are the example URLs illustrating the changes:
For EST enrollment URL:
From:
https://one.digicert.com/mpki/api/v1/.well-known/est/<profile-GUID>/simpleenrollTo:
https://one.digicert.com/.well-known/est/TLM<profile-GUID>/simpleenroll
For EST server renewal URL:
From:
https://one.digicert.com/mpki/api/v1/.well-known/est/<profile-GUID>/simplereenrollTo:
https://one.digicert.com/.well-known/est/TLM-<profile-GUID>/simplereenroll
For EST server renewal URL using “clientauth” endpoint:
From:
https://one.digicert.com/mpki/api/v1/.well-known/est/<profile-GUID>/simplereenrollTo:
https://clientauth.one.digicert.com/.well-known/est/TLM-<profile-GUID>/simpleenroll
Note
The old URLs will remain operational alongside the new ones. When creating or editing a profile, only the new URLs are displayed.
Updated Microsoft CA import behavior
When importing certificates from a Microsoft CA connector using the option to import from Specific templates on the Microsoft CA, Trust Lifecycle Manager will not import any certificates unless there is at least one matching user-specified template. Previously, all certificates were imported when there was no matching template.
Updated Admin web request flow
Enhancements to the Admin web request enrollment method:
Agents in "Not configured" state can now be used for certificate delivery.
Added options to allow Subject Alternative Names (SANs) when issuing certificates from a Microsoft CA connector.
Authenticated self-service portal - User ID
Added a User ID field to the authenticated self-service portal, which automatically maps to the SAML NameID value from the SAML assertion.
Key details:
After successful SAML authentication, users will see all certificates they own or have requested based on the SAML NameID.
Users can also search for certificates by email address, even if they were enrolled through a non-SAML flow (for example, a profile with the Manual Approval authentication method). The search includes matches within the SubjectDN or SAN rfc822Name extension.
Underscore character support for dnsName field
This release introduces support for the underscore (_) character in the SAN:dnsName field for certificate profiles using a private issuing CA in DigiCert® Private CA.
Fixes
PKI Platform 8 connector - certificate import fix
Resolved an issue where certificate imports failed for PKI Platform 8 accounts without a sub-account. Previously, customers had to create a placeholder sub-account as a workaround, but this is no longer necessary.
January 29, 2025
DigiCert® ONE version: 1.9100.7 | Trust Lifecycle Manager: 1.3860.0
New
AI Assist chatbot
Note
This chatbot is available only for DigiCert-hosted platforms.
AI Assist is a new AI-powered chatbot designed to help DigiCert® Trust Lifecycle Manager administrators. It provides answers to product usage, onboarding, configuration, installation, and API integration queries by sourcing relevant information from our documentation websites: DigiCert product documentation, DigiCert developer portal, and DigiCert ONE.
Features of the AI chatbot:
Accepts prompt inputs in natural language.
Supports all major international languages, responding in the same language as the input.
Provides source references for answers as citations.
Saves conversation history and context for seamless recollection.
Allows users to copy responses with a single click for easy sharing.
Enables starting a new session with a "plus" button.
Collects user feedback on the usefulness of each response.
Where can I find the AI chatbot?
You can access AI Assist by selecting the question mark in the top-right corner of the DigiCert® Trust Lifecycle Manager administration screen. The chatbot will open on the same screen.
Who can use the AI chatbot?
AI Assist is available to all Trust Lifecycle Manager users with Account Admin access.
Can I chat with live customer support?
No, AI Assist does not support live chat with customer support. For assistance, contact support via email, phone, or a support ticket.
Custom attributes
The new custom attributes feature allows customers to create and manage up to 10 custom attributes per account. These attributes can be linked to profiles or certificates, depending on user permissions.
Access and permissions
Viewing custom attributes: Available under Account > Settings > General > Custom attributes, but only for users with the "View custom attributes" permission. Otherwise, the option remains hidden.
Creating and managing custom attributes: Only administrators with the "Manage custom attributes" permission can create, edit, or delete custom attributes.
