Skip to main content

Trust Lifecycle Manager

Release notes RSS

Recent releases

December 16, 2025

DigiCert® ONE version: 1.11494.5 | Trust Lifecycle Manager: 1.5047.0

Included in this release:

New

CyberArk secrets manager connector - Integration with F5 and AWS unified (ACM)

DigiCert​​®​​ Trust Lifecycle Manager now supports CyberArk in the Secrets manager connector category. This integration enables Trust Lifecycle Manager connectors to securely retrieve credentials from CyberArk, which are used during certificate delivery and automation workflows. It eliminates the need for hard-coded or locally stored passwords and ensures authentication leverages centrally managed, rotated secrets. This connector supports integration with CyberArk using the Central Credential Provider (CCP) service and client-based authentication.

This release enables the F5 connector and the AWS unified connector to authenticate using CyberArk-managed credentials for secure, enterprise-grade certificate lifecycle management. For more information, see the CyberArk connector guide.

Enhancements

Agent release 3.1.6

This agent update introduces the ability for admins to change the proxy configuration for an existing agent.

Fixes

Inventory total certificate count mismatch

Resolved an issue where the Total certificates count in Inventory > Certificates tab did not match the maximum number of records shown at the bottom of the data grid.

Unable to create a custom certificate report when selecting "Expires in (days)" field

Resolved an issue with generating custom certificate reports when the Expires in (days) field was selected from the Inventory page.

SAML SP metadata download

Resolved an issue where the SAML service provider (SP) metadata could not be downloaded from the Account > Settings > Self-service portal page for the authenticated self-service portal .

Custom certificate report does not retain filters when edited

Resolved an issue where edited custom certificate reports did not retain the original filter conditions.

Missing trust type value in authenticated self-service portal - Certificate request tab

Resolved an issue where the Public server trust type was missing from the authenticated self-service portal's Certificate request > Trust type dropdown. Additionally, resolved an issue where only 10 profiles were displayed in the table. The portal now displays up to 5,000 profiles.

December 10, 2025

DigiCert® ONE version: 1.11494.2 | Trust Lifecycle Manager: 1.5040.0

Included in this release:

New

Adaptive auto-renew logic

Starting with this release, DigiCert​​®​​ Trust Lifecycle Manager introduces enhanced automation to keep renewal schedules aligned with real-world certificate changes. The system now continuously monitors refreshed and newly discovered certificates, automatically adjusting renewal timing whenever changes are detected. This new feature includes the following:

  • Certificate change detection: Automatically identifies when a refreshed or newly discovered certificate differs from the previously installed version.

  • Dynamic auto-renew scheduling: Renewal schedules are recalculated based on the newly discovered certificate's validity and properties.

  • Immediate renewal conditions: Renewal is immediately triggered when the:

    • Remaining certificate validity falls below the configured auto-renew window.

    • Certificate has already expired.

  • Updated certificate attributes: If certificate metadata (such as Subject Alternative Name, and other subject details) changes, the updated metadata is automatically used in any subsequent renewal requests.

  • Auto-renew configuration continuity: If the original certificate had auto-renewal configured, the replacement certificate automatically inherits this setting.

  • Consistent retry behavior: Renewal retries honor the existing auto-renew window and configured settings, ensuring reliable processing even after initial failures.

Enhancements

"Last seen" column added to Agents page

To improve visibility into agent availability, a new Last seen column has been added to the Discovery & automation tools > Agents page. This column displays when an agent was last active and includes advanced filtering options. This allows you to quickly identify agents that have and haven’t been seen within a specified number of days or hours.

Additional fields for custom certificate reports

With this release, Trust Lifecycle Manager supports the Operating system and Ciphers columns that you can include in your custom reports. Select these columns in the Server management details section of the Create custom report wizard.

Updates to the profile "Extensions" screen

With this release, the following improvements are made to the Extensions screen of the Create certificate profile wizard:

  • The Standard extensions dropdown list is now ordered alphabetically.

  • The Issuer alternative name (IAN) label is updated to Issuer alternative name (IAN) - Directory name reflecting that directory name is the only IAN attribute type that is supported.

"Other recipients" field for Public S/MIME profiles

Profiles created using the Public S/MIME Secure Email (via CertCentral) base template can now be configured with the Other recipients field. This allows administrators to receive a copy of all certificate lifecycle emails enabled on the profile.

Certificate REST API endpoint support for setting seat email

Enhanced the POST /mpki/api/v1/certificate REST API endpoint to support setting the seat email value (seat_email) without having to use a separate seat endpoint request.

Sensor release 3.9.14

This sensor update includes the following:

  • Trust Lifecycle Manager is the default option during sensor installation.

  • Improved retry logic for failed sensor upgrades.

  • Important security and stability fixes.

Fixes

Custom reports display duplicate entries and do not match certificate inventory

Resolved an issue where custom reports generated from the default All certificates view show duplicate entries and don’t match the certificate inventory. This issue occurred because the All certificates view displayed a filtered view of certificates while the custom report retrieved certificates irrespective of whether the same certificate was issued, discovered, or imported into the inventory.

With this release, if the selected column matches the All certificates view column set, the system executes the same unique inventory query so that the results match. If additional columns are selected in the custom report, the system falls back to the original reporting query. This query retrieves all certificates matching the filter criteria, regardless of duplicate certificates.

CSV upload fails

Resolved an issue with not being able to upload a CSV file that contains the security_identifier field.

Duplicate entries in custom certificate report

Resolved an issue where duplicate certificate entries were displayed in the custom reports.

AEConfig file download fails for profiles without an EKU

Resolved an issue with not being able to download an AEConfig file for profiles that don't have an Extension key usage (EKU) extension configured.

Certificate renewals fail for "Citrix FAS Smartcard Logon" profiles

Resolved an issue where renewals associated with the Citrix FAS Smartcard Logon profiles would fail with a duplicate certificate error. This issue occurred when the renewal window configured was less than 50% of the certificate validity period. Follow the profile configuration changes listed in the Troubleshooting topic to resolve this issue.

Renewal notifications fail for iOS/iPadOS enrollment method

Resolved an issue where end-users didn’t receive renewal email notifications for profiles configured with the iOS/iPadOS enrollment method. This issue occurred because the renewal email template was missing from the profile configuration.

"DNS name" field in the certificate displays an IP address

Resolved an issue where certificates issued through the Admin web request enrollment method displayed an IP address in the DNS name field, for profiles configured using the CA Manager Private Server Certificate base template.

Tenable connector remains in "Running" state after error

Resolved an issue where the Tenable connector would remain in the Running state when there is an error.

November 24, 2025

DigiCert® ONE version: 1.11351.13 | Trust Lifecycle Manager: 1.5003.0

Included in this release:

New

BeyondTrust - Secrets manager support for AWS Certificate Manager (ACM)

DigiCert​​®​​ Trust Lifecycle Manager now supports secure credential retrieval from BeyondTrust vaults for authenticating AWS Certificate Manager (ACM) automation flows using the AWS unified connector. This eliminates the need for hard-coded secrets, enabling the use of centrally managed secrets stored in the BeyondTrust privileged access management (PAM) platform.

For more details, see the AWS unified connector guide.

AutoEnrollment Server version 2.25.3.0 - Support for Trusted Platform Module and diagnostics

This release of the DigiCert® Autoenrollment Server supports the following:

  • Microsoft Platform Crypto Provider - Trusted Platform Module (TPM)

    • Allows secure access to the machine's TPM v2.0 chip via the Microsoft Platform Crypto Provider for generating user and/or device keys and certificates.

    • Authorized profile administrators can create or edit profiles and choose the Microsoft Platform Crypto Provider to enforce a policy for non-exportable keys to be securely generated on the TPM.

    For more details, see Create the autoenrollment certificate profile.

  • Diagnostics

    This feature simplifies troubleshooting and issue diagnosis by automatically gathering all configuration, user, and log files into a password-protected .zip file containing:

    • diagnostics.json: Detailed information about machine, OS, RequestBuffer database, Active Directory (AD), and registry.

    • DCOM Permission Information (DCOM.log): List of DCOM permissions including AppID-specific permissions and Machine-wide settings.

    • Group Policy Information (gpresult.log): Information about configured Group Policy Objects (GPOs).

    • User information: Information about the current logged-in user, including groups, claims, and privileges.

    • AEServer.log: Logs related to AEServer activity for the past seven days.

    • AEConfig.log: Logs related to AEConfig.

    • ConfigureAES.log: Log generated during the latest execution of the ConfigureAES.bat file.

    For more details, see Diagnostics.

Enhancements

Manually trigger automation for scheduled sites

Administrators can now manually trigger automation for sites that already have a scheduled automation flow. This can be done without canceling the existing automation schedule or affecting future auto-renewals. This enhancement also provides greater flexibility to accommodate ad hoc changes while preserving the planned automation lifecycle.

New "Stop refresh" action for DigiCert agents

A new Stop refresh action has been introduced this release to help manage agents that remain in the Refreshing configuration state for an extended period. This allows administrators to cancel the existing refresh operation when required.

Notice

Although this option is available, it is recommended to allow the refresh process to complete to ensure that the agent accurately reflects the latest server state.

Fixes

Certificate API response doesn’t include OU field in subject

Resolved an issue where the organizational unit (OU) field was missing from the subject JSON block (subject.organizational_units) in responses from the GET /mpki/api/v1/certificate/{serial} endpoint.

CSR enrollments failed for profiles configured with optional Email field

Resolved an issue with certificate profiles configured with the CSR enrollment method and the optional Subject DN Email field, where enrollments failed if the CSR didn't contain a matching Email attribute.

Send automation lifecycle notifications to certificate owner

Resolved an issue where automation notifications configured in the certificate profile weren’t being sent to the certificate owner(s) defined in the profile.

Connector going to "Action needed" state every few hours

Resolved an issue where the Microsoft CA connector went into the Action needed state every few hours due to a synchronization issue with the Trust Lifecycle Manager plugin manager.

Tenable connector not importing all certificates

Resolved an issue with the Tenable connector was not importing all the certificate data.

November 19, 2025

DigiCert® ONE version: 1.11351.11 | Trust Lifecycle Manager: 1.4991.0

Included in this release:

New

BeyondTrust connector - Secrets manager support in Trust Lifecycle Manager

In this release, DigiCert​​®​​ Trust Lifecycle Manager introduces the BeyondTrust connector that can be be accessed from the new Secrets manager category on the Integrations > Connectors > Add connector page. This connector allows Trust Lifecycle Manager connectors to securely retrieve and use credentials stored in the BeyondTrust vault during delivery and automation flows. This eliminates the need for hard-coded or locally stored passwords, and ensures endpoint authentication uses centrally managed and rotated secrets from the customer's vault.

This release also includes the ability for the F5 BIG-IP LTM connector to use credentials stored in the BeyondTrust vault. For more information, see the BeyondTrust connector guide.

Enhancements

DigiCert ONE login - Public Client Authentication support for DigiCert Trust Assistant

In this release, the Public Client Authentication (via CertCentral) base template has been updated to support the DigiCert ONE Login authentication method for certificate profiles configured with the DigiCert Trust Assistant enrollment method.

Define custom Qualys server URL

With this release, administrators can define a custom Qualys server URL. This enhancement enables organizations to direct scans and integrations to their own Qualys deployments, in addition to the standard Qualys cloud environments.

Agent release 3.1.5

This agent update includes the following:

  • Important security fixes to improve overall system stability.

  • Fix for an issue where proxy settings were being unintentionally cleared after a restart. Proxy configuration now persists as expected.

Sensor release 3.9.13

This sensor update includes the following:

  • Important security fixes to improve overall system stability.

  • Resolution for an issue where the Microsoft CA plugin timeout was being reset to 15 minutes.

  • Enhancements to support privileged access management (PAM) use cases.

  • Resolution for an issue where discovered certificates in the All certificates view could not be deleted.

Fixes

Unable to edit or save certificate profile containing Unique Identifier field

Resolved an issue that prevented editing or saving a certificate profile when the Required checkbox was toggled and the source for the field's value was set to Fixed value.

Incorrect Japanese label

Updated an incorrect Japanese label in the Certificate options > Renewal options section of the certificate profile configuration wizard.

Browser PKCS12 certificate renewal fails when tag is assigned

Resolved an issue where the Browser PKCS12 certificate renewal process with the Manual approval authentication method fails when a tag is assigned to the certificate.

Unable to filter owners in the Certificate Owners page

Resolved an issue with not being able to filter owners in the Account > Settings > Contacts > Certificate owners page.

Microsoft CA enrollment failures with non-expected fields in CSR

Resolved an issue where certificate enrollment would fail if the submitted certificate signing request (CSR) included fields that were not defined in the certificate profile. Starting from this release, additional fields no longer trigger errors, and the request is forwarded to the defined Microsoft CA for issuance. The issued certificate may or may not include the additional fields.

Notice

A similar fix is implemented for all external private CAs. However, the CA vendor may or may not include the additional fields in the CSR.

External email address display issue

Resolved an issue that prevented external email addresses from appearing in the notification recipients list.

November 13, 2025

DigiCert® ONE version: 1.11351.8 | Trust Lifecycle Manager: 1.4969.0

Enhancements

DigiCert Trust Assistant - AD Publisher script support for Generic User Certificate base template

With this release, the DigiCert​​®​​ Trust Assistant Active Directory (AD) Publisher system script has been updated to support the Generic User Certificate base template. This enhancement allows you to push the issued certificate to your AD.

CT logs monitoring - instant discovery

Updated the CT logs monitoring feature to instantly discover certificates when they appear in the Certificate Transparency (CT) logs.

November 12, 2025

DigiCert® ONE version: 1.11351.7 | Trust Lifecycle Manager: 1.4964.0

Included in this release:

New

Certificate Transparency (CT) logs monitoring

With this release, DigiCert​​®​​ Trust Lifecycle Manager introduces the monitoring of Certificate Transparency (CT) logs for proactive discovery of public certificates issued across your organization's domains. Benefits of CT logs monitoring:

  • Continuously monitor the public CT logs to identify certificates issued for your domains or organization that are not already present in your certificate inventory.

  • Automatically add matching certificates to your centralized inventory, where you can track and configure notifications for them.

  • Tag and categorize the discovered certificates using custom rules, simplifying search and management.

  • Detect certificate misuse and fraudulent activity to help protect your systems and brand.

CT logs monitoring gets configured at the account level from your global discovery settings. For more information, see CT logs monitoring.

DigiCert Trust Assistant - Custom scripts

In addition to the existing System scripts feature, this release introduces a new feature called Custom scripts. This new feature enables profile administrators to upload and manage their own scripts. Each uploaded script is automatically scanned for basic malware and executed after DigiCert​​®​​ Trust Assistant completes certificate enrollment, renewal, or recovery operations.

Custom scripts allow profile administrators to deliver 'last mile integrations' following successful certificate provisioning, such as configuring a Wi-Fi access point or VPN client. This enables a seamless, end-to-end, zero-touch experience for end users while supporting various certificate-based use cases.

Warning

DigiCert​​®​​ does not validate the functionality of any uploaded custom script and is not liable for actions executed by the script.

Enhancements

Manage agent auto-update settings at account level

With this release, a new account-level setting is added to the Account > Settings > Tool deployment page to enable or disable software auto-updates for agents.

  • When disabled at the account level, newly provisioned agents in the account will have software auto-update turned off by default.

  • Existing agents can optionally be set to have auto-update enabled or disabled based on the account-level settings.

Notice

Administrators can enable or disable auto-update at the account level at any time, and can always override this behavior at the individual agent level.

New Cipher filter in Inventory

With this release, administrators can filter their inventory using discovered cipher data available in Trust Lifecycle Manager. This enhancement enables the identification of sites using weak ciphers, allowing administrators to manage and strengthen their security posture.

Fixes

Certificate issuance failure when configuring a profile with a fixed Unique Identifier value

Resolved an issue where certificate requests submitted using REST API failed when a certificate profile's Unique identifier field was configured with a fixed value as it's source.

Inventory filters do not change when switching views

Resolved an issue where filters on the Inventory page do not change when switching between saved views.

Profile deletion timeout error

Resolved an issue where the delete profile action would time out. This error was because the system fetched all enrollments associated with the profile, regardless of enrollment status, instead of only retrieving the pending enrollments. Pending enrollments are canceled before the profile deletion process is completed.

Certificate owner creation via REST API

Resolved an intermittent issue with the creation of certificate owners through REST API.

Apache configuration issue on Windows when switching from HTTP to HTTPS

Resolved an issue where the automation process failed to copy the virtualhost configuration when switching from port 80 (HTTP) to port 443 (HTTPS).

Notifications not sent to email addresses configured as account admin contact

Resolved an issue where notifications were not being sent to email addresses configured under Account > Settings > Contacts > Admin.

