Filtro por: New x borrar
new

Account setting for certificate lifecycle email language preference

We've added an account language setting for the certificate lifecycle emails sent from CertCentral. Now, on the Notifications page, you can set the language preference for the certificate lifecycle emails for the entire account.

Currently, we support these 11 languages for certificate lifecycle specific emails:

  • English
  • Chinese (Simplified)
  • Chinese (Traditional)
  • French
  • German
  • Italian
  • Japanese
  • Korean
  • Portuguese
  • Russian
  • Spanish

How does certificate lifecycle email language support work?

When you go to the Notifications page in CertCentral, use the Email Language dropdown to set the certificate lifecycle email language for the entire account.

For example, if you set the email language to Italian, all certificate lifecycle emails will be in Italian regardless of the individual account language setting.

Note: The Email Language option only changes the language used in the certificate lifecycle emails. It does not change the language used in an individual account. On the Profile Settings page, use the Language dropdown to set the language for your account. See CertCentral language preferences.

Where are these certificate life cycle settings?

To access the Certificate Lifecycle email defaults settings, in the left main menu, go to Settings > Notifications. To learn more, see Configure certificate lifecycle email settings.

new

New certificate lifecycle email setting

We added another notification setting to the Certificate lifecycle email settings—Send organization approval emails to the user placing order. This setting allows you to control if the organization approval email is sent to the certificate requestor.

What is the organization approval email?

When the requestor is an admin or organization contact, we send them an email letting them know DigiCert has validated the organization, and they can now issue certificates for it.

Note: This new setting only applies to orders where a new, yet to be validated organization is included in the request.

Where are these certificate life cycle settings?

To access the Certificate Lifecycle email defaults settings, in the left main menu, go to Settings > Notifications. To learn more, see Configure certificate lifecycle email recipients.

new

Discovery now available in all CertCentral accounts

We are happy to announce that all existing CertCentral accounts now include Discovery, our newest and most robust certificate discovery tool.

Note: For those who were using Certificate Inspector, Discovery replaces our long time DigiCert tool, Certificate Inspector.

By default, Discovery includes Cloud scan and a Sensor scan trial with a 100-certificate limit.

Cloud scan

Cloud scan uses a cloud-based sensor, so there is nothing to install or manage. You can start scanning immediately to find all your public facing SSL/TLS certificates regardless of issuing Certificate Authority (CA). Cloud-scan runs once every 24 hours.

Sensor scan

Sensor scan is our most robust version of Discovery. It uses sensors to scan your network to quickly find all your internal and public facing SSL/TLS certificates regardless of the issuing Certificate Authority (CA). Discovery also identifies problems in certificate configurations and implementations along with certificate-related vulnerabilities or problems in your endpoint configurations.

Scans are centrally configured and managed from inside your CertCentral account. Scan results are displayed in an intuitive and interactive dashboard inside CertCentral. Configure scans to run once or multiple times on a set schedule.

  • To learn how to install a sensor and start scanning your SSL/TLS certificate landscape, see Discovery user guide.
  • To continue to use Sensor scan after the trial period is over, please contact your account manager or our Support team.
new

Discovery audit logs

Discovery has added a new feature—Discovery Audit Logs—allowing you to track Discovery-related activities in your CertCentral account. These audit logs provide insight into user activity enabling you to see areas where training may be required, reconstruct events to troubleshoot problems, detect misuse, and discover problem areas.

To make it easier to sort through the information in the Discover audit logs, we've include several filters:

  • Date range
  • Division
  • User
  • IP Address
  • Actions
    (e.g., void sensor, delete scan, etc.)

To access the Discovery Audit Log, in your CertCentral account, in the left main menu, go to Account > Audit Logs. On the Audit Logs page, click Discovery Audit Logs.

new

Discovery language support

As we work to globalize our product offerings and make our websites, platforms, and documentation more accessible, we are happy to announce that we've added language support to Discovery in CertCentral.

Now, when configuring your language preference in CertCentral, Discovery is included in the configuration.