Configuration and attribute types
Custom attributes are configured in Account > Settings > General > Custom attributes and can be set as:
Dropdown list: A predefined set of values selected by end-users (required or optional).
Text field: A free-text input where end-users enter a value (required or optional).
Fixed value: A static value set by the administrator.
Note
Dropdown and text field attributes can have a default value, which will be used during certificate renewals.
Using custom attributes
Once an authorized administrator configures custom attributes, they can be assigned to profiles.
Web-based profiles (CSR, Browser PKCS12, DigiCert Trust Assistant, Automated Enrollment, Admin Web Requests): Any configured custom attribute can be selected and applied to certificates issued or renewed from the profile. If a text field attribute is used, it can include a Regular Expression (REGEX) to validate user input.
Automated profiles (REST API, 3rd party ACME, SCEP, EST, Microsoft AutoEnrollment): Only custom attributes with Fixed values can be assigned, ensuring certificates issued or renewed automatically follow predefined settings.
Custom attribute operations
Authorized administrators can manage custom attributes and the following actions are available:
From Account > Settings > General > Custom attributes page:
Create/edit custom attributes
Delete custom attributes. When deleted, any associated profiles or certificates will no longer be linked to the removed attribute.
Note
When dropdown list type attributes are marked as required, new values can be added to the dropdown. However, existing values cannot be removed.
From the Profiles and Certificate details page:
Add
Remove
Update values
From the Inventory page:
Filter/search certificates based on one or more custom attributes
Export custom attributes as part of instant and custom reports
For details, see Custom attributes.
Support for Public S/MIME Multipurpose and Strict generation
Added support for the new strict and multipurpose generation certificates for the following templates:
Template name | Seat type associated with the template | S/MIME certificate generation | S/MIME certificate type |
|---|---|---|---|
| User seat |
|
|
| User seat |
|
|
| Organization seat |
|
|
The following changes align with the Public S/MIME CAB Forum standard:
The
strictandmultipurposegeneration certificates can have a maximum validity period of 825 days.For sponsor-validated certificate type, if
strictormultipurposeis selected, the Subject DN (with GivenName/Surname or Pseudonym) is a mandatory field. Common Name is no longer supported.For
strictgeneration certificates, theclient_authEKU anddata_encipherment, KU extensions are no longer supported and are removed as options from the profile wizard.All Public S/MIME certificates issued before this release will be automatically associated with 'Legacy' generation certificates, which are displayed on the Profile details page under Generation type .
Important
Issuance of Public S/MIME Legacy generation certificates, regardless of the certificate type (Mailbox/Sponsor/Organization-validated), will be blocked from the 1st of July 2025 (midnight UTC). Any Public S/MIME certificates issued after the 1st of July 2025 must be Multipurpose or Strict generation certificates for which you must create a new profile. For details, see section 7.1.6.1 in Baseline Requirements for the Issuance and Management of Publicly‐Trusted S/MIME Certificates.
Note that the issuance will be blocked starting July 1st, 2025, allowing time to address any unforeseen issues by the 14th of July 2025 (midnight UTC).
DigiCert Trust Assistant version 1.2.2
The DigiCert® Trust Assistant v1.2.2 release includes the following new features and enhancements.
Manual and auto recovery of escrowed certificates
A new feature that allows end users to manually or automatically recover certificates that were issued and escrowed in the DigiCert cloud.
Auto recovery - If there are any public or private escrowed certificates (valid, expired, or revoked) on DigiCert Cloud linked to profiles with the auto-recovery feature, the auto key recovery process will automatically trigger upon successful sign-in. All matching certificates issued by the logged-in user will be recovered without any user action required.
Manual recovery - DigiCert® Trust Assistant runs a recovery check to see if any certificates can be recovered for the signed-in user. If it finds a recoverable certificate then the user is alerted via a notification alert with a link to initiate the manual recovery process.
Note
During the key recovery process, a PIN or password may be required to save the recovered certificates to the target keystore (if protected).