November 6, 2025

DigiCert® ONE version: 1.11351.3 | Trust Lifecycle Manager: 1.4939.0

Included in this release:

Enhancements

DigiCert Trust Assistant v1.2.9

This release resolves an issue where browser-based authentication flows failed for DigiCert​​®​​ Trust Assistant users whose Windows OS default language was set to a non-English language.

Fixes

Microsoft Outlook post-processing script failure

Resolved an issue where Microsoft Outlook post-processing script failed to match emails for DigiCert​​®​​ Trust Assistant when running on a non-English language OS.

November 5, 2025

DigiCert® ONE version: 1.11351.1 | Trust Lifecycle Manager: 1.4933.0

Enhancements

Updates to ACME Renewal Information window

The default ACME Renewal Information (ARI) window has been updated to better align with shorter certificate lifecycles.

  • Certificates with a total validity of 60 days or less will now have a 7-day default ARI window.

  • Certificates with a validity period greater than 60 days will continue to use the existing 30-day default ARI window.

November 3, 2025

DigiCert® ONE version: 1.11134.10 | Trust Lifecycle Manager: 1.4929.0

Included in this release:

New

Sectigo CA integration

DigiCert​​®​​ Trust Lifecycle Manager now supports integration with Sectigo Certificate Management (SCM) via a new Sectigo CA connector. This integration enables you to:

  • Discover and import all certificate types from your Sectigo account for centralized monitoring in Trust Lifecycle Manager.

  • Issue public TLS server certificates from Sectigo using the new Sectigo Public CA Server Certificate base template in Trust Lifecycle Manager.

  • Manage public Sectigo certificates (issuance, revocation, renewal) directly from your Trust Lifecycle Manager inventory.

  • Automate lifecycle management for Sectigo certificates using ACME or the managed automation solution for Trust Lifecycle Manager.

The new Sectigo Public CA Server Certificate template in Trust Lifecycle Manager supports the following enrollment and authentication methods:

Enrollment methods

Authentication methods

  • CSR

  • Browser PKCS12

  • Manual approval

  • Enrollment code

  • SAML IdP

  • REST API

  • 3rd Party app

  • Enrollment code

  • DigiCert agent

  • DigiCert sensor

  • Admin web request

  • 3rd-party ACME client

N/A

Important

To issue Sectigo certificates from Trust Lifecycle Manager, make sure the following requirements are satisfied in the connected Sectigo account:

  • At least one certificate profile is configured in Sectigo Certificate Manager (SCM).

  • At least one prevalidated organization and domain is available for certificate issuance in Sectigo. All certificate enrollment methods in Trust Lifecycle Manager require the organizations and domains to be prevalidated in Sectigo.

For more information, see the Sectigo CA connector guide.

DigiCert Trust Assistant v1.2.8

The DigiCert​​®​​ Trust Assistant v1.2.8 release includes the following new features:

  • Support for new extensions:

    • Fetch button added to obtain the SID value for domain-joined users during certificate enrollment via DigiCert One Login authentication method.

    • LEI, LEI-Role, and IAN Directory attributes via Manual authentication, Enrollment code, and SAML IdP authentication methods.

  • IoT Device Manager support for the .smpb (Structured Managed PKI Batch) extension enabling decryption of certificate and key batches generated from legacy MPKI systems for Manufacturing accounts.

  • Support for multi-byte characters in usernames and installation directories.

  • Support for download instructions for certificate profiles configured with the DigiCert One Login authentication method.

  • Support for viewing Issuer details on the Certificate details page.

  • Support for viewing real-time certificate revocation status on the Tokens page.

  • Enhanced system post-processing scripts to help support multiple languages.

  • Multi-user support for Windows Server 2019 and Windows 11 available across physical machines and virtual desktop infrastructure (VDI) environments. This allows a user to run multiple DigiCert​​®​​ Trust Assistant (DTA) instances simultaneously.

    Warning

    Known issue: For DTA users whose Windows OS default language is set to a non-English language, browser-based authentication flows (such as Manual approval, Enrollment code, and SAML IdP) may fail. Currently, multi-user functionality is supported on systems with English set as the default OS language. This issue will be resolved in an upcoming DTA release.

Self-service portal authorization for certificate requests

With this release, Trust Lifecycle Manager allows self-service portal administrators to configure the Authenticated portal with SAML attributes. This applies to each SSP-enabled certificate profile that uses either the SAML IdP or Manual approval authentication method.

Users accessing the Authenticated portal can be configured in your IdP with attributes that are sent to DigiCert​​®​​ as part of SAML assertion. These attributes can be used to authorize access by displaying the certificate profiles the user is permitted to view and enroll in.

To configure SAML attributes, go to Settings > Self-service portal and select the edit icon in the new Attributes column of the Portal-enabled certificate profiles table. You can then enter one or more attributes that are evaluated as OR conditions. For more information, see Self-service portal.

Audit log API endpoint returns total records for a filtered request

Starting with this release, the new audit log GET /mpki/api/audit-log/count API endpoint retrieves the total number of events and records for a filtered request. See the API documentation for more information.

Enhancements

DigiCert Trust Assistant - User Info as SID extension source

When you create a certificate profile, you can now select User Info as a source for the Security Identifier (SID) extension. This allows the SID value to be automatically retrieved from your IdP during certificate issuance.

Additional Subject DN fields for Public Client Authentication base template

Updated the Public Client Authentication (via CertCentral) base template to support these additional Subject Distinguished Name (DN) fields:

  • Job title (multi-valued string)

  • Serial number (single string value)

  • User Id (single string value)

  • Unique Identifier (single string value)

Order Id field

With this release, a new Order Id column and filter has been added to the Inventory > Certificates page, allowing you to filter CertCentral certificate records by their order id. The order id is displayed on the Certificate details page, and can also be included in custom reports.

Sensor release 3.9.12

New DigiCert sensor release with the following updates:

  • Updated version support for A10 connector

    • Versions qualified: 4.1.4-GR1, 5.2.1-P12, 6.0.4

    • Versions no longer qualified: 2.x.x

  • Upgraded the Docker OS to version 24.04

Allow full import action for CertCentral connector

With this release, the CertCentral integration is enhanced to allow full imports to be triggered at any time. When a full import is triggered, Trust Lifecycle Manager retrieves all certificate data from CertCentral based on configured import settings.

Fixes

Data missing in custom certificate reports

Resolved an issue where custom certificate reports were missing data when using DigiCert Agents operating on restricted ports.

Fixes included in DigiCert Trust Assistant v1.2.8
  • Added a remediation action for the following shell error encountered during DigiCert® ONE Login: Error: Failed to open: Error (0x13D)

  • Added a fix for an issue where certificates weren’t replicating from the DigiCert Software KeyStore to the Microsoft personal store.

Certificate installation on iOS devices fails with an unknown error

Resolved an issue with certificates not getting installed on iOS devices for profiles configured with iOS/ipadOS enrollment method. This was caused by an internal timeout during the certificate installation process.

A10 integration shows intermediate certificates instead of end-entity certificates

Resolved an issue with the A10 integration where intermediate CA certificates appeared in the Trust Lifecycle Manager inventory instead of the end-entity certificates.

Discovered certificates count mismatch

Resolved an issue where the discovery count was duplicated when the same certificate was detected from different sources.

October 16, 2025

DigiCert® ONE version: 1.11134.7 | Trust Lifecycle Manager: 1.4877.0

Fixes

Azure Key Vault appended with a random string

Resolved an issue where a random string was incorrectly appended to Azure Key Vault's certificate reference.

CertCentral connector goes into "Action needed"

Resolved an issue where a CertCentral connector goes into the Action needed state when the user triggers a Run now action and there are no certificates to import.

October 13, 2025

DigiCert® ONE version: 1.11134.4 | Trust Lifecycle Manager: 1.4870.0

Included in this release:

New

New CertCentral client authentication product type

Updated the Public Client Authentication (via CertCentral) base template to enable a new certificate product type called Client Auth, which supports the following additional Subject Distinguished Name (DN) and Subject Alternative Name (SAN) attributes under Certificate options. If there are multiple issuing CAs in your CertCentral account, you can now select the one that meets your requirements under Primary options.

Certificate field

Attributes

Subject DN

  • given_name

  • surname

  • unstructured_address

  • unstructured_name

  • dn_qualifier

  • description (maximum of 40 characters)

SAN

  • other_name.guid

  • directory_name

  • ip_address

  • registered_id

  • other_name.user_principal_name

Notice

Known limitations

The initial release of the new Client Auth product type won’t support the following:

  • RSA-PSS and ECDSA SHA-512 signing algorithms

  • DigiCert ONE Login authentication method for DigiCert​​®​​ Trust Assistant

Enhancements

Adobe base templates - support for SDN:email

With this release, the following Adobe base templates now support the Subject DN email attribute, which can be added when creating or editing a profile from either template:

  • Adobe Individual in Organization (via CertCentral)

  • Adobe Organization (via CertCentral)

October 8, 2025

DigiCert® ONE version: 1.11134.2 | Trust Lifecycle Manager: 1.4859.0

Included in this release:

New

Enhanced extensibility support

With this release, we are introducing enhanced extensibility capabilities that empower teams beyond engineering to create and manage custom sensor-based integrations. This functionality is available through the Developer role in DigiCert​​®​​ Trust Lifecycle Manager, enabling developers to:

  • Build and upload custom integrations directly to their account

  • Leverage these integrations to add new automation connectors

To help you get started we provide an example plugin repository, so you can focus on the unique aspects of your integration rather than the initial project setup.

Notice

To enable this feature for your account, contact your DigiCert Solutions Engineer or Sales representative.

Extension ordering and the option to remove Basic Constraints extension

With this release, you can now customize profiles created from any of the three generic base templates using these two new features:

  • Ability to remove the Basic Constraints extension for applications not requiring it or looking at issuing smaller certificates.

  • Set the order of the extension fields by selecting the Up or Down arrows for applications relying on a specific order of an extension.

Note

  • Ordering will be reflected when parsing a certificate with an ASN.1 standard decoder or OpenSSL. Correct ordering may not be present if parsing with a Windows or MacOS inbuilt UI parser.

  • The SAN extension will always be at the top of the extensions list, and the CDP extension, if present, will be included in the ASN.1 structure before the AKI extension. This is because the CDP extension is not visible within the Trust Lifecycle Manager profile.

  • These features enable DigiCert​​®​​ to issue certificates that comply with the Japan Electronic Signature Law.

Enhancements

SAML IdP for "External Private CA" and "Private Code Signing" templates

Updated the following base templates to support the SAML IdP authentication method, allowing you to externalize the authentication of certificate requests to your SAML IdP provider:

  • External Private CA

  • Private Code Signing

CertCentral support for Browser PKCS12 enrollments

Updated the following CertCentral base templates to support the Browser PKCS12 enrollment method, allowing issuance of certificates into a PKCS12 file with its associated password:

  • CertCentral Public Server Certificate

  • CertCentral Private Server Certificate

Note

This flow generates the keys and CSR at the client machine (not the server) via the user’s browser, and discards them upon the successful download of the certificate.

Sensor release 3.9.11

New DigiCert sensor release resolves a URL encoding issue when acting as a SCEP proxy.

Fixes

Sensor issue when used as SCEP proxy with the Certmonger SCEP client

Resolved an issue where the DigiCert sensor was not proxying SCEP requests correctly due to URL-encoding the target SCEP Server URL. This occurred when using the Certmonger client. This fix is included in sensor version 3.9.11.

Issues with enrollment pages on mobile devices

Resolved an issue with public-facing enrollment pages not auto-resizing on mobile devices.

Note

Public-facing enrollment flows are only officially qualified for Windows and Mac computers. However, with this fix the browser display on mobile devices is functional.

Unable to filter by scan status

Resolved an internal server error when filtering by the Scan status column on the Discovery & automation tools > Agents page.

September 29, 2025

DigiCert® ONE version: 1.10937.17 | Trust Lifecycle Manager: 1.4832.0

Fixes

IIS automation fails when a hostname is configured for a site

Resolved an automation issue where certificate installation failed on IIS when a hostname was configured for a site.

Important

To resolve the issue, run the Refresh configuration action on the failed agent and try automation again.

DigiCert Trust Assistant sign-in failures

Starting on September 23, 2025, users in the United States DigiCert® ONE production instance experienced issues with invalidated DigiCert​​®​​ Trust Assistant login sessions, affecting customers with a certificate profile configured with DigiCert Trust Assistant and the DigiCert ONE Login authentication method.

This issue was resolved with the September 26, 2025, release. All users logged in during the time of the issue must re-login to continue using the auto-enrollment and auto-renewal features for DigiCert Trust Assistant.

September 24, 2025

DigiCert® ONE version: 1.10937.15 | Trust Lifecycle Manager: 1.4822.0

Included in this release:

Enhancements

Agent release 3.1.4

A new ACME client is now available for all new and upgraded DigiCert agents.

Note

With the new ACME client:

  • All automation logs are consolidated under <agent_home>\logs\agent.log

  • Automated certificates are located in C:\Digicert or /etc/digicert

The agent is also updated to retain proxy configuration if no DigiCert sensor is available.

Fixes

Requesters not receiving enrollment emails

Resolved an issue where enrollment emails associated with the CertCentral Public Server Certificate and CertCentral Private Server Certificate base templates were not sent to the requester email value, but to the seat email value. With this fix, the enrollment emails are sent to the requester email value.

Tags and CA vendor filtering issue for custom certificate reports

Resolved an issue where custom certificate reports were not being initiated when filtering by Tags or CA vendor from the Inventory page.

September 19, 2025

DigiCert® ONE version: 1.10937.12 | Trust Lifecycle Manager: 1.4803.0

Fixes

Cannot override the validity period of MSCA profiles

Resolved an issue with not being able to override the validity period for profiles configured from the Microsoft CA Private Server Certificate base template with the Manual Approval authentication method. This is because the DigiCert​​®​​ Trust Lifecycle Manager profiles dynamically read the validity period from the Microsoft CA templates and cannot be changed at the time of admin approval. The option to override the validity period is now removed.

DigiCert agent - blocked automations

Resolved an issue where large-sized file scans caused delays in DigiCert agent automation operations and uploads. From this release, automation tasks for DigiCert agents can now run concurrently while system scans are in progress, reducing bottlenecks and improving overall agent efficiency.

September 17, 2025

DigiCert® ONE version: 1.10937.9 | Trust Lifecycle Manager: 1.4791.0

Included in this release:

Enhancements

Show SNI domain name with bindings for an endpoint

Enhanced the bindings section under Inventory > Endpoints to show the domain name used to identify the Server Name Indication (SNI) site. This enhancement allows administrators to identify sites more accurately.

Fixes

Duplicate certificate errors not detected at enrollment stage

Resolved an issue where duplicate certificate requests (outside the renewal window) weren't detected at the time of request submission for profiles configured with the Manual Approval authentication method.

Security Identifier (SID) extension with non-supported prefix characters

Resolved an issue where non-supported prefix characters in the Security Identifier (SID) extension were included in the CSR generated with Microsoft's certreq tool, which the DigiCert® Private CA platform was trapping and stopping certificate issuance. From this release, DigiCert​​®​​ Trust Lifecycle Manager will trim any leading characters encountered before the SID (S-x-x-...) value.

Browser PKCS12 certificate installation page

Reordered the steps to download the PKCS12 certificate. From this release, the Download button is enabled only after you copy the PKCS12 password to the clipboard.

Scan status filter not working

Fixed an issue with the Scan status filter.

Certificate drill-down not working

Corrected the filter count by including revoked certificates to show the accurate number of total certificates.

September 12, 2025

DigiCert® ONE version: 1.10937.7 | Trust Lifecycle Manager: 1.4767.0

Included in this release:

Enhancements

DigiCert PKI Platform 8 CA connector - retry process for key recovery failures

Enhanced the PKI Platform 8 CA connector to include a retry process for failed imports of recovery certificates.

Fixes

PKI Platform 8 CA connector data discrepancy

Resolved an issue where a data discrepancy was discovered in the PKI Platform CA connector process.

Intune GCC integration

Resolved an issue with certificate issuance using Azure GCC High Intune integration.

September 11, 2025

DigiCert® ONE version: 1.10937.5 | Trust Lifecycle Manager: 1.4763.0

Fixes

Admin web request - unable to submit

Resolved an issue where administrators were unable to use the Admin web request method to enroll a certificate with automated delivery.