To configure your language preference

In your account, in the top right corner, in the "your name" drop-down list, select My Profile. On the Profile Settings page, in the Language dropdown, select a language and click Save Changes.

See CertCentral language preferences.

fix

Bug fix: DV certificate orders did not honor Submit base domains for validation account setting

We fixed a bug in the DV certificate domain control validation (DCV) process where DV certificate orders did not adhere to the Submit base domains for validation account setting.

Note: For DV certificate orders, you were required to validate the domain exactly as named in the order.

Now, DV certificate orders honor the Submit base domains for validation account setting, allowing you to validate your subdomains at the base domain level on your DV certificate orders.

To view the Domain Validation Scope settings in your account, go to Settings > Preferences. On the Division preferences page, expand +Advanced Settings. The Domain Validation Scope settings are in the Domain Control Validation (DCV) section.

new

New location for API Keys and ACME Directory URLs

With more and more organizations working to automate SSL/TLS certificate deployment, we added a new left main menu optionAutomationand placed the two primary tools for automating certificate deployment under the new menu option: API Keys and ACME Directory URLs.

Previously, you accessed these features from the Account Access page. Now, we've conveniently added them to the left main menu (in the main menu, click Automation > API Keys and Automation > ACME Directory URLs).

Note: Only account administrators and managers can see the Automation menu options in their left main menu.

new

We added two new statuses to the Organizations and Organization details pages: validation expires soon, and validation expired. These new statuses make it easier to proactively track your organization validations and make sure they stay up to date.

Now, when you visit the Organizations page (in the sidebar menu click Certificates > Organizations), you can quickly identify organizations with validation that is expiring soon or has already expired. For more details about the expiring or expired organization validation, click the organization name.

fix

We fixed a bug where some accounts were unable to submit organizations for EV CS – Code Signing Organization Extended Validation. The affected accounts only contained EV Code Signing and Code Signing products.

As part of the fix, we split up the EV and EV CS verified contact options. Now, when submitting an organization for EV CS – Code Signing Organization Extended Validation, you can submit the organization's verified contact for EV CS order approvals only. Similarly, when submitting an organization for EV – Extended Organization Validation (EV), you can submit the organization's verified contact for EV SSL certificate order approvals only.

Note: For EV code signing certificate orders, organizations and the organization's verified contacts need to be pre-validated. For more information about organization pre-validation, see our Submit an organization for pre-validation instructions.

enhancement

In Discovery, we updated the Certificates page, adding a new action—Replace certificate—to the Actions dropdown. Now, from the Certificates page, you can replace any certificate with a DigiCert certificate regardless of issuing CA.

(In the sidebar menu, click Discovery > View Results. On the Certificates page, locate the Actions dropdown for the certificate you want to replace. Click Actions > Replace certificate.)

enhancement

In Discovery, we updated the Certificates by rating widget on the Discovery dashboard, making it easier to see the security ratings for your public SSL/TLS certificates (in the sidebar menu, click Discovery > Discovery Dashboard).

As part of the update, we renamed the widget: Certificates analyzed by security rating. Then, we split the chart on the widget into two charts: Public and Others. Now, you can use the Public | Others toggle switch on the widget to select the chart you want to see.

The Certificates analyzed by security rating - Public chart displays the ratings for your public SSL/TLS certificates only. The Certificates analyzed by security rating - Other chart displays the rating for all your other SSL/TLS certificates (e.g., private SSL certificates).

enhancement

In Discovery, we updated the Endpoints and Server details pages making it easier to see the correlation between the IP address and the hostname/FQDN scan it resulted from.

Now, when you configure a scan for a hostname/FQDN, and the scan's endpoint results return IP addresses, we include the hostname/FQDN from the scan with the IP address.

Update note: The hostname update is available in the latest sensor version – 3.7.10. After the sensors updates are completed, rerun scans to see the hostname/IP address correlation on your scan results.

new

In the DigiCert Services API, we added two new endpoints for ordering your Secure Site Pro certificates: Order Secure Site Pro SSL and Order Secure Site Pro EV SSL.