Key recovery prerequisites
The profile must be configured as follows:
Enrollment method: DigiCert Trust Assistant
Keystore: Either OS keystore or DigiCert Software Keystore
Authentication method: DigiCert ONE Login
DigiCert cloud key escrow option must be enabled in the profile
The Enable DigiCert Trust Assistant recovery option must be selected - this is applicable for both manual and auto recovery flows.
For auto recovery, the Enable auto recovery upon sign-in option must be selected. The auto-recovery operation is triggered only upon user sign-in via their single sign-on provider, but it is not supported for hardware tokens.
For more details, see Manual and auto recovery of escrowed certificates.
Sign-out functionality
Use this feature to sign out of DigiCert® Trust Assistant and return to the logged-out state. All the features of DigiCert® Trust Assistant described in Signing in with DigiCert ONE will not be available after signing out.
The new Sign-out functionality is available from the DigiCert® Trust Assistant context menu (avatar icon at the top-right of the dashboard).
After signing out, you can sign in again as the same user or as a different user. To sign back in, see Signing in with DigiCert ONE .
For more details, see Sign out of DigiCert Trust Assistant.
UI enhancements
Updated all the modal dialog windows to support ENTER to submit and ESC to close.
The profile description field is now visible during enrollment and on the Certificate profile details page.
A certificate Serial number column has been added to the Token and Issued certificates panel.
DigiCert® Trust Assistant can now be opened from the Windows operating system tray by left-clicking the icon, in addition to the right-click menu.
Admin web request - post-installation script support
Admin web request flows for agent certificate delivery now support a post-script option. Administrators can configure the agent to execute a script after certificate delivery, enabling customization and extending capabilities to bind certificates to unsupported applications and use cases.
Administrators can:
Configure post-installation scripts for agents individually or in bulk.
Add parameters to be passed to the script as command arguments for each request.
Set up enrollment, reissue, and renewal to trigger post-scripts automatically.
Enhancements
PKI Platform 8 CA connector - certificate import enhancement
The DigiCert® PKI Platform 8 CA connector now supports the automatic import of:
X.509 certificates (non-escrowed)
PKCS#12 certificates (escrowed)
Administrators can control imports using filters based on account, sub-account, profile, and certificate status.
Key details:
The import process runs asynchronously. You can track imported certificates by checking and refreshing the connector details page.
All imported certificates are assigned to an Imported Seat, where administrators can perform lifecycle operations:
Private certificates: Revoke, recover, suspend/resume
Public certificates: Revoke, recover
Important
Revoke/Suspend/Resume actions for certificates imported via the PKI Platform 8 connector, actions such as Revoke, Suspend, and Resume will require ongoing access to both the connector and the PKI Platform 8 account until all imported certificates have expired.
Import functionality for the connector
To enable the import functionality for the connector, contact your platform administrator and enable the PKI8 Connector - import attributes feature in the Account Manager application.
For more details, see DigiCert PKI Platform 8.
REST API - Business unit endpoint enhancement
Updated the GET business unit API endpoint to include the following data for the responses:
An array of
adminsassigned to the business unit (ID, name, email)An array of
available_seats_stats
Here's an example response:
{
"id": "67faf4c0-45a4-42e1-8f8a-b723d0d50262",
"name": "Default Business Unit",
"active": true,
"created_at": "2024-12-17",
"account": {
"id": "3392fd77-19b4-43b4-afec-f796c1cc5896",
"name": "Marseille_Seaport_Account"
},
"admins": [
{
"id": "28dc6055-e83b-4549-b8c4-f024ce41cbdb",
"name": "admin001 admin",
"email": "admin001@yopmail.com"
},
{
"id": "a18cc97a-4b45-4f07-989d-e3448ecfc7b0",
"name": "Edmond Dantès",
"email": "edmond.dantes@yopmail.com"
}
],
"available_seats_stats": [
{
"type": "USER_SEAT",
"display_name": "User seat",
"licensed_amount": 1000,
"allocated_amount": 3,
"created_amount": 4,
"pending_enrollment": 0,
"in_progress_enrollment": 0
},
{
"type": "DEVICE_SEAT",
"display_name": "Device seat",
"licensed_amount": 1000,
"allocated_amount": 0,
"created_amount": 0,
"pending_enrollment": 0,
"in_progress_enrollment": 0
}
}AES qualification of Luna HSM Client 10.7.2
DigiCert AutoEnrollment Server qualification of the Luna HSM Client 10.7.2-16 for both SafeNet Network HSM and SafeNet DPoD (Data Protection on Demand) Cloud HSM. For more details, see SafeNet HSM installation and configuration.