September 10, 2025

DigiCert® ONE version: 1.10937.3 | Trust Lifecycle Manager: 1.4755.0

Included in this release:

New

DigiCert® Private CA connector support for additional enrollment flows

Enhanced the On-prem CA connector to support the three generic base templates (Device, Server or User) for issuing non-escrow certificates through the enrollment and authentication methods defined by each template, as listed in the following table:

Enrollment method

Authentication method

  • CSR

  • Browser PKCS12

  • Enrollment Code

  • Manual Approval

  • SAML IdP

  • DigiCert Trust Assistant

  • Enrollment Code

  • Manual Approval

  • SAML IdP

  • EST

  • Enrollment Code

  • TLM Certificate Auth

  • iOS/iPad OS

  • Enrollment Code

  • SCEP

  • Enrollment Code

  • REST API

  • 3rd Party app

  • Enrollment Code

For more information, see DigiCert On-prem CA connector guide.

DigiCert Trust Assistant v1.2.7

The DigiCert​​®​​ Trust Assistant version 1.2.7 release introduces the following new features and fixes:

Certificate recovery via PKI Platform 8 connector

Enhanced support to recover imported certificates from DigiCert​​®​​ Trust Lifecycle Manager using the DigiCert® PKI Platform 8 connector. For more information, see DigiCert PKI Platform 8 connector Guide.

DigiCert Software KeyStore for Windows upgrade

DigiCert Software KeyStore (for Windows) has been upgraded to enhance security and capabilities. DigiCert recommends upgrading DigiCert Software KeyStore Provider to version 1.0.7.

  • On Windows computers, you may see a banner prompting you to update both the User and Administrator PINs within 30 days. After this period, the keystore will be locked until the PINs are updated. DigiCert recommends following the instructions in the banner.

Resume option for non-escrow certificates

New option to resume certificate enrollment when a non-escrow certificate fails to install in DigiCert Trust Assistant during the issuance or enrollment process.

Fixes
CSR generation error in DigiCert Trust Assistant

Resolved the issue where users encountered a Failed to generate the CSR error when signing in to DigiCert Trust Assistant.

PostScriptService configuration error

Resolved the issue where users encountered the error message Service config not found for PostScriptService.

Improved error handling for port 8900 conflicts

Resolved the issue where users did not receive a clear message when port 8900 was already in use. DigiCert​​®​​ Trust Assistant now displays a proper error message in this scenario.

PIN prompt issue in Adobe Reader

Resolved the following issues when using certificates stored in the DigiCert Software KeyStore:

  • Windows: PIN prompt not appearing in the foreground. Requires upgrade to DigiCert Software KeyStore Provider v1.0.7.

  • macOS: Sign operation failing. Requires upgrade to DigiCert Software KeyStore Token v1.0.5.

Enhancements

PKI Platform 8 connector enhancements to support pushing/pulling of escrowed certs into Intune/DigiCert Trust Assistant

Enhanced the PKI Platform 8 connector to support three new options for imported/recovered PKCS12 certificates when selecting the recovery option in the connector:

  • Push imported escrowed certificates to a customer Intune tenant for onward provisioning.

  • Pull imported escrowed certificates into DigiCert Trust Assistant when configured with the DigiCert ONE Login authentication method, allowing manual or automated import of PKI Platform 8 escrowed certificates into DigiCert Trust Assistant.

  • Allow the imported certificate to be searchable via LDAP.

Fixes

Edit custom report not retaining previous field selection

Resolved an issue with the Edit Report functionality where previously configured schedules and permission settings were not retained. All configurations now remain intact when editing existing custom reports.

Whitespace trimming of DNS Name values during enrollment

Resolved an issue where DNS Name values entered with leading or trailing whitespaces caused validation failures during web-based enrollment. The system now trims any whitespace before or after the DNS Name value to prevent such errors.

Custom certificate report data inconsistency

Resolved an issue with data inconsistencies in custom certificate reports, where only the last partition of the report was streamed back to the UI during download.

Incorrect order of steps for non-English languages

Resolved an issue where the steps on the certificate pickup page appeared in the wrong order for non-English languages when using the Browser PKCS12 enrollment method.

Key type and size not retained when updating a profile

Resolved an issue where profiles did not retain the key type and key size(s) values set by a profile administrator upon saving the profile, and instead used the default key type and size(s).

September 3, 2025

DigiCert® ONE version: 1.10937.2 | Trust Lifecycle Manager: 1.4708.1

Fixes

5xx error in Health Check API

Resolved an issue where the Health Check API intermittently returned 5xx error codes, specifically 503 Service Unavailable, caused by response times exceeding 15 seconds due to downstream service calls.

August 25, 2025

DigiCert® ONE version: 1.10789.8 | Trust Lifecycle Manager: 1.4708.0

Fixes

DigiCert agents stuck in REFRESHING_CONFIG

Resolved an issue where DigiCert agents got stuck in the REFRESHING_CONFIG status during the internal daily batch refresh job.

August 21, 2025

DigiCert® ONE version: 1.10789.7 | Trust Lifecycle Manager: 1.4699.0

Included in this release:

New

DigiCert AutoEnrollment Server v.2.25.2.0

This release of the DigiCert AutoEnrollment Server supports the following:

  • Clear Data functionality (aka vacuum): New options to manually or automatically clear the records in RequestBufferData for requests that are in a Completed state. This helps reduce the internal database size and save space on the physical or virtual machine the AES server is running on.

  • ConfigureAES.bat script improvements: Enhanced the ConfigureAES.bat script to allow skipping specific configuration steps or exiting execution entirely.

  • Proxy UI enhancement: Added a separate field to specify the Proxy Port.

  • Platform support: Qualified support for Windows Server 2025.

REST API - GET custom-attributes/certificate endpoint

In this release, a new GET /custom-attributes/certificate API endpoint is introduced to retrieve the list of custom attributes for a specific certificate ID. For details, see the API endpoint documentation.

Enhancements

Inventory view enhancements

Updated DigiCert​​®​​ Trust Lifecycle Manager Inventory views to improve accuracy and clarity. Certificates marked as Replaced or Replaced external no longer appear in the active inventory. Instead, they are moved to the respective endpoint’s history, ensuring that only active certificates are displayed in the Inventory while maintaining full traceability in historical records.

CA Manager Profile – ACME Support for domain controller extension

With this release, the CA Manager Private Server Certificate profile is enhanced to support adding a Domain Controller as a Microsoft certificate template name extension while issuing certificates through a third-party ACME flow.

Fixes

Incorrect Discovery seat value in dashboard widget

Resolved an issue where the Seat usage by seat type widget in the dashboard displayed an incorrect Discovery seat value.

Unable to activate suspended profile

Resolved an issue where suspended profiles could not be activated.

Custom seat report not generating

Resolved an issue where custom seat reports were not being generated successfully.

August 13, 2025

DigiCert® ONE version: 1.10789.5 | Trust Lifecycle Manager: 1.4665.0

Included in this release:

New

Script distribution enhancements for agent workflows

With this release, Trust Lifecycle Manager introduces streamlined management and secure distribution of agent scripts that significantly reduces manual effort and improves operational efficiency in agent-related workflows. Key features:

  • Script repository: You can now access a centralized Scripts section in the Trust Lifecycle Manager web console to manage all custom scripts associated with agent workflows. For example: Admin web request post-delivery, agent pre/post-installation, and SNI.

  • Full CRUD support: You can perform Create, Read, Update, and Delete operations on your uploaded scripts directly through the web console.

  • Script upload with file association: During script creation, you can upload script files (up to 100KB), which are securely stored and tracked alongside metadata.

  • Automatic script distribution: Once a script gets assigned, Trust Lifecycle Manager securely distributes the script to all the applicable target agents, removing the need for manual file transfers.

  • Security and validation:

    • Pre-storage security scan: Uploaded script files are automatically scanned for malicious content before storage and distribution.

    • Allowed file size: Script uploads are restricted to a maximum file size of 100kB.

For more information, see Agent scripts.

Note

The new script management features are available for US and EMEA customers. Support for other regions will be rolled out soon.

Enhancements

Agent version 3.1.2

This agent update includes enhancements to support the new script management system with automatic script distribution.

DigiCert​​®​​ Trust Assistant - Microsoft Outlook configuration script update

Microsoft Outlook configuration script now supports both the 32-bit and 64-bit versions of the Microsoft Outlook application.

Important

The DigiCert Software keystore is not supported with the 32-bit Outlook application. You must switch to 64-bit Outlook or configure the DigiCert Trust Assistant profile with a different keystore (for example, Windows OS or Hardware token).

OID values for Extended Key Usage extension

For all Extended Key Usage (EKU) extension values configured within a profile, the OID value is now displayed alongside its friendly name.

Fixes

Same certificate recovery password

Resolved an issue where an administrator-initiated certificate recovery flow generated the same PKCS12 password for different certificates when performed in the same browser tab, instead of creating unique PKCS12 passwords.

Note

Initiating the recovery of a different certificate from a different tab is yielding a different password, as expected

User full name email template variable not included in customized email

Resolved an issue where custom email templates did not include the value for the {{userFullName}} variable in emails delivered to users.

Inventory – filter profiles with same name

Resolved an issue where an error displayed on the Inventory page when filtering by profiles with duplicate names.

Incorrect Discovery seat value in dashboard widget

Resolved an issue where the Seat usage by seat type widget displayed an incorrect Discovery seat value in the Dashboard.

August 6, 2025

DigiCert® ONE version: 1.10789.2 | Trust Lifecycle Manager: 1.4645.0

Included in this release:

New

Public Certificate scanning using a cloud-based scanner via DigiCert​​®​​ Trust Lifecycle Manager

With this release, Trust Lifecycle Manager introduces a new cloud-based scanning capability that enables you to discover TLS certificates on your public internet-facing infrastructure without the need to deploy any sensors. This feature leverages DigiCert’s cloud scanning infrastructure to provide you with early visibility into your TLS environments. Key features of the cloud scanner include:

  • Cloud scanner as a new source: Added as a certificate discovery method in Trust Lifecycle Manager.

  • Scan initiation from web console: You can initiate and configure cloud scans directly from the Trust Lifecycle Manager web console.

  • Target inputs: Import FQDNs/IP addresses for scanning.

  • Deep scan support: Includes TLS handshake and cipher suite details.

  • Port restriction: Scans are limited to port 443.

  • Scan management: Real-time progress display, scan cancellation, and timestamp of the last scan.

  • Scheduling: Supports both one-time and recurring scan schedules.

  • Caching: Scan results are cached for 8 hours.

Important

This feature is available for customers in the US and EMEA regions who have enabled the Network Discovery feature. Support for other regions will be rolled out soon.

Enhancements

Agent version 3.1.1

This agent update includes stability enhancements and resolves upgrade issues, including improvements related to ACME client support.

Sensor version 3.9.9

This sensor update includes a fix for a Citrix ADC installation issue that occurs when the sensor does not have access to all nodes in a high availability (HA) configuration.

Jamf Pro SCEP integration - automatic seat creation

The SCEP integration for Jamf Pro now supports automatic creation of seats in Trust Lifecycle Manager when Jamf-managed devices enroll certificates. This simplifies the configuration process by eliminating the need to manually create seats in advance.

For details about setting up the Jamf Pro SCEP integration with automatic seat creation, see SCEP integration guide.

Fixes

Button to download the DigiCert​​®​​ Trust Assistant client not showing

Resolved an issue where the button to download the DigiCert Trust Assistant client did not appear on the web page when it was not installed on the user’s computer.

DigiCert​​®​​ Trust Assistant AD publishing script for Mac

Resolved an issue where the DigiCert Trust Assistant automation script failed to publish to Active Directory when executed on macOS.

Allowed list validation logic with optional profile fields

Resolved an issue where certificate profiles configured with optional SAN:dnsName and/or SAN:ipAddress fields, along with an allowed/blocked list, triggered validation errors when those fields were missing from the certificate request.

Incorrect Discovery seat value in dashboard widget

Resolved an issue where the Seat usage by seat type widget displayed inaccurate Discovery seat values in the Dashboard.

July 30, 2025

DigiCert® ONE version: 1.10498.15 | Trust Lifecycle Manager: 1.4619.0

Included in this release:

New

New UI design and field visibility controls for public-facing enrollment pages

Enhanced all public-facing web enrollment pages with a new UI design. This enhancement delivers a new user experience, eliminates white space on the right-hand side of the page, optimizes page components to use a more appealing look and feel, and allows further control over both the branding and content being displayed on the page. Key enhancements include:

  • Customize the background color of public-facing pages directly from Settings > General > Branding.

  • Option to show or hide certificate fields that have a source of Fixed value when creating or editing a profile, allowing control over their visibility and corresponding values on public-facing pages.

  • Toggle to show or hide the Seat ID and Requestor email fields on public-facing pages when creating or editing a profile.

Enhancements

Revocation status sync with CertCentral

With this release, DigiCert​​®​​ Trust Lifecycle Manager automatically synchronizes the revocation status of certificates revoked in CertCentral. The updated status is reflected in the Trust Lifecycle Manager Inventory, ensuring accurate and up-to-date certificate tracking.

Underscore character support for dnsServer field

The SAN dnsServer field logic has been updated to support the underscore (_) character at the beginning of a hostname for private certificates only.

Note

If you already have a profile created with a SAN dnsServer field and need to use values with the underscore (_) character, you must remove the field from the profile and save it, then add it back after editing or saving the profile. Alternatively, you can create a new profile.

Fixes

Intune connector "Action needed" status

Resolved an issue where Intune-based profiles did not update to the Action needed status when the Intune secret was invalid. This issue affected test connection functionality and all certificate lifecycle operations, including enroll, import, and revoke.

From this release, when an invalid Intune secret is detected, all associated Intune profiles will be updated to the Action needed status. Profile administrators are notified by email and must update the secret before resuming all Intune operations.

Google Cloud Platform (GCP) connector stability improvement

This release includes a fix for an issue where the GCP unified connector could remain stuck in a Running status if a misconfigured load balancer was encountered during discovery. The connector now handles such scenarios and completes the discovery process as expected.

July 24, 2025

DigiCert® ONE version: 1.10498.11 | Trust Lifecycle Manager: 1.4601.0

Included in this release:

New

Intune‑SCEP support for Microsoft CA

With this release, the Intune base template supports issuing certificates from a Microsoft CA via Intune. To configure this feature, create a profile, select the Azure Auth authentication method, and choose your Intune connector.

AWS unified connector - allow ARN reuse

With this release, administrators can now configure the AWS unified connector to reuse existing ARNs by reimporting renewed certificates. This eliminates the need to update bindings across AWS resources such as ELBs and EC2 instances. This allows you to:

  • Save time by avoiding manual rebinding after renewal.

  • Maintain consistency across your AWS environments.

  • Simplify renewals for certificates bound to multiple targets.

Note

The following conditions apply when you reimport a certificate:

  • You can add or remove domain names.

  • You cannot remove all domain names from a certificate.

  • If Key Usage (KU) extensions are available in the originally imported certificate, you can add new extension values, but you cannot remove existing values.

  • If Extended Key Usage (EKU) extensions are available in the originally imported certificate, you can add new extension values, but you cannot remove existing values.

  • The key type and size cannot be changed.

  • You cannot apply resource tags when reimporting a certificate.

Enhancements

Regenerate RA certificate for MSCA profiles

For Microsoft CA profiles configured with the SCEP enrollment method, a new Re-generate RA Certificate button is now available on the Profile details page. This will help you regenerate the RA certificate used by the solution to decrypt SCEP requests before submitting request to the Microsoft CA for certificate issuance. This enhancement helps you to:

  • Prevent issues caused by an expiring RA certificate that may not be automatically renewed by DigiCert​​®​​ Trust Lifecycle Manager.

  • Generate a new RA key and certificate for a profile at any time, by supporting compliance with internal security policies.

Custom certificate serial number size

A new option in the profile wizard allows you to select a smaller serial number size (16 to 19 bytes) instead of the default 20 bytes (40 hexadecimal characters) for profiles configured with any of the three generic base templates.

This feature is useful when you want to reduce the size of a certificate, particularly in IoT use cases. However, DigiCert recommends using the default serial number size of 20 bytes, as it offers better security and reduces the possibility of serial number collisions.

Profiles listing feature for DigiCert Trust Assistant scripts

Enhanced the DigiCert​​®​​ Trust Assistant's Discovery & Automation tools > Scripts page to support a new Profiles configured with this script action. This action is added for every script and shows all the associated profiles configured with that script.

Sensor release v3.9.8

New Trust Lifecycle Manager sensor release with the following updates:

  • Bug fixes

  • Stability and vulnerability updates

Fixes

Unable to delete certificate owner

Resolved an issue that prevented deleting a certificate owner if the contact being deleted had the email address of a previously removed contact.

Unable to update certificate owner in certificate details page

Resolved UI issue when updating certificate owners via the Inventory > Certificate details page.

Unable to revoke certificates in bulk

Resolved an issue that was preventing bulk revocation of certificates when using Inventory 2.0 from the new certificate list page.

Resolved an issue that prevented bulk revocation of certificates when using the new Inventory UI -certificate list page.