  • POST https://www.digicert.com/services/v2/order/certificate/ssl_securesite_pro
  • POST https://www.digicert.com/services/v2/order/certificate/ssl_ev_securesite_pro

Benefits included with each Secure Site Pro certificate

Each Secure Site Pro certificate includes – at no extra cost – first access to premium feature such as the Post Quantum Cryptographic (PQC) toolkit.

Other benefits include:

  • Priority validation
  • Priority support
  • Two premium site seals
  • Malware check
  • Industry-leading warranties – protection for you and your customer!

To learn more about our Secure Site Pro certificates, see DigiCert Secure Site Pro.

To activate Secure Site Pro certificates for your CertCentral account, contact your account manager or our support team.

new

Hemos agregado una nueva herramienta a nuestro portafolio de CertCentral (Discovery) que brinde análisis en tiempo real de todo su panorama de certificados SSL/TLS.

Diseñado para encontrar rápidamente sus certificados SSL/TLS internos y de orientación públicos, sin importar la Autoridad de certificados (CA) emisora, Discovery identifica problemas en la configuración y en las implementaciones de los certificados, junto con vulnerabilidades y problemas relacionados con estos en la configuración de su terminal.

Nota: Discovery usa sensores para escanear su red. Los sensores son pequeñas aplicaciones de software que instala en lugares estratégicos. Cada escaneo está vinculado a un sensor.

Los escaneos se configuran y administran centralmente desde el interior de su cuenta de CertCentral. Los resultados de los escaneos se muestran en un tablero intuitivo e interactivo dentro de CertCentral. Configure los escaneos para que se ejecuten de inmediato una vez o varias veces en un cronograma establecido.

enhancement

Hemos actualizado la configuración de la federación SAML de CertCentral y ahora le permitimos evitar que su nombre de federación aparezca en la lista de IdP en las páginas Selección de IdP de inicio de sesión único SAML y Selección de IdP de solicitudes de certificados SAML.

Ahora, en la página Configuración de federación, en Metadatos de su IdP, agregamos la opción Incluir nombre de federación. Si desea evitar que su nombre de federación aparezca en la lista de IdP en la página Selección de IdP,, no seleccione Agregar el nombre de mi federación a la lista de IdP.

new

Los certificados Secure Site Pro TLS/SSL están disponibles en CertCentral. Con Secure Site Pro, se le cobra por dominio; sin costo de certificado base. Agregue un dominio y pague uno. Necesita nueve dominios, pague nueve. Proteja hasta 250 dominios en un certificado.

Ofrecemos dos tipos de certificados Secure Site Pro: uno para certificados OV y otro para certificados EV.

  • Secure Site Pro SSL
    Obtenga el certificado OV que se ajusta a sus necesidades. Proporcione cifrado y autenticación para un dominio, un dominio con comodín y todos sus subdominios, o use nombres alternativos del sujeto (SAN) para proteger varios dominios y dominios con comodín con un certificado.
  • Secure Site Pro EV SSL
    Obtenga el certificado de validación ampliada que se ajusta a sus necesidades. Proporcione cifrado y autenticación para proteger un dominio o use nombres alternativos del sujeto (SAN) a fin de proteger varios sitios (nombres de dominio completo) con un certificado.

Beneficios incluidos con cada certificado Secure Site Pro

Cada certificado Secure Site Pro incluye (sin costo adicional) primer acceso a agregados futuros de funciones de primera calidad a CertCentral (por ejemplo, control de registro CT y gestión de validación).

Otros beneficios incluyen los siguientes:

  • Validación prioritaria
  • Asistencia de prioridad
  • Dos sellos del sitio de primera calidad
  • Verificación de malware
  • Garantías líderes de la industria

Para activar los certificados Secure Site Pro para su cuenta de CertCentral, póngase en contacto con el administrador de su cuenta o con nuestro Equipo de asistencia.

Para obtener más información sobre nuestros certificados Secure Site Pro, vea Secure Site Pro de DigiCert.

compliance

Los certificados SSL públicos ya no pueden proteger nombres de dominio con guiones bajos ("_"). Todos los certificados previamente emitidos que tengan guiones bajos en los nombres de dominio deben caducar antes de esta fecha.