Note
The Luna HSM Client 10.6.x version will be End of Life by Gemalto by the end of January 2025.
Support for multiple key sizes in automation flows
Certificate Management seat-type templates now allow selecting multiple key sizes when creating a profile. This enables administrators to issue certificates with different key sizes without cloning the profile.
This option is available for the following enrollment methods:
Sensor
REST API
Admin web request
This option is available for the following CAs:
CA Manager
CertCentral
Step CA
Sensor support for server-sent events
With sensor version 3.9.5, DigiCert® Trust Lifecycle Manager sensors now support server-sent events for near real-time responses to job requests.
This feature can be enabled under Advanced settings on the Sensor details page.
Note
This feature is recommended for use cases, such as CA integrations, where faster responses are essential.
Update to OpenSSL packages for the agent
The OpenSSL packages have been updated to v3.0.15, and are now included in the automation package used by the agent.
Fixes
Open self-service portal - revocation
Resolved issue with revocation operations failing for users via the open self-service portal.
Renewal email notification timing issue
Resolved an issue where renewal email notifications were sent a day earlier than configured. The calculation logic caused the discrepancy, which excluded both the current day and the "valid to" date, leading to incorrect scheduling.
MSCA templates showing as undefined
Resolved an issue where MSCA templates appeared as undefined due to misconfiguration on the CA side. Logic has been added to ignore such templates.
MSCA automation - root count mismatch
Resolved an issue where the installation step in the automation flow failed due to a malformed response for root and intermediate certificates.
Instant report - incorrect columns
Resolved an issue with the serial number column not showing correctly in the report.
Certificates with "replace external" status
Resolved issue by removing the replace external filter status when the user drills down from dashboard.
Resolved an issue where certificates with the replace external status were showing incorrectly. Removed the replace external filter when users drill down from the dashboard.
January 17, 2025
DigiCert® ONE version: 1.9100.5 | Trust Lifecycle Manager: 1.3804.0
Fixes
SCEP issuance of duplicate certificates
Resolved an issue with the issuance of duplicate certificates for profiles configured with the SCEP enrollment method.
January 15, 2025
DigiCert® ONE version: 1.9100.3 | Trust Lifecycle Manager: 1.3797.0
New
Adobe CDS 'limited' template for private use-cases
A new Adobe CDS 'limited' template is now available for issuing private certificates. This template is tied to the User seat type and includes the following two EKUs:
Adobe Authentic Document Trust (1.2.840.113583.1.1.5)Document Signing (1.3.6.1.4.1.311.10.3.12)
Any private CA can use this template. To enable it for your DigiCert ONE account, contact your account representative.
Note
Adobe products do not officially recognize private certificates issued with this new template. For full Adobe support, use the Adobe Individual template. This requires a CertCentral CA connector linked to your CertCentral account with the appropriate product types enabled.
Self-service portal - additional certificate delivery options
The self-service portal now supports additional certificate delivery options for all certificate types. Users can access these by selecting the Show additional download options link inside the Download certificate pop-up and switch back to standard options by selecting Show standard download options.
Enhancements
Audit log enhancements - no seats available in business unit
Audit logs now include failure events for cases where no seats are available in the business unit tied to the profile used for certificate issuance.
Self-service portal enhancement - Assign "Pending" administrators to business units
DigiCert® Trust Lifecycle Manager users with Pending status in the Account Manager can now be assigned to or unassigned from business units as needed.