Download custom report issue

Resolved issue where users were unable to download custom or scheduled certificate reports after they were generated.

Public S/MIME duplicate certificate issue

Resolved an issue where the duplicate check did not consider seat type or profile, causing issuance to fail for the same DN across different seat types. The logic now includes seat type or profile when performing duplicate checks.

July 18, 2025

DigiCert® ONE version:  1.10498.10 | Trust Lifecycle Manager: 1.4577.0

Fixes

CertCentral subdomain validation failures

Resolved an issue where CertCentral subdomains were not allowed to be submitted as part of web-based enrollment requests, even though the parent base domain had already been approved in CertCentral. The issue was introduced in the July 16 release, which implemented upfront CertCentral domain validation but considered only base domains.

July 17, 2025

DigiCert® ONE version: 1.10498.9 | Trust Lifecycle Manager: 1.4574.0

Fixes

DV flow failures on Linux sensor or agent

Resolved an issue where DV flow was failing for the Linux sensor or agent.

July 16, 2025

DigiCert® ONE version: 1.10498.8 | Trust Lifecycle Manager: 1.4572.0

Included in this release:

New

New inventory page and revamped table component

With this release, DigiCert​​®​​ Trust Lifecycle Manager introduces the new Inventory page, delivering enhanced functionality and a more intuitive user experience. Access to the Inventory page is available only if the feature is enabled for your account. This includes the following:

  • Streamlined interface: A cleaner layout with improved readability for more straightforward actions and data review.

  • Enhanced filters and Views: Quickly find what you need with robust filtering and customizable views.

  • Customizable table: Customize the table view to your workflow by displaying only the data that matters most, and resize or reorder columns as needed.

  • Clear bulk actions: Easy-to-find actions designed to help first-time users navigate all inventory options.

  • Total counters: New cards dynamically display total counts based on the applied table filters.

  • Enrollments: The Enrollments menu option has been moved to a dedicated tab within the Inventory page for ease of management.

For more information, refer to Inventory.

The new table component has also been implemented on most other pages that display lists in table format.

Note

You will not see these updates if your organization has chosen to continue using the legacy inventory and tables. The legacy displays will be decommissioned on August 30, 2025, after which all remaining accounts will automatically migrate to the new interface. To learn more and prepare for the transition, refer to Inventory (Legacy).

DigiCert Trust Assistant v1.2.6

The DigiCert​​®​​ Trust Assistant v1.2.6 release introduces the following new features:

Delete inactive certificates

Profile administrators can now configure an option for DigiCert Trust Assistant to delete inactive certificates and their associated private keys from the target keystore upon successful enrollment or renewal. This is particularly important for hardware tokens where storage space is premium.

Inactive certificates are defined as those with expired, revoked, or superseded (already renewed) status. Authorized profile administrators configure this option when setting up a profile with DigiCert Trust Assistant and any supported authentication method.

Note

This feature is not available for profiles configured with a Key encipherment, Key agreement or Data encipherment key usage extension to avoid accidentally deleting an encryption certificate and losing the ability to decrypt associated data.

AD publishing script for macOS machines

New Active Directory Publisher system script for domain-joined macOS machines is available under the Discovery & Automation tools > Scripts menu option. Like any other system script, it executes after a successful certificate enrollment, renewal, or recovery operation. From this release onward, the script can be bound to profiles configured with the DigiCert Trust Assistant enrollment method.

UI updates for the post-processing configuration section

With this release, profile administrators can now manage post-processing configuration settings directly from the UI, such as:

  • Enable or disable the Always Sign or Always Encrypt options directly from the UI. DigiCert Trust Assistant will automatically apply these settings upon successful certificate enrollment, renewal, or recovery for the Outlook script.

  • Configure an Active Directory FQDN directly from the UI for the macOS AD publishing script.

Outlook script enhancements

The enhanced Outlook system script now supports:

  • Multiple security profiles without requiring deletion of existing Outlook settings.

  • Configuration of multiple Outlook accounts on a single end-user machine.

Adobe terms and conditions

Support for displaying Adobe terms and conditions to users via the DigiCert Trust Assistant UI. Users must explicitly accept these terms before proceeding with the issuance or renewal of an Adobe Individual certificate on a hardware token. This applies to profiles configured with the DigiCert ONE Login authentication method.

Yubico management key encryption

DigiCert Trust Assistant now supports all the key combinations for Yubico management key encryption.

Domain validation for public-facing enrollments

For CertCentral public TLS Server CSR-based certificate requests, the submitted domain(s) are now validated against the list of validated domains in your CertCentral account. If all the domains are found in the validated list, the enrollment process continues. Otherwise, an error is displayed indicating the domain(s) that have not been validated.

Enhancements

Multivalue support for custom attributes

Enhanced custom attributes of the Dropdown field type to support setting multiple values via the UI and REST API.

Additionally, REST API-enabled profiles can now be configured with custom attributes of both Text field and Dropdown types. As part of this release, existing API endpoints have been enhanced and new endpoints introduced, as follows:

  • Enhanced the certificate and redeem endpoints to support the submission of custom attribute values.

  • Introduced two new APIs to add and delete custom attributes assigned to a certificate.

    • PUT /mpki/api/v1/custom-attributes/certificate/{id} - to add custom attributes for a certificate

    • DELETE /mpki/api/v1/custom-attributes/certificate/{id} - to delete custom attributes associated to a certificate

For more details, refer to API documentation.

Fixes

Internal server error when issuing via CSR with SAML IdP

Resolved an issue where manual enrollments were not being issued after approval if large internal notes were present. This has been fixed by splitting the Internal notes section under the Certificate details > Additional details tab into two separate sections:

  • Internal notes: Displays notes set against a certificate at the time of import

  • Enrollment notes: Displays the enrollment notes set during manual approval of an enrollment.

Error when manually approving a request

Resolved an issue where PUT requests failed when cookies were not accepted during login to Trust Lifecycle Manager. For example, saving a profile or approving an enrollment request failed.

July 9, 2025

DigiCert® ONE version: 1.10498.4 | Trust Lifecycle Manager: 1.4540.0

Included in this release:

New

Profile v3 API endpoints

With this release, Trust Lifecycle Manager introduces new version v3 of the GET profiles API endpoints to address inconsistencies in the Subject DN metadata for profiles based on the Public S/MIME Secure Email via CertCentral base template. With the v3 endpoints, these profiles now return multiple=true for the Subject DN given_name and surname fields, ensuring consistency with all other profile types.

For organizations with profiles based on the Public S/MIME Secure Email via CertCentral base template, DigiCert recommends switching to version v3 of the GET profiles endpoints to ensure consistent results and avoid data conversion issues that may impact certificate issuance workflows.

For more information, refer to the API reference.

Additional DNS integrations

DigiCert​​®​​ Trust Lifecycle Manager now supports 150+ new DNS integrations that you can use for domain validation in automation flows for both DigiCert agents and sensors.

These new DNS integrations include Akamai EdgeDNS, Azure DNS, Constellix, Google Cloud, Sonic, and many more.

Enhancements

Support additional EKUs for ECDSA profiles

Updated the three "Generic" base templates to support the following Extended Key Usages (EKUs) for profiles configured with the ECDSA key type:

  • Key encipherment

  • Data encipherment

Note

These EKUs are supported for legacy compatibility. However, DigiCert strongly recommends using the Key agreement EKU for ECDSA-based profiles instead of Key encipherment or Data encipherment.

Display email addresses for certificate owners

Enhanced the public-facing and self-service portal pages to display the email addresses of certificate owners.

Removal of custom identifiers for certificate owners

As an administrator, you can now remove custom identifiers when adding or updating a certificate owner from the Account > Settings > Contacts > Certificate owners page.

Public S/MIME for Intune support for "Secure Email for Business"

Updated the Public S/MIME Secure Email for Intune (via CertCentral) base template to support the Secure Email for Business (sponsor-validated) certificate type for both Multipurpose and Strict generation certificates.

Internal notes in certificate details

Enhanced the Inventory > Certificate details pages to show internal notes added by administrators for enrollment requests that are manually reviewed and either approved or rejected. These notes are shown in the Additional details > Internal notes section of the certificate details.

Fixes

Unlimited expiration of enrollment code for CSV upload flow

Resolved an issue where the unlimited expiration setting for enrollment codes was not applied to enrollments submitted through the CSV upload flow.

Network scans not completing

Resolved an issue where network scans remained stuck in the In progress status and failed to complete as expected.

Admin web request with ECDSA not working for AWS ACM

Resolved an issue where certificate delivery to AWS Certificate Manager (ACM) failed with error message CSR Generation failed when using the Admin web request enrollment method with the ECDSA key algorithm.

July 1, 2025

DigiCert® ONE version: 1.10272.9 | Trust Lifecycle Manager: 1.4501.0

Included in this release:

Enhancements

Public S/MIME for Intune support for Multipurpose generation certificates

Updated the Public S/MIME Secure Email for Intune (via CertCentral) base template to support Multipurpose generation certificates prior to the deprecation of Legacy generation certificates. Currently, Multipurpose generation only works with the organization-validated CertCentral Secure Email for Organization product type, where the Subject DN common name (CN) field will contain your validated email address.

Warning

Important notes:

  • You must create a new Intune Multipurpose profile before the Legacy generation certificate deprecation deadline (July 10, 2025).

  • If you do not create a new profile before the deadline, your Legacy profile will be automatically converted to use Multipurpose certificates and the CertCentral CertCentral Secure Email for Organization product type.

  • Support for sponsor-validated S/MIME certificates will be added in a subsequent release.

Upfront CSR validation

Updated the CSR parsing logic for profiles configured with the CSR enrollment method and Manual Approval authentication method. The system now performs upfront validation of the following items at the time of request submission, instead of failing at the time of issuance or when downloading the certificate after approval:

  • Duplicate certificates

  • MD5 signing algorithm

Fixes

Exception while fetching the certificate from Microsoft CA

Resolved an issue where requests for private server certificates through a Microsoft CA connector failed with the following error message:

Exception occurred while fetching the MS CA certificate, Please try again!

Seat creation time in the future

Resolved an issue where the seat creation time sometimes showed a time in the future. Seat creation times are now shown in GMT format.

Intune connector not available

Resolved an issue where the Intune connector type was not available unless the Automation account feature was enabled for your account. From this release, Intune connectors only require the Connectors account feature.

Profile details page not responding

Resolved an issue with the profile details page not responding due to an incorrect internal permission.

June 25, 2025

DigiCert® ONE version: 1.10272.7 | Trust Lifecycle Manager: 1.4478.0

Included in this release:

New

Policy-based rules for assigning custom attributes, owners, and tags to discovered certificates

With this release, Trust Lifecycle Manager introduces a new feature under Policies > Rules that allows administrators to configure rules to conditionally assign custom attributes, certificate owners, and tags to discovered or imported certificates.

Each rule defines the following options:

  • Conditions: Which certificates to assign the metadata to, based on certificate attributes such as the CA vendor, security rating, subject DN, issuing CA, and cryptographic properties. Multiple conditions can be combined using AND/OR operators.

  • Assignments: The metadata fields to assign to the matching certificates, which can include a mix of custom attributes, certificate owners, and tags.

  • Targets: The source of the imported or discovered certificates, which can include connectors, network scans, or system scans.

Once the rule is created, all subsequent import or discovery operations on the defined targets will automatically apply the metadata assignments to any certificates that match the conditions.

For more information, see Assignment rules.

Enhancements

DigiCert ONE Clients 1.2.0

DigiCert ONE​​ Clients 1.2.0 is now available for download from the Discovery & Automation Tools > Client Tools page.

For more details, refer to DigiCert ONE Clients release notes.

June 24, 2025

DigiCert® ONE version: 1.10272.5 | Trust Lifecycle Manager: 1.4469.0

Included in this release:

Enhancements

Enable automation for endpoints with IP Unreachable status

Automation actions are now enabled for endpoints listed in the Inventory > Unsecured view with an IP Unreachable automation status. This allows users to proceed with automation workflows on such endpoints, even if certificate discovery is unsuccessful.

Redirect port field removed for port 443 endpoints

While automating an unsecured endpoint on a Citrix appliance, the automation flow previously required a Redirect port, as Citrix uses this to convert HTTP to HTTPS (using the redirect URL as a bridge). However, since 443 is the default HTTPS port, users typically do not create HTTP endpoints on port 443. Additionally, in some cases, an HTTPS endpoint might already exist on port 443 without a certificate, requiring a certificate to be installed on the same port.

With this release, the Redirect port field has been removed from the Create automation page for Citrix endpoints using port 443.

Fixes

Self-service portal - additional download options

Resolved an issue where users were unable to download certificates from the self-service portal when selecting a certificate format under the Show additional download options section.

CSR enrollment failure for CertCentral connector

Resolved an issue where certificate issuance failed for CertCentral Public Server Certificate profiles using the CSR enrollment method if the submitted CSR did not include a SAN:dnsName. The issue was addressed by adding a checkbox in the profile configuration wizard to specify whether the SAN:dnsName field is required or optional (default is required). From this release, the certificate will be issued if the SAN:dnsName field is configured as optional, regardless of the source.

Internal server errors in CertCentral certificate requests for domains pending validation

Resolved an issue where users encountered an "Internal server error" when requesting a CertCentral Public Server Certificate for one or more domains in the pending validation state. These requests now display a friendly error to identify the cause of the error and indicate the domains that are pending validation.

Warning

Until all domains have been validated, the request will not go through and the certificate will not be issued.

June 18, 2025

DigiCert® ONE version: 1.10272.3 | Trust Lifecycle Manager: 1.4450.0

Included in this release:

New

Intune support for the Generic Private Server Certificate base template

From this release, the Intune integration now supports issuance of private server certificates via SCEP. To enable this, you need:

  • An Intune connector with your Intune tenant credentials to use for authenticating SCEP-based enrollment requests.

  • A certificate profile created from the Generic Private Server Certificate base template, configured with enrollment method SCEP and authentication method Azure Auth using the Intune connector.

In the Intune portal, you need a SCEP profile that corresponds to the certificate profile in Trust Lifecycle Manager.

For more details, refer to the Microsoft Intune SCEP integration guide.

Jamf Pro API integration with Trust Lifecycle Manager

Announcing the tight API integration of Jamf Pro with Trust Lifecycle Manager, in addition to the existing SCEP integration. Both integrations work to facilitate certificate issuance through your Jamf Pro mobile device management (MDM) environment.

For detailed setup instructions, refer to the Jamf Pro integration guide.

Enhancements

New comment section in certificate renewal form

Added a new Comments section to the certificate renewal page for manual approvals. When you receive the Your certificate is about to expire email (sent according to the profile configuration), you can now provide comments directly as part of the renewal process.

Fixes

Public S/MIME enrollment timeouts

Resolved timeout issues when requesting Public S/MIME certificates via instant flows, such as profiles configured with the REST API enrollment method.

Failure with EST profile creation

Resolved an issue that prevented creating or editing profiles using the EST enrollment method and Enrollment Code authentication method when no IP address was set in the allowed or blocked list.

Revocation requests with non-email address in Seat ID

Resolved an issue where revocation emails were not received by end users when certificates were revoked via API and Seat IDs contained non-email values. The system now checks for valid email addresses in other seat metadata (for example, Seat Email) or certificate fields (for example, SDN:email, SAN:rfc822Name), if available, instead of failing.

CertCentral Server SAN:dnsName field added to cert even though field is set as optional in the profile

Resolved an issue with the SAN:dnsName field being added to signed certificates associated with the CertCentral Public Certificate or CertCentral Private Certificate templates, even when the profile had the field set as optional. To address this issue, the profile configuration has been enhanced with the following functionality:

  • Added the Auto-copy to SAN:dnsName: Yes checkbox as a default, disabled setting.

  • The certificate preview will now show the DNS name even when it is not explicitly added as a SAN field in the profile.

Adobe Individual enrollment failure when multiple values are requested

Resolved an issue where Adobe Individual certificate requests failed when the profile was configured with the Given Name (GN) or Surname (SN) fields set to Multiple (the default configuration), but the request contained a single value.

From this release, the Multiple checkbox for GN and SN fields in Adobe Individual profiles has been removed. These fields now only support single values, as CertCentral supports only one value per field. For API requests that include an array of values, only the first value will be processed and all others will be ignored.

June 11, 2025

DigiCert® ONE version: 1.10272.2 | Trust Lifecycle Manager: 1.4416.0

Included in this release:

Enhancements

PKI Platform 8 connector - Partner Lab selection

Enhanced the DigiCert® PKI Platform 8 connector to support selecting the PKI Platform 8 system: either Production or Partner Lab. The Partner Lab option is available for customers with access to a test account in the Partner Lab environment.