Nota: La solución preferida respecto de los guiones bajos es renombrar los nombres de host (FQDN) que contengan los contengan y reemplazarlos en los certificados. No obstante, para aquellas situaciones en las que renombrar no sea posible, puede usar certificados privados y, en algunos casos, un certificado comodín que proteja todo el dominio.

Para obtener más detalles, vea Eliminación de los guiones bajos de los nombres de dominio.

enhancement

Mejoramos nuestras ofertas de certificado RapidSSL DV y ahora le permitimos incluir un segundo dominio muy específico en estos certificados de dominio único.

  • RapidSSL Standard DV
    Ahora en forma predeterminada, al pedir un certificado RapidSSL Standard DV, obtiene ambas versiones del nombre común en el certificado:[su-dominio].com y www.[su-dominio].com.
    Después de ingresar el nombre común, asegúrese de que la casilla Incluir tanto www.[su-dominio].com y[su-dominio].com en el certificado esté seleccionada.
    Anteriormente, tenía que pedir certificados separados para[su-dominio].com y www.[su-dominio].com.
  • RapidSSL Wildcard DV
    Ahora en forma predeterminada, al pedir un certificado RapidSSL Wildcard DV, obtiene el dominio con comodín y el dominio base en el certificado – *.[su-dominio].com y[su-dominio].com.
    Después de ingresar el nombre común, asegúrese de que la casilla Incluir tanto *.[su-dominio].com y[su-dominio].com en el certificado esté seleccionada.
    Anteriormente, tenía que pedir certificados separados para *.[su-dominio].com y[su-dominio].com.

Vea CertCentral: guía de inscripción de certificados DV.

enhancement

Mejoramos la terminal de certificados RapidSSL para incluir el parámetro dns_names y ahora le permitimos incluir un segundo dominio muy específico en estos certificados de dominio único.

  • RapidSSL Standard DV
    Al pedir un certificado RapidSSL Standard DV, puede incluir ambas versiones de su dominio en el certificado — [su-dominio].com y www.[su-dominio].com.
    "common_name": "[your-domain].com",
    "dns_names": ["www.[su-dominio].com"],

    Anteriormente, tenía que pedir certificados separados para [su-dominio].com y www.[su-dominio].com.
  • RapidSSL Wildcard DV
    Al pedir un certificado RapidSSL Wildcard DV, puede incluir el dominio base en el certificado — *.[su-dominio].com y[su-dominio].com).
    "common_name": "*.your-domain.com",
    "dns_names": ["[su-dominio].com"],

    Anteriormente, tenía que pedir certificados separados para *.[su-dominio].com y[su-dominio].com.

Para la documentación API de servicios de DigiCert, vea API e CertCentral.

new

Los certificados firma de documento individuales están disponibles en CertCentral:

  • Firma de documento: individual (500)
  • Firma de documento: individual (2000)

Para activar los certificados firma de documento individual para su cuenta de CertCentral, póngase en contacto con su representante de Ventas.

Anteriormente, solo estaban disponibles los certificados de firma de documento de la organización.

  • Firma de documento: organización (2000)
  • Firma de documento: organización (5000)

Para obtener más información sobre estos certificados, vea Certificado de firma de documento.

new

Los certificados RapidSSL y GeoTrust DV están disponibles en CertCentral:

  • RapidSSL Standard DV
  • RapidSSL Wildcard DV
  • GeoTrust Standard DV
  • GeoTrust Wildcard DV

Documentación

Enero 12, 2018

new

DigiCert hace que otro registro CT (Nessie) esté públicamente disponible. Nessie es un nuevo registro de Transparencia de certificados (CT) muy escalable y de alto rendimiento.

Este registro CT está formado por cinco registros que están partidos en incrementos de un año en función del vencimiento del certificado. A continuación, encontrará las URL de la terminal del registro CT con su intervalo de vencimiento del certificado.

Más detalles »