The Pending status users are now displayed in the Manage account users dropdown under Business Unit settings, allowing administrators to manage their assignments.
Fixes
Revocation failure
Resolved an issue where certificate revocation requests sent from Inventory failed when a profile was configured to send a revocation email to the certificate owner, but no email address was found associated with the requester, enrollment, or seat.
From this release, revocations will succeed even if no email address is associated with the requester, and the transaction will not be rolled back.
SAML IdP-initiated Null error
Resolved an issue where SAML IdP-initiated enrollment and renewal flows failed with a Null error due to a missing URL in the required SAML parameters.
January 8, 2025
DigiCert® ONE version: 1.9100.1 | Trust Lifecycle Manager: 1.3765.0
New
ServiceNow v1.6.0
ServiceNow app version 1.6.0 released for DigiCert® Trust Lifecycle Manager introducing new features, enhancements, and fixes:
Certificate renewals
Renewal notifications
Users can now receive renewal reminder emails directly from the ServiceNow app.
Administrators can manually resend these reminders using the new Resend renewal email action.
Renewal process
Users and administrators can renew certificates using the new Renew button on the certificate details page for certificates within the renewal window.
Renewal requests are listed under the Pending certificate requests page, where administrators can approve, reject, or cancel them.
Certificate delivery
Renewal certificates are delivered similarly to the base certificates upon approval.
Successfully renewed certificates are displayed on the Certificates page after pickup.
Multiple key sizes
Profiles with multiple key sizes now display all supported options during the certificate request process. Requesters can submit CSRs for any supported key size.
DigiCert ONE platform configuration for admins
ServiceNow administrators can configure the DigiCert ONE platform URL the app connects to, regardless of the ServiceNow instance type. Options include selecting a DigiCert ONE instance from a dropdown or selecting the Others option manually to specify a custom DigiCert ONE domain, such as, for locally hosted instances.
Pending certificate request enhancements
The Pending certificate requests page now defaults to displaying requests in the Pending approval state. Status updates are supported post-approval, such as reflecting a Failed status if issues arise.
Improved navigation
Users can now seamlessly navigate from Pending certificate requests > Certificate request # > Certificate information > View certificate for better accessibility.
Certificates as attachments
Certificates issued through REST API enrollment requests are now included as attachments in ServiceNow emails, making them easier for end-users to access.
Fixed value issue for SAN/SDN fields
Resolved issues with fixed values in Subject Alternative Name (SAN) and Subject Distinguished Name (SDN) fields.
Enhancements
Audit log enhancements
SAML login events: Updated self-service portal SAML login success and failure events to include additional details, such as the SAML NameID.
Intune request failures: Added more information to failure events triggered when Intune requests exceed the duplicate certificate limit (250).
Additional certificate delivery formats
Support for additional certificate delivery formats has been extended to the following templates for profiles using the CSR enrollment method with any supported authentication method if the feature is enabled:
Microsoft CA Server CertificateMicrosoft CA User Certificate
The self-service portal now supports additional certificate delivery options for all certificate types downloaded through the portal.
Fixes
CertCentral Public S/MIME DV-enabled templates
Resolved an issue with CertCentral Domain Validated (DV) product types in the CSR/Manual approval flow. DV products have been removed from the list of selectable options when creating profiles using CertCentral Public or Private Server Certificate templates because they do not support this flow. Use a non-DV CertCentral product type instead.
Renewal emails with updated seat email addresses
Renewal emails will now also reach seats with a specified Seat Email value set. This ensures that customers can set a new email address for a Seat object even if the original requester has left the organization.
Agent drill-down issue for unsecured IP/ports
Resolved an issue in agent details where selecting "Unsecured IP/ports" caused the display to briefly switch to secured ports before returning to "Unsecured IP/ports."
Delete option restricted to Discovery view
The Delete option is now restricted to the Discovery view, ensuring it applies only to discovered certificates.