IP allowlisting for EST profiles configured with passcode authentication

Added support for IP allowlisting on profiles configured with the EST enrollment method and the Enrollment Code authentication method. Devices submitting certificate requests via the EST protocol and authenticating with an enrollment code (passcode) can now be checked against an allowlist of valid IP addresses before certificate issuance. Configure the allowed devices in the Valid list of IP addresses section of the profile wizard.

Note

This feature is already supported for EST profiles configured with the TLS Certificate Auth authentication method.

Public key thumbprint and CSR hash

Updated the Certificate Signing Request (CSR) details pop-up to include the Public key thumbprint and CSR SHA-256 hash values. This pop-up is accessible from the Enrollment > Enrollment details pages (used by admins to manage enrollment requests) and from the public-facing enrollment pages.

The Inventory > Certificate details pages have also been updated to include a new property field called Thumbprint (SHA-256).

Audit log enhancements

Enhanced the Audit logs > Audit event details pages to reduce the amount of data stored per log event. Certificate-specific details are now available in a new siderail, allowing users to access this information separately. To open this new siderail, select the View certificate details link at the bottom of the event details page for a certificate.

Fixes

Incorrect trust type shown for profiles in the self-service portal

Resolved an issue where certificate requests created using the CertCentral Public Server Certificate base template displayed an incorrect Trust type value under the Certificate requests tab in the authenticated self-service portal.

June 4, 2025

DigiCert® ONE version: 1.10272.1 | Trust Lifecycle Manager: 1.4390.0

Included in this release:

New

DigiCert ONE Terraform provider

Announcing the release of the DigiCert Terraform Provider, enabling DevOps and platform engineering teams to seamlessly automate and manage the full lifecycle of DigiCert digital certificates using Infrastructure as Code (IaC) practices with Terraform.

Key features

  • Certificate request automation

    Automate the issuance of SSL/TLS and other digital certificates from DigiCert across environments directly through Terraform.

  • Lifecycle management

    Manage the entire certificate lifecycle, including requesting, renewing, and revoking certificates through declarative Terraform configurations.

  • API integration

    Integrate with DigiCert​​®​​ Trust Lifecycle Manager APIs to provide secure and policy-compliant automation aligned with enterprise requirements.

  • Stateful tracking

    Use Terraform state to track issued certificates and changes across deployments.

Use cases

  • Automate certificate issuance as part of CI/CD pipelines.

  • Enforce consistent certificate configurations across cloud infrastructure.

  • Eliminate manual certificate renewal tasks.

  • Rotate certificates easily for compliance or security reasons.

Support for minimum validity for duplicate certificates

With this release, the CertCentral Public Server Certificate template supports a new flow option to set the Duplicate minimum validity days. This option allows users to specify the minimum number of days a duplicate certificate must be valid when requested from CertCentral.

The following enrollment methods support this new option:

  • DigiCert sensor

  • DigiCert agent

  • 3rd-party ACME client

  • Admin web request

Enhancements

Self-service portal - Certificate times in 24-hour format

Certificate times in the self-service portal are now displayed in 24-hour format.

Audit log enhancements for SCEP

Audit logs now include the Seat ID value in failure events related to duplicate seat creation errors during SCEP operations.

Support for filtering certificates with no tags

Introduced an option to select Not available in the tag filter to display certificates that do not have any tags attached.

Optional key type and key size selection for 3rd-party ACME

Introduced an option to select key type and key size for 3rd-party ACME client flows in profiles created from the CA Manager Private Server Certificate template. This enables users to select additional key usages when available. For example, if the key type is set as RSA, users can select "Key encipherment" as a key usage.

Fixes

Generic permissions error for "User and certificate manager" role

Resolved an issue where users assigned the User and certificate manager role encountered a generic permissions error when attempting to view certificate profiles or approve enrollment requests.

AWR creates single SAN when multiple are entered for Microsoft CA

Resolved an issue with adding the common name (CN) as a SAN in Microsoft CA AWR flows.

Certificates by CA vendor dashboard does not direct to inventory

Resolved an issue where the Certificates by CA vendor dashboard chart was not clickable and did not support drill-down into the Inventory view.

May 29, 2025

DigiCert® ONE version: 1.10046.9 | Trust Lifecycle Manager: 1.4361.0

Included in this release:

Enhancements

Updated PQC Dilithium OIDs

Updated the supported Dilithium ML-DSA OIDs to the final/approved set:

  • MLDSA-44: 2, 16, 840, 1, 101, 3, 4, 3, 17

  • MLDSA-65: 2, 16, 840, 1, 101, 3, 4, 3, 18

  • MLDSA-87: 2, 16, 840, 1, 101, 3, 4, 3, 19

Agent version 3.1.0

This agent update includes stability fixes and foundational enhancements to support future updates aimed at improving automation capabilities.

Fixes

Custom seat report failing with seat type filter

Resolved an issue where custom seat reports failed to generate when a Seat type filter was applied from the Seats page.

Custom certificate report ignoring CA vendor filter

Resolved an issue where custom certificate reports did not apply the CA vendor filter when selected from the Inventory page.

CSR enrollment failing for MSCA certificates with 4096-bit key size

Resolved an issue where 4096-bit key size enrollment failed for Microsoft CA certificate profiles due to the system incorrectly expecting a 2048-bit key size.

May 21, 2025

DigiCert® ONE version: 1.10046.5 | Trust Lifecycle Manager: 1.4342.0

Included in this release:

New

Support for DigiCert On-prem CA connector

With this release, DigiCert​​®​​ Trust Lifecycle Manager introduces support for DigiCert On-prem CA as a new certificate authority (CA) connector. You can use this connector to issue and revoke certificates from your DigiCert On-premises Private CA, using the following profiles:

  • CA Manager Private Server Certificate

  • CA Manager Private mTLS Certificate

The DigiCert On-Prem CA connector also supports certificate discovery from the on-premises CA through:

  • Full import when discovery is enabled

  • Periodic incremental import

  • Revocation status updates for existing certificates in Trust Lifecycle Manager inventory

Warning

To set up this integration, the DigiCert On-prem CA feature must be enabled for your account. Contact your DigiCert system administrator or account representative if you need help.

DigiCert Trust Assistant v1.2.5

The DigiCert​​®​​ Trust Assistant v1.2.5 release includes the following enhancements and fixes.

Enhanced deliver escrowed certificates for matching enrollment requests option

Profile administrators can now enable the Deliver the escrowed certificate for matching enrollment requests option. This option is available for DigiCert Trust Assistant enabled profiles that are configured with the DigiCert ONE Login authentication method. When enabled, the same escrowed certificate (with the same serial number) is delivered to the end user after recovery. A new escrowed certificate (with a different serial number) is not issued. To use this feature, the following profile settings must be set:

  • Duplicate certificate: Checkbox not selected

  • DigiCert Cloud Key Escrow:  Checkbox selected

Fixes
Timeout error during initial DigiCert Trust Assistant sign-in

Resolved a timeout error that occurred during the first connection to the DigiCert backend when users signed in via DigiCert Trust Assistant.

Sign-in process expired error shown during successful sign-in

Resolved an issue where a Sign-in process expired error was incorrectly displayed during a successful sign-in via DigiCert Trust Assistant.

Enhancements

Public S/MIME profile wizard enhancements

For profiles created from the Public S/MIME Secure Email (via CertCentral) base template, the profile wizard's clone and edit pages have been enhanced to allow all fields to be edited, including the Generation type. This enhancement allows selection of the Multipurpose or Strict generation types. These replace the soon-to-be-deprecated Legacy generation type.

Custom seat reports

Enhanced the custom reports for seats to support the Email address and Consumed fields.

Fixes

Inventory showing duplicate records

Resolved an issue where duplicate records appeared in the inventory when a network scan or agent discovered the same certificate.

Path length 0 for external private CA

Resolved an issue where setting the Basic Constraints extension with a Path length of 0 (indicating the end of the certification chain) was not supported. Additionally, a tooltip has been added to provide information about this value. It indicates that if the Path length value is left empty, the Path length will have a value of none.

May 15, 2025

DigiCert® ONE version: 1.10046.4 | Trust Lifecycle Manager: 1.4315.0

Included in this release:

Enhancements

Removal of non-ratified PQC keys/algorithms

Removed support for Composite and Falcon post-quantum cryptography (PQC) certificates, as these algorithms are still under active development and considered experimental. To learn more or test these PQC certificate types, visit the DigiCert LABS website.

Fixes

Enrollments page not loading for EST profiles

Resolved issue with loading the Enrollments page for customers issuing certificates from profiles configured with EST enrollment and the TLS Certificate Auth authentication method.

May 14, 2025

DigiCert® ONE version: 1.10046.3 | Trust Lifecycle Manager: 1.4309.0

Included in this release:

New

ServiceNow v1.7.0

ServiceNow app version 1.7.0 released for DigiCert​​®​​ Trust Lifecycle Manager with the following new features and enhancements:

  • mTLS support on ServiceNow connector: The ServiceNow connector in DigiCert® ONE has been enhanced to optionally support mTLS certificate authentication for all connections to the target ServiceNow instance. Previously, only username and password authentication was supported.

  • Multi-format certificate download: Users can now download certificates in various formats directly from the Certificate details page, providing greater flexibility.

  • CSR update on renewal: Added the option to upload a new Certificate Signing Request (CSR) while renewing a certificate, providing more control over the renewal process.

  • Auto-approval for certificate renewals: Certificates within the renewal window can now be auto-approved when this feature is enabled in the associated profile, eliminating the need to manually approve renewals.

  • Microsoft CA Base Template: The Microsoft CA Private Server Certificate base template now supports the CSR enrollment method with Manual Approval, which improves compatibility with Microsoft CA environments.

  • Certificate enrollment flow: The Country Code field now uses a dropdown menu, enhancing accuracy and ease of use during the certificate enrollment process.

  • Compliance update / DigiCert Privacy Notice:  A privacy notice has been added to all application pages to meet ServiceNow compliance requirements.

DigiCert AutoEnrollment Server v.2.25.1.1

This release of the DigiCert AutoEnrollment Server includes:

  • Enhancement: Upgraded the internal OpenSSL library to version 3.3.3.

  • Fix: Resolved an issue where the AutoEnrollment Server failed to run on Windows Server 2019 when the log level was set to INFO.

Enhancements

Key recovery support for non-API profiles

Enhanced the certificate and recover API endpoints to allow the recovery of escrowed certificates for profiles that do not use the REST API enrollment method but have the DigiCert Cloud Key Escrow feature enabled.

Profile escrow option for DigiCert Trust Assistant - DigiCert ONE Login

For profiles configured with the below settings, a new option labeled Deliver the escrowed certificate for matching enrollment requests is now available under the Flow Options > Key escrow options > DigiCert Cloud Key Escrow section to allow delivery of the same escrowed certificate to end users for matching enrollment requests:

  • Enrollment method: DigiCert Trust Assistant

  • Authentication method: DigiCert ONE Login

  • Duplicate certificate: Checkbox not selected (The option is only available when this checkbox is not selected.)

  • DigiCert Cloud Key Escrow: Checkbox selected (This option is only available when the checkbox is selected.)

    • Deliver the escrowed certificate for matching enrollment requests: Checkbox selected

CertCentral domain validation check for web-based enrollments

Enhanced the web-based enrollment flow for public TLS server certificates requested from CertCentral to verify whether the requested domains have been prevalidated. If not, the following error is displayed before submitting the request:

Domains in email addresses must match a prevalidated domain in the CertCentral account. Check the following email address and try again: <email-address>

PKI Platform 8 CA connector - Seat ID value replication

Enhanced the DigiCert® PKI Platform 8 connector to match the Seat ID values from PKI Platform 8 when importing certificates into Trust Lifecycle Manager. Previously, Trust Lifecycle Manager assigned seat IDs for imported certificates using the common name plus a timestamp.

Important

  • If you already imported certificates from your PKI Platform 8 account into Trust Lifecycle Manager, and would prefer for the seat IDs to match the ones in PKI Platform 8, contact your DigiCert account representative for help.

  • For new imports, if the seat ID values in PKI Platform 8 match existing seat IDs already present in your Trust Lifecycle Manager account, the existing certificates and the newly imported certificates will be bound to the same seat IDs.

  • You can use the certificate-search API endpoint to search for imported certificates by seat ID and tags (if configured in the PKI Platform 8 connector). The response returns all associated certificates in an array.

Fixes

Truncated CN and dnsServer values on Enrollment details page

Resolved issue where common name (CN) and SAN:dnsServer values were truncated on the Enrollment details page for enrollment requests for certificate profiles that use the Manual Approval authentication flow.

Sensor version 3.9.7

This sensor update includes the following fixes:

  • Added support for organizations without a state value when used with NetScaler.

  • Resolved an issue where the Trust Lifecycle Manager plugin manager (TPM) would enter a panic state under specific conditions.

Agent version 3.0.16

This agent update resolves an issue where the TPM would enter a panic state in specific conditions.

Unable to cancel or delete enrollments with failed or rejected status

Resolved issue where users were unable to delete or cancel enrollments when the associated profile had been deleted. Users can now cancel the request.

SNI enabled agent is not able to parse large list of domains

Resolved issue where the agent failed to process large domain lists returned from custom SNI scripts.

May 7, 2025

DigiCert® ONE version: 1.10046.1 | Trust Lifecycle Manager: 1.4275.0

Included in this release:

New

Certificate owners

With this release, DigiCert​​®​​ Trust Lifecycle Manager introduces a new feature that allows authorized administrators and users to create and manage certificate owners as additional contacts that can be associated with a certificate. This feature is supported for certificates associated with the following seat types:

  • Certificate management (excluding certificates issued from profiles associated with the Microsoft CA User Certificate base template)

  • Discovery

  • Organization (excluding certificates issued from profiles associated with any of the eIDAS base templates)

  • Server

The email address of the certificate owner will be used to send certificate lifecycle notifications, such as renewal emails.

Where can I configure contact information for certificate owners?

You configure certificate owners from the Account > Settings > Contacts page, which now includes the following two tabs:

  • Admin: The admin contact details page.

  • Certificate owners: A new page where authorized users can create and manage certificate owners.

Who can view, create, and manage certificate owners?

The Account > Settings > Contacts > Certificate owners tab is visible only to users with the View certificate owners permission. Only administrators with the Manage certificate owners permission can create, edit, or delete certificate owners.

Trust Lifecycle Manager now includes a new Certificate owners manager user role. This role includes the Manage certificate owners permission and can be assigned to users who need to manage certificate owners.

How can I assign owners to a certificate?

You can assign owners to certificates in the following ways:

  • Certificate profiles: Admins can set owners within a certificate profile to assign the owners to every certificate issued or renewed from that profile.

  • Public-facing enrollment pages: For certificate profiles that use web-based enrollment methods (Browser PKCS12, CSR, or DigiCert Trust Assistant), admins can use the following options to control whether users can assign additional owners at the time of enrollment:

    • Allow assigning more owners: If enabled in the profile, the enrollment page includes a dropdown where the requester can select additional certificate owners from your account settings.

    • Allow creating/assigning custom owners: If enabled in the profile, the enrollment page includes an option for the requester to create a new owner and assign it to the certificate.

  • Self-service portal: To allow users to assign owners from the self-service portal, enable the Manage certificate owners action in the portal settings. If enabled, authenticated portal users can select Update certificate owners to manage the list of assigned owners for certificates they have access to.

  • REST API: You can manage and assign certificate owners via API for the following use cases:

    • Use the new Certificate owners API controller to view and manage owner contacts or assign owners to existing certificates in your account.

    • The certificate endpoint now supports a cert_owner_ids property in the JSON request body to assign one or more owners when issuing a certificate via API.

    • For more details, refer to API reference for Trust Lifecycle Manager.

What will happen when I renew my certificate?

When you renew a certificate, it inherits certificate owners from the following sources:

  • The certificate being renewed.

  • The associated profile.

  • The certificate renewal form submitted by users, if the appropriate profile options are set.

For more information, see Certificate owners.

Enhancements

Additional delivery option for CertCentral Public Server Certificate template

Updated the CertCentral Public Server Certificate base template to support the PKCS#7 certificate delivery option for profiles configured with the REST API enrollment method. This option was previously supported for other web-based enrollment methods.

Qualys connector imports end entity certificates only

Enhanced the Qualys connector to import only end-entity certificates into inventory, excluding individual root and intermediate certificates.

Fixes

Hello API endpoint

Resolved issue where submitting a hello API request to a client-auth-enabled endpoint responded successfully even when no client certificate was included in the HTTP header. The endpoint now returns the error message JWS token is not provided if the certificate is missing.

MSCA - cannot issue more than 18 DNS SANs

Resolved issue with the character length limit that previously blocked the issuance of more than 18 DNS SANs. The new limit is now 100 SANs.

Admin web request fails to generate CSR

Resolved issue where the Admin web request enrollment flow failed to generate a CSR when the Subject DN contained an O field with a "/" character.

Connector flow is rating code signing and user certificates as not secure

Resolved issue where the Security rating was incorrectly evaluated for user, code signing, and user certificates.

Unable to add recipients to agent, sensor, scan, connector lifecycle notifications

Fixed regression issue where the Trust Lifecycle Manager web console did not allow adding new recipients to agent, sensor, scan, and connector notifications.

Automation notification not honoring the recipient list

Resolved issue where automation notifications were not being sent if the "Requester" was removed from the recipient list.

MSCA connector not reporting correct MSCA certificates

Resolved issue where managed certificates were incorrectly appearing under the "Discovered" category in the connector details page.

April 30, 2025

DigiCert® ONE version: 1.9735.9 | Trust Lifecycle Manager: 1.4248.0

Included in this release:

New

DigiCert Trust Assistant v1.2.4

The DigiCert​​®​​ Trust Assistant v1.2.4 release includes the following new features.

Multi-language support

From this release, DigiCert Trust Assistant supports multiple languages across all pages and messages within the client.

  • If a translation for a new label or message is unavailable, the default language is English.

  • The user interface automatically reloads when a different language is selected.

  • Supported languages are English, Dutch, French, German, Italian, Japanese and Spanish.

Automated configuration enhancements

The extra-config.json file has been enhanced to allow administrators to configure new options that can be pushed to the users via GPO or any software distribution solution:

  • dcTlsClient > timeoutSec

    Configure network timeout duration for the DigiCert Trust Assistant client.

    {
      "setting": {
        "dcTlsClient": {
          "timeoutSec": <timeout in seconds>
        }
      }
    }
  • PostScriptService > msTimeout -

    Configure the timeout value for the execution of post-processing client scripts

      "services": [
        {
          "name": "PostScriptService",
          "setting": {
            "msTimeout": <timeout in milliseconds>
          }
        }
      ]
    }
    
  • CertMgmtService > notifyAfterEnrollRenewRetryCount

    Define the number of auto-enroll/auto-renew retry attempts before displaying a failure notification to the user within the DigiCert​​®​​ Trust Assistant dashboard. Each retry occurs at a 5-minute interval. If the operation succeeds during any retry, no notification is shown to the user. Even after a failure notification appears, DigiCert​​®​​ Trust Assistant continues to retry silently every 5 minutes until the job succeeds. Once successful, the notification is automatically cleared, and subsequent executions follow the default 24-hour schedule.

    {
      "services": [
        {
          "name": "CertMgmtService",
          "setting": {
            "notifyAfterEnrollRenewRetryCount": <retry count (default 5)>
          }
        }
      ]
    }

    Note

    The notification is not pushed to the operating system’s notification center. Users will only see it if they explicitly open the DigiCert Trust Assistant dashboard.

Windows start menu - Launch DigiCert Trust Assistant dashboard with ease

You can now quickly open the DigiCert Trust Assistant Dashboard directly from the Windows Start menu using the new DigiCert Trust Assistant – Open Dashboard shortcut. This provides one-click access to the Dashboard.

Post-processing script certificate recovery enhancements

For profiles configured with the Digicert Cloud Key Escrow option, the DigiCert ONE Login authentication method and the auto-recovery feature, the scripts assigned to the profile are executed automatically upon successful auto-recovery (either via sign-in or initial sign-up). The key updates include:

  • Only valid (non-expired) certificates are considered.

  • If multiple certificates are recovered from the same profile, the script runs against the one with the longest validity, skipping the rest.

  • If auto-recovery succeeds, an Auto recovery success message is shown in the Notifications pane.

  • If auto-recovery succeeds but post-processing fails, a Failed post-processing scripts message appears in the Notifications pane, along with a link to Rerun failed scripts. This notification and link are no longer shown for the expired certificates.

Archive report enhancements

The archive report has been updated with the following enhancements:

  • A new UI option allows users to select the date and time for generating an encrypted ZIP file, which can be used to diagnose issues.

  • A new option is added to change the Log level value to Detailed - Debug level.

  • Display the file path where the ZIP file will be saved.

GCP unified connector - Support for application default credentials

From this release, the Google Cloud Platform (GCP) unified connector now supports an additional authentication option to allow users to configure the application default credentials so the sensor can use one of the following sources configured on the sensor host:

  • A service account key JSON file whose path is defined in the GOOGLE_APPLICATION_CREDENTIALS environment variable.

  • A credentials file created using the gcloud auth application-default login command and placed in the well-known path.

This approach enables users to manage credentials locally on the sensor used for integration. When configuring the connector, select Authentication type > Application default credentials.

Enhancements

Show CertCentral order id in certificate details

This enhancement applies only when the Automation feature is enabled for your account.

Added the CertCentral order ID for each certificate issued through the linked CertCentral account. To view the order ID in your Trust Lifecycle Manager inventory, select the certificate > Automation.

Enhanced SAN input user experience for automation flows

Added a new Add button to allow users to explicitly add SAN attributes without using the Enter key. This update applies to both certificate delivery and lifecycle automation flows.

Fixes

Renewal notifications

Resolved issue where certificate renewal reminder emails were sent 90 days before expiry, even when the default renewal window in the profile wizard was set to 30 days.

Entrust connector fails to import certificates

Resolved issue where the Entrust connector would fail if one of the certificates being imported had an issue. The connector has been updated to skip such certificates and proceed with importing the others.

Microsoft CA issuance not working for REST API flows

Resolved issue where Microsoft CA issuance was failing for the REST API enrollment method.

April 24, 2025

DigiCert® ONE version: 1.9735.7 | Trust Lifecycle Manager: 1.4217.0

Fixes

Public S/MIME (CertCentral) key escrow failing due to parsing error

Resolved issue with the recovery of public S/MIME escrow certificates that failed due to an internal parsing error in enrollment flows configured with the Digicert cloud key escrow profile option.

April 23, 2025

DigiCert® ONE version: 1.9735.5 | Trust Lifecycle Manager: 1.4215.0

Included in this release:

New

Key escrow and recovery for PQC certificates

Added support for the DigiCert cloud key escrow feature for post-quantum cryptography (PQC) certificates issued through Trust Lifecycle Manager. Supported PQC key types and algorithms include:

  • Dilithium

  • Falcon

  • SPHINCS+

To enable the cloud key escrow option for PQC certificates, create certificate profiles from one of the following base templates. Enable escrow in the Flow options section of the profile.

  • Private Secure Email S/MIME

  • Generic User Certificate

Warning

Known issue: PQC certificates that contain the Unique Identifier field in the SAN extension are not being successfully recovered.

Support for UltraDNS

With this release, Trust Lifecycle Manager introduces support for UltraDNS as a DNS integration. The UltraDNS connector can be used to automate domain validation for the same enrollment methods as the other DNS connectors.

Enhancements

Support for Email and IP address fields for Microsoft CA certificates

The Microsoft CA Private Server Certificate template now supports Email and IP address attributes in the Subject DN and SAN fields.

Fixes

DigiCert Trust Assistant - Script removal from profile

Resolved issue where DigiCert​​®​​ Trust Assistant scripts were not removable from associated profiles.

Custom role for add connector needs manage profile permission

Resolved issue where the Manage profile permission was incorrectly required to use the Add connector flow.

Private CA chaining issues when multiple ICAs are present

Resolved issue with the chaining logic when multiple intermediate CAs (ICAs) are present and signed by the same private CA root.

MSCA connector stuck in running state

Resolved issue with CA connectors where the connector remained in the Running status when the certificate Import option was disabled on the configured connector.

April 17, 2025

DigiCert® ONE version: 1.9735.4 | Trust Lifecycle Manager: 1.4183.0

Included in this release:

Enhancements

Public S/MIME Legacy warning and profile changes

As part of the Public S/MIME initiative to remove support for Legacy generation certificates on July 1, 2025 (see Knowledgebase article), the profile creation wizard now displays a warning if you select the Legacy generation option when creating a Public S/MIME certificate profile. The warning reminds users of the sunset date for Legacy certificates and strongly recommends choosing Multipurpose or Strict generation instead.

Fixes

Authenticated self-service portal errror

Resolved issue with accessing the authenticated self-service portal where, after successfully authenticating via single sign-on (SSO) to an identity provider (IdP), the portal was displaying a blank page with an im_auth_error messsage.

April 16, 2025

DigiCert® ONE version: 1.9735.3 | Trust Lifecycle Manager: 1.4177.0

Included in this release:

New

Workspace ONE integration with Digicert

Announcing the formal qualification of Omnissa’s WorkSpace ONE integration with DigiCert​​®​​ Trust Lifecycle Manager, supporting a tight API integration for issuance of escrowed certificates.

For more details, see API integration guide.

Enhancements

SID extension for Citrix FAS Smartcard Logon

Updated the Citrix FAS Smartcard Logon based template to support the issuance of certificates including a Security Identifier (SID) extension (OID: 1.3.6.1.4.1.311.25.2).

Intune connector "Action needed" status

Enhanced the Microsoft Intune connector to capture error flows that occur after deleting a secret from the Azure portal and attempting to sync devices. From this release, the associated profiles are updated to the Action needed status. Failure audit log events are generated with the following message:

Unexpected error occurred during validation – update connector.

DigiCert Trust Assistant Enhancements
  • Outlook script - software not installed

    Updated the error message displayed when Outlook is not installed on a target user's machine where the DigiCert​​®​​ Trust Assistant attempts to execute the Outlook post-processing script, to include a reference to the required version: Outlook 2016 (64-bit). The following is the new error message:

    Outlook is not installed. Make sure Outlook 2016 (64-bit) is installed on the target machine. Reach out to your administrator for further assistance.

  • Active Directory (AD) publisher script - updated status for previously published certificates

    Updated the AD Publisher script to show the status as Completed instead of Failed when publishing a certificate that had already been published by a previous enrollment flow.

Fixes

Missing Subject DN and SAN fields section

Resolved issue with the Subject DN and SAN fields section not being shown after editing a profile configured with the CSR enrollment method, using the CertCentral Private Server Certificate template.

PKI Platform 8 connector

Resolved an issue where import attributes were not allowed in a new connector if they were set in a previous connector in an inactive state.

April 9, 2025

DigiCert® ONE version: 1.9735.2 | Trust Lifecycle Manager: 1.4152.0

Included in this release:

Enhancements

Intune S/MIME encryption certificates and template name change

Updated the Public S/MIME (Digital Signature only) for Intune (via CertCentral) template and renamed it to Public S/MIME for Intune (via CertCentral). This template now supports issuance of non-escrowed encryption certificates in addition to digital signature certificates. The template scope is now set to Unlimited, making it accessible to all customers.

Deprecation of Public S/MIME Secure Email (via PKI Platform 8) template

Removed the Public S/MIME Secure Email (via PKI Platform 8) base template, as PKI Platform 8 no longer supports the issuance of Public S/MIME certificates. From this release, Public S/MIME certificates must be issued using the equivalent base templates available in CertCentral. These templates use trusted public issuing CAs configured on real CertCentral accounts. Ensure your system is connected using a DigiCert CertCentral connector. For setup information, see Link to CertCentral.

Profile validity period

Additional validations have been added when setting the certificate validity period in a profile. If the defined validity period is more than the validity allowed by the base template and the expiration date of the associated issuing CA, then the following error message is displayed:

You have exceeded the max validity period for the certificate template or the issuing CA. We will round the value to match the maximum validity period.

CertCentral connector - Connect multiple CertCentral accounts via DigiCert single login

You can now add multiple CertCentral connectors for different CertCentral accounts via DigiCert single login. This enhancement allows admins to connect Trust Lifecycle Manager to multiple CertCentral accounts available from their DigiCert single login account.

GCP unified connector - Automate certificates for HTTP-to-HTTPS redirects

The Google Cloud Platform (GCP) unified connector now supports automating TLS certificate deployments for HTTP-to-HTTPS redirects for the following GCP load balancer types:

  • Global external Application Load Balancer

  • Global classic External Application Load Balancer

  • Regional external Application Load Balancer

Seat ID mapping support for SAN:URI

Updated the list of allowed profile fields for creating a Seat to include support for the SAN:URI (Uniform Resource Identifier) extension value.

Fixes

Missing Subject DN and SAN fields section

Resolved issue with the Subject DN and SAN fields section not being shown after editing a profile configured with the CSR enrollment method, using the CertCentral Private Server Certificate template.

April 2, 2025

DigiCert® ONE version: 1.9735.1 | Trust Lifecycle Manager : 1.4121.0

Included in this release:

New

Google Cloud Platform (GCP) support certificate delivery to certificate maps

GCP Unified Connector now supports certificate delivery to certificate maps configured in GCP Certificate Manager using the Admin web request function. With the enhanced GCP unified connector, user can deliver the certificate using the following options:

  • An existing certificate map with an existing certificate name.

  • An existing certificate map with a new certificate name.

  • A new certificate map with a new certificate name (created by DigiCert​​®​​ Trust Lifecycle Manager during delivery).

Enhancements

Extended support for additional tag characters

You can now use letters (a–z, A–Z), numbers (0–9), number signs (#), spaces, colons (:), periods (.), ampersands (&), and at symbols (@) in addition to the existing characters, when setting tags . This enhancement helps you easily identify and manage certificates issued from specific profiles.

New system scan option for newly provisioned agents

With this release, DigiCert​​®​​ Trust Lifecycle Manager introduces a new option under system Settings to enable and configure account-level system scans. This feature triggers a system scan on any newly provisioned agent. The scan runs only once after provisioning is complete, while subsequent scans can be configured in the same way as before this release.

Unassign business unit for discovered certificates

A user can take ownership of a discovered certificate by assigning it to their business unit. With this update, they can also move discovered certificates out of their business unit by unassigning them in case the assignment was made by mistake.

Support additional characters for user name in Qualys connector

Qualys connector configuration is enhanced to support additional special characters in the Username field. You can now use the following characters:

  • Alphanumeric (a–z, A–Z, 0–9)

  • Special characters: Plus sign (+), at symbols (@), period (.), underscore (_), and hyphen (-)

Intune connector URL validation

The Microsoft Intune Connector now includes enhanced validation logic for the Platform URL field. Administrators are required to enter only the domain, immediately following https://. This will avoid any misconfigurations of the URL upfront.

Fixes

Unable to add new Citrix ADC connector

Resolved issue with adding ADC connector when there is only one sensor in the account.

Sensor communication interval update missing in DigiCert​​®​​ Trust Lifecycle Manager UI

Resolved issue with the sensor heartbeat interval update, ensuring users are informed when an update is in progress.

Nginx automation failing on Ubuntu 22

Resolved an issue where the agent installed on Ubuntu 22 failed to issue or renew certificates using NGINX due to missing client dependencies required for automation.

March 28, 2025

DigiCert® ONE version: 1.9525.8 | Trust Lifecycle Manager: 1.4106.0

New

Intune for Government Community Cloud High (GCCH)

Improved Intune service to support GCCH solution. The same Intune templates can be used for both standard Azure and GCCH platforms. However, you must enter the appropriate platform URL when configuring the Intune connector.

March 26, 2025

DigiCert® ONE version: 1.9525.6 | Trust Lifecycle Manager: 1.4096.0

Included in this release:

New

DigiCert Trust Assistant v1.2.3

The DigiCert​​®​​ Trust Assistant v1.2.3 release includes the following new features and enhancements.

  • Extended proxy support

    You can now configure additional HTTP(S) proxy settings through the UI or by using a configuration file (extra-config.json) pushed by your IT team. The new proxy configuration includes:

    • HTTP/HTTPS

    • Proxy Auto-Config (PAC) file

    • Authenticated proxy (basic auth only via username/password)

  • Enhanced user sign-in experience for DigiCert ONE Login

    The user sign-in process for profiles configured with the DigiCert ONE Login authentication method has been enhanced. You are no longer required to manually join your IdP account with DigiCert ONE. Instead, you will be automatically redirected to your organization's single sign-on (SSO) page. Upon successful authentication, a DigiCert ONE user account is automatically created, and DigiCert​​®​​ Trust Assistant will auto-enroll the user against the configured profiles. If users are already authenticated, this step is skipped.

  • Option to recover an existing certificate

    For certificate profiles configured with Cloud Key Escrow and the Allow duplicate certificates setting enabled, a new default option has been introduced to recover the same issued certificate instead of issuing a new duplicate. This option is enabled by default for new profiles. For existing profiles, it remains disabled to preserve the current behavior of issuing new duplicates. This feature is available for certificate profiles configured with the DigiCert Trust Assistant enrollment method and the following authentication methods:

    • Enrollment code

    • Manual approval

    • SAML IdP

  • Configuration enhancements

    • Support additional attributes that can be configured through Windows Group Policy Objects (GPO):

      • Auto-update configuration

      • Block updates through CDN

      • Keystore disabling

      • Login session validity configuration for keystore

      • Custom keystore addition

      • Proxy settings configuration

    • Support for configuring log levels through a UI setting when running the client in Advanced mode.

SCEP support for Microsoft CA templates

Updated the Microsoft CA templates listed below to support the SCEP enrollment method for issuing private certificates from a customer’s Microsoft CA via DigiCert sensor technology:

  • Microsoft CA Server Certificate

  • Microsoft CA User Certificate

Prerequisites

Ensure the following requirements are met:

  • You must have an available Imported seat in your account.

  • A decryption end-entity certificate will be automatically created to ensure the proper functionality of this feature. The certificate will be issued by the same private CA that issues the end-entity certificate, with an EKU (Extended Key Usage) of either Server authentication or Certificate request agent. The certificate must also include key usages of Key encipherment and Data encipherment.

Additional information

  • During profile creation, a decryption certificate is created and linked to each Microsoft CA connector and issuing CA.

  • This decryption certificate is associated with the Imported seat and will have the common name: TLM-SCEP-DECRYPT-CERT, followed by the account name and issuing CA name.

  • The certificate can be located and retrieved from the inventory page, tagged as TLM-SCEP-DECRYPT_CERT.

Warning

If the admin deletes the Imported seat associated with the decryption certificate, enrollment failures will occur. However, if the profile is updated or re-saved, a new decryption certificate will be automatically generated, resolving the issue and allowing enrollments to proceed.

Support for the creation of custom reports from the Seats list page

From this release, you can now edit existing custom reports from the reports library page, enabling you to add or remove fields without the need to create a new report.

Custom reports for Seats and edit existing reports

You can now create custom reports from the Account > Seats page. Use the seat table filters to list the applicable seat records, then select the download icon above the table and select the Create custom report button in the siderail that opens. You can customize which fields to include in the report and whether to run it once or on a recurring schedule.

From this release, you can also edit existing custom reports from the Reporting > Report library page. This allows you to add or remove fields without the need to create a new report.

Enhancements

Self-service portal - filter out public/private certificates

Enhanced the self-service portal to support a new optional filter, allowing end-users to distinguish between private and public certificates that chain up to a publicly trusted root CA. The new column/filter currently supports these two values:

  • Private: For Adobe certificates issued from CertCentral.

  • : For imported and discovered certificates.

Duplicate certificates for CertCentral

Resolved an issue preventing the issuance of duplicate certificates across profiles associated with the Public S/MIME Secure Email (via CertCentral) template.

Fixes

Missing Subject DN and SAN fields section

Resolved issue with the Subject DN and SAN fields section not being shown after editing a profile configured with the CSR enrollment method, using the CertCentral Private Server Certificate template.

SAML errors in authenticated self-service portal

Resolved an issue causing SAML errors for the authenticated self-service portal users during enrollment.

Enrollment instant report

Resolved issue with creating instant enrollments reports.

Support multiple proxies using PAC file

Resolved an issue where DigiCert​​®​​ Trust Assistant failed to connect with the backend server during SSO sign-in when multiple proxy URLs were specified in the PAC file.

Auto-enroll/renew timeout retry

Resolved an issue with auto-enroll/renew timeouts by implementing an automatic retry mechanism that checks every 5 minutes.

Increased timeout for post-processing script

Resolved a timeout issue with the post-processing script by increasing the timeout to 30 seconds.

Tmp.node file creation issue

Resolved an issue where a tmp.node file was being created under the system's temp folder during DigiCert​​®​​ Trust Assistant boot when using AppLocker.

Error saving diagnosis zip file on non-english windows operating systems

Resolved an issue where the diagnostic zip file could not be saved on non-english Windows operating systems.

Powershell TypeError in post-processing scripts

Resolved an issue where a TypeError occurred during PowerShell calls invoked from post-processing scripts.

March 19, 2025

DigiCert® ONE version: 1.9525.5 | Trust Lifecycle Manager: 1.4064.0

New

Google Cloud Platform (GCP) support

DigiCert​​®​​ Trust Lifecycle Manager now includes a Google Cloud Platform (GCP) connector for certificate discovery and lifecycle management.

With the new GCP unified connector, users can:

  • Discover organization hierarchies and projects.

  • Identify load balancers and certificates configured on them.

  • Find certificates and certificate maps in Google Certificate Manager.

  • Automate certificate management for load balancers via Compute Engine and Certificate Manager.

  • Deliver certificates to the Google Certificate Manager using the Admin web request function.

Supported load balancers for automation:

  • Global external Application Load Balancer

  • Regional external Application Load Balancer

  • Global external Classic Application Load Balancer

  • Global external Network Load Balancer

  • Global external Classic Network Load Balancer

  • Regional internal Application Load Balancer

Note

For DigiCert-hosted customers, contact your DigiCert representative to enable this connector in your account.

Enhancements

Email notification changes
  • Updated date format for suspend, resume, and revoke email variables: The email templates for certificate lifecycle operations (suspend, resume, revoke) now include both the date and time (in GMT) when the action was performed.

  • Email notification for profile resume status: Notifications now alert account administrators when a suspended profile is resumed.

Validity periods for Adobe and Public Client Authentication templates

The maximum certificate validity period for profiles created from the following templates is now 3 years:

  • Public Client Authentication (via CertCentral)

  • Adobe Individual (via CertCentral)

  • Adobe Organization (via CertCentral)

Fixes

DigiCert Trust Assistant renewal with SAML IdP

Resolved the login authorization error during certificate renewal for profiles using an outdated SAML authentication configuration.

DigiCert Autoenrollment Server - Unregistered certificate templates

Resolved the "Certificate template is not registered with the server" issue for clients requesting unregistered templates in the Autoenrollment Server.

Self-service portal p7b certificate download

Resolved an issue in the self-service portal where the .p7b certificate download did not include the full CA chain for profiles with the “advanced certificate delivery” option enabled.

March 11, 2025

DigiCert® ONE version: 1.9525.3 | Trust Lifecycle Manager: 1.4009.0

New

DigiCert AutoEnrollment Server v.2.25.1.0

This release of the DigiCert AutoEnrollment Server includes:

  • Automated AEConfig retrieval: AEConfig files can now be fetched via API using an API key or certificate-based credentials—no manual export/import is needed.

  • Automated system configuration: DCOM settings, firewall settings, and Group Policy Objects (GPO) can be now configured automatically.

  • Digitally signed package: All binary files in the Autoenrollment Server package are now digitally signed. The updated package is available for download on the Client tools page.

  • SAN:DNSName support: Now supports comma-separated DNS names.

  • Multi-valued AD attributes: Supports multiple values for Active Directory attributes/strings.

  • Log settings retention: Log configurations remain intact during uninstall or upgrade.

  • Improved security: PIN values for Data Protection on Demand (DPoD) HSM integrations are now hidden in server logs.

For details, see Autoenrollment Server.

Seat ID mapping support for SAML attributes

For profiles using SAML IdP authentication, you can now map a SAML attribute (for example, Name ID) to the Seat ID. The system retrieves the attribute's value from the SAML assertion and assigns it as the Seat ID.

Enhancements

Intune GCCH qualification

Qualified support for Intune services on the Government Community Cloud High (GCCH) platform.

Scoped dashboard data for business unit admins

Admins assigned to one or more business units now see dashboard data only for their assigned units. The business unit dropdown at the top of the page will also display only the units they have access.

Public S/MIME support update

The SCEP enrollment method is no longer supported by the Public S/MIME Secure Email (via CertCentral) template.

From this release, issuance of Public S/MIME certificates will be supported via the following flows:

  • Microsoft Intune using the Public S/MIME (Digital Signature only) for Intune (via CertCentral) template.

  • Web-based enrollment flows, including CSR, Browser PKCS12, and the DigiCert​​®​​ Trust Assistant (supports auto-enrollment, renewal, and recovery).

  • UEM vendors integrating with DigiCert​​®​​ Trust Lifecycle Manager via REST API.

Fixes

SAN Registered ID format

Resolved encoding issue with the SAN:registeredID field.

Intune connector “Action needed” status

Resolved an issue where the Intune connector remained stuck in the “Action needed” status.

Renewal reminders

Resolved an issue where the renewal reminder job failed to process deleted non-REST profiles.

March 7, 2025

DigiCert® ONE version: 1.9525.2 | Trust Lifecycle Manager: 1.4009.0

New

Intune support for Public S/MIME

CertCentral now supports issuing Public S/MIME sponsor-validated, non-escrowed RSA certificates via Intune SCEP profiles.

A new limited template called Public S/MIME (Digital Signature only) for Intune (via CertCentral) is now available for DigiCert-hosted platforms. Contact your DigiCert representative to assign this template to your account.

To configure Azure authentication, you need a Microsoft Intune connector in Trust Lifecycle Manager. For connector configuration details, see Microsoft Intune connector.

March 5, 2025

DigiCert® ONE version: 1.9525.1 | Trust Lifecycle Manager: 1.4003.0

New

Override validity period for CertCentral requests

Authorized administrators can now manually override the validity period for Public and Private TLS Server certificate requests in CertCentral that require review and approval.

New API endpoint for custom attributes

New REST API endpoints allow you to create, read, and delete custom attributes.

For details, see API endpoint documentation.

Enhancements

Generic templates - 20-year maximum validity

The Generic User, Device, and Server certificate templates now support a maximum validity of 20 years, up from the previous 10-year limit.

Adobe CDS template support for SAML IdP

Updated the Adobe CDS private/limited template to support the SAML IdP authentication method.

Audit log enhancements

Improved audit log failure events for:

  • Revocation events - Logs now include a message when a revocation request succeeds, but the profile is set to send a revocation email confirmation, and no email address is available for the user.

  • Intune failure events - New failure events are recorded, and logs now capture the Seat ID for related failures.

Fixes

Missing tags

Resolved an issue where profile tags were:

  • Not applied to certificates issued via the REST API.

  • Not inherited from the original certificate during renewal.

Intune import issue when importing via UPN

Resolved an issue where the Intune certificate import flow stopped working after importing more than 100 users.

February 26, 2025

DigiCert® ONE version: 1.9391.4 | Trust Lifecycle Manager: 1.3980.0

Enhancements

Enhanced support for custom attributes

Increased the maximum number of custom attributes to be configured per account from 10 to 15.

Fixes

Cert-Delivery plugin unable to download certificate files via proxy

Resolved an issue where the Cert-Delivery plugin could not download certificate files via proxy when the agent was provisioned through a sensor. A new plugin has been created to resolve this issue.

Certificates are not being delivered to the A10 load balancer

Resolved an issue where certificate installation failed on A10 load balancers due to a limitation in handling chunked ICA uploads for files larger than 4 KB. The chunk size has been increased to 16 KB, allowing up to six intermediates (each 2.5 KB), ensuring successful ICA binding for larger files.

Open self-service portal revocation issue

Resolved an issue where certificate revocation requests failed in the open self-service portal for customers with the revocation feature enabled.

Profile API response

Resolved an issue where the profile response API endpoint did not return the correct values for the following parameters when configured in a profile:

  • duplicate_certificate_allowed

  • grace_period_enabled

February 12, 2025

DigiCert® ONE version: 1.9391.0 | Trust Lifecycle Manager: 1.3921.0

New

EST support for Microsoft CA templates

The following Microsoft CA templates now support the EST enrollment method, enabling private certificate issuance from a customer’s Microsoft CA through DigiCert sensor technology:

  • Microsoft CA Server Certificate

  • Microsoft CA User Certificate

Manage business unit admins via REST API

New REST API endpoints enable administrators to be assigned or removed from a business unit using their GUID. Here are the new endpoints and links to the Swagger API reference documentation for them:

Email notifications for profile status changes

Added new email notification templates to notify customers about profile status changes, including:

  • Profile suspension

  • Profile deletion

These notifications can be enabled or disabled and customized from the Policies > Notifications page in Trust Lifecycle Manager, filtering for Profile management in the Category column.

Enhancements

Adobe Individual - REST API

Enhanced the Adobe Individual in Organization (via CertCentral) template to support the REST API enrollment method and allow API-based integrations for the issuance of private Adobe CDS certificates and lifecycle operations.

Note

To issue a certificate, the API request must include the accept_adobe_rules parameter with a yes value, explicitly accepting the terms and conditions. If this parameter is missing, the following error will be displayed:

Failed to issue the certificate. You must read and accept the Adobe T&Cs by including the 'accept_adobe_rules' parameter with a 'yes' value.

Adobe CDS - DigiCert ONE Login

The Adobe CDS template now supports the DigiCert ONE Login authentication method. This enables integration with IdP users via SAML or OIDC, linking them to a DigiCert ONE account for advanced DigiCert​​®​​ Trust Assistant auto-enroll and auto-renew features.

Shortened EST server URLs

Starting with this release, all Enrollment over Secure Transport (EST) enrollment and renewal URLs have been shortened to accommodate devices with size or format restrictions and better comply with RFC standards.

Here are the example URLs illustrating the changes:

For EST enrollment URL:

  • From: https://one.digicert.com/mpki/api/v1/.well-known/est/<profile-GUID>/simpleenroll

  • To: https://one.digicert.com/.well-known/est/TLM<profile-GUID>/simpleenroll

For EST server renewal URL:

  • From: https://one.digicert.com/mpki/api/v1/.well-known/est/<profile-GUID>/simplereenroll

  • To: https://one.digicert.com/.well-known/est/TLM-<profile-GUID>/simplereenroll

For EST server renewal URL using “clientauth” endpoint:

  • From: https://one.digicert.com/mpki/api/v1/.well-known/est/<profile-GUID>/simplereenroll

  • To: https://clientauth.one.digicert.com/.well-known/est/TLM-<profile-GUID>/simpleenroll

Note

The old URLs will remain operational alongside the new ones. When creating or editing a profile, only the new URLs are displayed.

Updated Microsoft CA import behavior

When importing certificates from a Microsoft CA connector using the option to import from Specific templates on the Microsoft CA, Trust Lifecycle Manager will not import any certificates unless there is at least one matching user-specified template. Previously, all certificates were imported when there was no matching template.

Updated Admin web request flow

Enhancements to the Admin web request enrollment method:

  • Agents in "Not configured" state can now be used for certificate delivery.

  • Added options to allow Subject Alternative Names (SANs) when issuing certificates from a Microsoft CA connector.

Authenticated self-service portal - User ID

Added a User ID field to the authenticated self-service portal, which automatically maps to the SAML NameID value from the SAML assertion.

Key details:

  • After successful SAML authentication, users will see all certificates they own or have requested based on the SAML NameID.

  • Users can also search for certificates by email address, even if they were enrolled through a non-SAML flow (for example, a profile with the Manual Approval authentication method). The search includes matches within the SubjectDN or SAN rfc822Name extension.

Underscore character support for dnsName field

This release introduces support for the underscore (_) character in the SAN:dnsName field for certificate profiles using a private issuing CA in DigiCert® Private CA.

Fixes

PKI Platform 8 connector - certificate import fix

Resolved an issue where certificate imports failed for PKI Platform 8 accounts without a sub-account. Previously, customers had to create a placeholder sub-account as a workaround, but this is no longer necessary.

January 29, 2025

DigiCert® ONE version: 1.9100.7 | Trust Lifecycle Manager: 1.3860.0

New

AI Assist chatbot

Note

This chatbot is available only for DigiCert-hosted platforms.

AI Assist is a new AI-powered chatbot designed to help DigiCert​​®​​ Trust Lifecycle Manager administrators. It provides answers to product usage, onboarding, configuration, installation, and API integration queries by sourcing relevant information from our documentation websites: DigiCert product documentation, DigiCert developer portal, and DigiCert ONE.

Features of the AI chatbot:

  • Accepts prompt inputs in natural language.

  • Supports all major international languages, responding in the same language as the input.

  • Provides source references for answers as citations.

  • Saves conversation history and context for seamless recollection.

  • Allows users to copy responses with a single click for easy sharing.

  • Enables starting a new session with a "plus" button.

  • Collects user feedback on the usefulness of each response.

Where can I find the AI chatbot?

You can access AI Assist by selecting the question mark in the top-right corner of the DigiCert​​®​​ Trust Lifecycle Manager administration screen. The chatbot will open on the same screen.

Who can use the AI chatbot?

AI Assist is available to all Trust Lifecycle Manager users with Account Admin access.

Can I chat with live customer support?

No, AI Assist does not support live chat with customer support. For assistance, contact support via email, phone, or a support ticket.

Custom attributes

The new custom attributes feature allows customers to create and manage up to 10 custom attributes per account. These attributes can be linked to profiles or certificates, depending on user permissions.

Access and permissions

  • Viewing custom attributes: Available under Account > Settings > General > Custom attributes, but only for users with the "View custom attributes" permission. Otherwise, the option remains hidden.

  • Creating and managing custom attributes: Only administrators with the "Manage custom attributes" permission can create, edit, or delete custom attributes.

Configuration and attribute types

Custom attributes are configured in Account > Settings > General > Custom attributes and can be set as:

  • Dropdown list: A predefined set of values selected by end-users (required or optional).

  • Text field: A free-text input where end-users enter a value (required or optional).

  • Fixed value: A static value set by the administrator.

Note

Dropdown and text field attributes can have a default value, which will be used during certificate renewals.

Using custom attributes

Once an authorized administrator configures custom attributes, they can be assigned to profiles.

  • Web-based profiles (CSR, Browser PKCS12, DigiCert Trust Assistant, Automated Enrollment, Admin Web Requests): Any configured custom attribute can be selected and applied to certificates issued or renewed from the profile. If a text field attribute is used, it can include a Regular Expression (REGEX) to validate user input.

  • Automated profiles (REST API, 3rd party ACME, SCEP, EST, Microsoft AutoEnrollment): Only custom attributes with Fixed values can be assigned, ensuring certificates issued or renewed automatically follow predefined settings.

Custom attribute operations

Authorized administrators can manage custom attributes and the following actions are available:

  • From Account > Settings > General > Custom attributes page:

    • Create/edit custom attributes

    • Delete custom attributes. When deleted, any associated profiles or certificates will no longer be linked to the removed attribute.

    Note

    When dropdown list type attributes are marked as required, new values can be added to the dropdown. However, existing values cannot be removed.

  • From the Profiles and Certificate details page:

    • Add

    • Remove

    • Update values

  • From the Inventory page:

    • Filter/search certificates based on one or more custom attributes

    • Export custom attributes as part of instant and custom reports

For details, see Custom attributes.

Support for Public S/MIME Multipurpose and Strict generation

Added support for the new strict and multipurpose generation certificates for the following templates:

Template name

Seat type associated with the template

S/MIME certificate generation

S/MIME certificate type

  • Public S/MIME Secure Email (via CertCentral)

User seat

  • Legacy (until EoD July 1st, 2025 UTC)

  • Multipurpose

  • Strict

  • Sponsor-validated

  • Mailbox

  • Public S/MIME Secure Email using CMP (via CertCentral)

  • Public S/MIME (Digital Signature only) for Intune (via CertCentral)

User seat

  • Legacy (until EoD July 1st, 2025 UTC)

  • Multipurpose

  • Strict

  • Sponsor-validated

  • Public Secure Email Gateway (via CertCentral)

Organization seat

  • Legacy (until EoD July 1st, 2025 UTC)

  • Multipurpose

  • Strict

  • Organization-validated

The following changes align with the Public S/MIME CAB Forum standard:

  • The strict and multipurpose generation certificates can have a maximum validity period of 825 days.

  • For sponsor-validated certificate type, if strict or multipurpose is selected, the Subject DN (with GivenName/Surname or Pseudonym) is a mandatory field. Common Name is no longer supported.

  • For strict generation certificates, the client_auth EKU and data_encipherment, KU extensions are no longer supported and are removed as options from the profile wizard.

  • All Public S/MIME certificates issued before this release will be automatically associated with 'Legacy' generation certificates, which are displayed on the Profile details page under Generation type .

Important

Issuance of Public S/MIME Legacy generation certificates, regardless of the certificate type (Mailbox/Sponsor/Organization-validated), will be blocked from the 1st of July 2025 (midnight UTC). Any Public S/MIME certificates issued after the 1st of July 2025 must be Multipurpose or Strict generation certificates for which you must create a new profile. For details, see section 7.1.6.1 in Baseline Requirements for the Issuance and Management of Publicly‐Trusted S/MIME Certificates.

Note that the issuance will be blocked starting July 1st, 2025, allowing time to address any unforeseen issues by the 14th of July 2025 (midnight UTC).

DigiCert Trust Assistant version 1.2.2

The DigiCert​​®​​ Trust Assistant v1.2.2 release includes the following new features and enhancements.

Manual and auto recovery of escrowed certificates

A new feature that allows end users to manually or automatically recover certificates that were issued and escrowed in the DigiCert cloud.

  • Auto recovery - If there are any public or private escrowed certificates (valid, expired, or revoked) on DigiCert Cloud linked to profiles with the auto-recovery feature, the auto key recovery process will automatically trigger upon successful sign-in. All matching certificates issued by the logged-in user will be recovered without any user action required.

  • Manual recovery - DigiCert​​®​​ Trust Assistant runs a recovery check to see if any certificates can be recovered for the signed-in user. If it finds a recoverable certificate then the user is alerted via a notification alert with a link to initiate the manual recovery process.

Note

During the key recovery process, a PIN or password may be required to save the recovered certificates to the target keystore (if protected).

Key recovery prerequisites

The profile must be configured as follows:

  • Enrollment method: DigiCert Trust Assistant

  • Keystore: Either OS keystore or DigiCert Software Keystore

  • Authentication method: DigiCert ONE Login

  • DigiCert cloud key escrow option must be enabled in the profile

  • The Enable DigiCert Trust Assistant recovery option must be selected - this is applicable for both manual and auto recovery flows.

  • For auto recovery, the Enable auto recovery upon sign-in option must be selected. The auto-recovery operation is triggered only upon user sign-in via their single sign-on provider, but it is not supported for hardware tokens.

For more details, see Manual and auto recovery of escrowed certificates.

Sign-out functionality

Use this feature to sign out of DigiCert​​®​​ Trust Assistant and return to the logged-out state. All the features of DigiCert​​®​​ Trust Assistant described in Signing in with DigiCert ONE will not be available after signing out.

The new Sign-out functionality is available from the DigiCert​​®​​ Trust Assistant context menu (avatar icon at the top-right of the dashboard).

After signing out, you can sign in again as the same user or as a different user. To sign back in, see Signing in with DigiCert ONE .

For more details, see Sign out of DigiCert Trust Assistant.

UI enhancements

  • Updated all the modal dialog windows to support ENTER to submit and ESC to close.

  • The profile description field is now visible during enrollment and on the Certificate profile details page.

  • A certificate Serial number column has been added to the Token and Issued certificates panel.

  • DigiCert​​®​​ Trust Assistant can now be opened from the Windows operating system tray by left-clicking the icon, in addition to the right-click menu.

Admin web request - post-installation script support

Admin web request flows for agent certificate delivery now support a post-script option. Administrators can configure the agent to execute a script after certificate delivery, enabling customization and extending capabilities to bind certificates to unsupported applications and use cases.

Administrators can:

  • Configure post-installation scripts for agents individually or in bulk.

  • Add parameters to be passed to the script as command arguments for each request.

  • Set up enrollment, reissue, and renewal to trigger post-scripts automatically.

Enhancements

PKI Platform 8 CA connector - certificate import enhancement

The DigiCert® PKI Platform 8 CA connector now supports the automatic import of:

  • X.509 certificates (non-escrowed)

  • PKCS#12 certificates (escrowed)

Administrators can control imports using filters based on account, sub-account, profile, and certificate status.

Key details:

  • The import process runs asynchronously. You can track imported certificates by checking and refreshing the connector details page.

  • All imported certificates are assigned to an Imported Seat, where administrators can perform lifecycle operations:

    • Private certificates: Revoke, recover, suspend/resume

    • Public certificates: Revoke, recover

Important

Revoke/Suspend/Resume actions for certificates imported via the PKI Platform 8 connector, actions such as Revoke, Suspend, and Resume will require ongoing access to both the connector and the PKI Platform 8 account until all imported certificates have expired.

Import functionality for the connector

To enable the import functionality for the connector, contact your platform administrator and enable the PKI8 Connector - import attributes feature in the Account Manager application.

For more details, see DigiCert PKI Platform 8.

REST API - Business unit endpoint enhancement

Updated the GET business unit API endpoint to include the following data for the responses:

  • An array of admins assigned to the business unit (ID, name, email)

  • An array of available_seats_stats

Here's an example response:

{
    "id": "67faf4c0-45a4-42e1-8f8a-b723d0d50262",
    "name": "Default Business Unit",
    "active": true,
    "created_at": "2024-12-17",
    "account": {
        "id": "3392fd77-19b4-43b4-afec-f796c1cc5896",
        "name": "Marseille_Seaport_Account"
    },
    "admins": [
        {
            "id": "28dc6055-e83b-4549-b8c4-f024ce41cbdb",
            "name": "admin001 admin",
            "email": "admin001@yopmail.com"
        },
        {
            "id": "a18cc97a-4b45-4f07-989d-e3448ecfc7b0",
            "name": "Edmond Dantès",
            "email": "edmond.dantes@yopmail.com"
        }
    ],
    "available_seats_stats": [
        {
            "type": "USER_SEAT",
            "display_name": "User seat",
            "licensed_amount": 1000,
            "allocated_amount": 3,
            "created_amount": 4,
            "pending_enrollment": 0,
            "in_progress_enrollment": 0
        },
        {
            "type": "DEVICE_SEAT",
            "display_name": "Device seat",
            "licensed_amount": 1000,
            "allocated_amount": 0,
            "created_amount": 0,
            "pending_enrollment": 0,
            "in_progress_enrollment": 0
        }
  }
AES qualification of Luna HSM Client 10.7.2

DigiCert AutoEnrollment Server qualification of the Luna HSM Client 10.7.2-16 for both SafeNet Network HSM and SafeNet DPoD (Data Protection on Demand) Cloud HSM. For more details, see SafeNet HSM installation and configuration.

Note

The Luna HSM Client 10.6.x version will be End of Life by Gemalto by the end of January 2025.

Support for multiple key sizes in automation flows

Certificate Management seat-type templates now allow selecting multiple key sizes when creating a profile. This enables administrators to issue certificates with different key sizes without cloning the profile.

This option is available for the following enrollment methods:

  • Sensor

  • REST API

  • Admin web request

This option is available for the following CAs:

  • CA Manager

  • CertCentral

  • Step CA

Sensor support for server-sent events

With sensor version 3.9.5, DigiCert​​®​​ Trust Lifecycle Manager sensors now support server-sent events for near real-time responses to job requests.

This feature can be enabled under Advanced settings on the Sensor details page.

Note

This feature is recommended for use cases, such as CA integrations, where faster responses are essential.

Update to OpenSSL packages for the agent

The OpenSSL packages have been updated to v3.0.15, and are now included in the automation package used by the agent.

Fixes

Open self-service portal - revocation

Resolved issue with revocation operations failing for users via the open self-service portal.

Renewal email notification timing issue

Resolved an issue where renewal email notifications were sent a day earlier than configured. The calculation logic caused the discrepancy, which excluded both the current day and the "valid to" date, leading to incorrect scheduling.

MSCA templates showing as undefined

Resolved an issue where MSCA templates appeared as undefined due to misconfiguration on the CA side. Logic has been added to ignore such templates.

MSCA automation - root count mismatch

Resolved an issue where the installation step in the automation flow failed due to a malformed response for root and intermediate certificates.

Instant report - incorrect columns

Resolved an issue with the serial number column not showing correctly in the report.

Certificates with "replace external" status

Resolved issue by removing the replace external filter status when the user drills down from dashboard.

Resolved an issue where certificates with the replace external status were showing incorrectly. Removed the replace external filter when users drill down from the dashboard.

January 17, 2025

DigiCert® ONE version: 1.9100.5 | Trust Lifecycle Manager: 1.3804.0

Fixes

SCEP issuance of duplicate certificates

Resolved an issue with the issuance of duplicate certificates for profiles configured with the SCEP enrollment method.

January 15, 2025

DigiCert® ONE version: 1.9100.3 | Trust Lifecycle Manager: 1.3797.0

New

Adobe CDS 'limited' template for private use-cases

A new Adobe CDS 'limited' template is now available for issuing private certificates. This template is tied to the User seat type and includes the following two EKUs:

  • Adobe Authentic Document Trust (1.2.840.113583.1.1.5)

  • Document Signing (1.3.6.1.4.1.311.10.3.12)

Any private CA can use this template. To enable it for your DigiCert ONE account, contact your account representative.

Note

Adobe products do not officially recognize private certificates issued with this new template. For full Adobe support, use the Adobe Individual template. This requires a CertCentral CA connector linked to your CertCentral account with the appropriate product types enabled.

Self-service portal - additional certificate delivery options

The self-service portal now supports additional certificate delivery options for all certificate types. Users can access these by selecting the Show additional download options link inside the Download certificate pop-up and switch back to standard options by selecting Show standard download options.

Enhancements

Audit log enhancements - no seats available in business unit

Audit logs now include failure events for cases where no seats are available in the business unit tied to the profile used for certificate issuance.

Self-service portal enhancement - Assign "Pending" administrators to business units

DigiCert​​®​​ Trust Lifecycle Manager users with Pending status in the Account Manager can now be assigned to or unassigned from business units as needed.

The Pending status users are now displayed in the Manage account users dropdown under Business Unit settings, allowing administrators to manage their assignments.

Fixes

Revocation failure

Resolved an issue where certificate revocation requests sent from Inventory failed when a profile was configured to send a revocation email to the certificate owner, but no email address was found associated with the requester, enrollment, or seat.

From this release, revocations will succeed even if no email address is associated with the requester, and the transaction will not be rolled back.

SAML IdP-initiated Null error

Resolved an issue where SAML IdP-initiated enrollment and renewal flows failed with a Null error due to a missing URL in the required SAML parameters.

January 8, 2025

DigiCert® ONE version: 1.9100.1 | Trust Lifecycle Manager: 1.3765.0

New

ServiceNow v1.6.0

ServiceNow app version 1.6.0 released for DigiCert​​®​​ Trust Lifecycle Manager introducing new features, enhancements, and fixes:

Certificate renewals

  • Renewal notifications

    • Users can now receive renewal reminder emails directly from the ServiceNow app.

    • Administrators can manually resend these reminders using the new Resend renewal email action.

  • Renewal process

    • Users and administrators can renew certificates using the new Renew button on the certificate details page for certificates within the renewal window.

    • Renewal requests are listed under the Pending certificate requests page, where administrators can approve, reject, or cancel them.

  • Certificate delivery

    • Renewal certificates are delivered similarly to the base certificates upon approval.

    • Successfully renewed certificates are displayed on the Certificates page after pickup.

Multiple key sizes

Profiles with multiple key sizes now display all supported options during the certificate request process. Requesters can submit CSRs for any supported key size.

DigiCert ONE platform configuration for admins

ServiceNow administrators can configure the DigiCert ONE platform URL the app connects to, regardless of the ServiceNow instance type. Options include selecting a DigiCert ONE instance from a dropdown or selecting the Others option manually to specify a custom DigiCert ONE domain, such as, for locally hosted instances.

Pending certificate request enhancements

The Pending certificate requests page now defaults to displaying requests in the Pending approval state. Status updates are supported post-approval, such as reflecting a Failed status if issues arise.

Improved navigation

Users can now seamlessly navigate from Pending certificate requests > Certificate request # > Certificate information > View certificate for better accessibility.

Certificates as attachments

Certificates issued through REST API enrollment requests are now included as attachments in ServiceNow emails, making them easier for end-users to access.

Fixed value issue for SAN/SDN fields

Resolved issues with fixed values in Subject Alternative Name (SAN) and Subject Distinguished Name (SDN) fields.

Enhancements

Audit log enhancements
  • SAML login events: Updated self-service portal SAML login success and failure events to include additional details, such as the SAML NameID.

  • Intune request failures: Added more information to failure events triggered when Intune requests exceed the duplicate certificate limit (250).

Additional certificate delivery formats

Support for additional certificate delivery formats has been extended to the following templates for profiles using the CSR enrollment method with any supported authentication method if the feature is enabled:

  • Microsoft CA Server Certificate

  • Microsoft CA User Certificate

The self-service portal now supports additional certificate delivery options for all certificate types downloaded through the portal.

Fixes

CertCentral Public S/MIME DV-enabled templates

Resolved an issue with CertCentral Domain Validated (DV) product types in the CSR/Manual approval flow. DV products have been removed from the list of selectable options when creating profiles using CertCentral Public or Private Server Certificate templates because they do not support this flow. Use a non-DV CertCentral product type instead.

Renewal emails with updated seat email addresses

Renewal emails will now also reach seats with a specified Seat Email value set. This ensures that customers can set a new email address for a Seat object even if the original requester has left the organization.

Agent drill-down issue for unsecured IP/ports

Resolved an issue in agent details where selecting "Unsecured IP/ports" caused the display to briefly switch to secured ports before returning to "Unsecured IP/ports."

Delete option restricted to Discovery view

The Delete option is now restricted to the Discovery view, ensuring it applies only to discovered certificates.