Filtro por: Services API x borrar
new

DIGICERT 2022 MAINTENANCE SCHEDULE

To make it easier to plan your certificate-related tasks, we scheduled our 2022 maintenance windows in advance. See DigiCert 2022 scheduled maintenance—this page is updated with all current maintenance schedule information.

With customers worldwide, we understand there is not a "best time" for everyone. However, after reviewing the data on customer usage, we selected times that would impact the fewest amount of our customers.

About our maintenance schedule

  • Maintenance is scheduled for the first weekend of each month unless otherwise noted.
  • Each maintenance window is scheduled for 2 hours.
  • Although we have redundancies to protect your service, some DigiCert services may be unavailable.
  • All normal operations will resume once maintenance is completed.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance begins and when it ends.

If you need more information regarding these maintenance windows, contact your account manager or DigiCert support team.

compliance

End of support for CBC ciphers in TLS connections

DigiCert will end support for Cipher-Block-Chaining (CBC) ciphers in TLS connections to our services on October 8, 2022, at 22:00 MDT (October 9, 2022, at 04:00 UTC).

This change affects browser-dependent services and applications relying on CBC ciphers that interact with these DigiCert services:

  • CertCentral and CertCentral Services API
  • Certificate Issuing Services (CIS)
  • CertCentral Simple Certificate Enrollment Protocol (SCEP)

This change does not affect your DigiCert-brand certificates. Your certificates will continue to work as they always have.

Why is DigiCert ending support for the CBC ciphers?

To align with Payment card industry (PCI) compliance standards, DigiCert must end support for the following CBC:

  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  • TLS_RSA_WITH_AES_256_CBC_SHA

What do I need to do?

If you are using a modern browser, no action is required. Most browsers support strong ciphers, such as Galois/Counter Mode (GCM) ciphers, including Mozilla Firefox, Google Chrome, Safari, and Microsoft Edge. We do recommend updating your browser to its most current version.

If you have applications or API integrations affected by this change, enable stronger ciphers, such as GCM ciphers, in those applications and update API integrations before October 8, 2022.

If you do not update API integrations and applications, they will not be able to use HTTPS to communicate with CertCentral, the CertCentral Services API, CIS, and SCEP.

Knowledge base article

See our Ending Support for CBC Ciphers in TLS connections to our services for more information.

Contact us

If you have questions or need help, contact your account manager or DigiCert Support.

enhancement

CertCentral Services API: Keep the "www" subdomain label when adding a domain to your account

To give you more control over your domain prevalidation workflows, we added a new optional request parameter to the Add domain API endpoint: keep_www. Use this parameter to keep the www. subdomain label when you add a domain using a domain control validation (DCV) method of email, dns-txt-token, or dns-cname-token.

By default, if you are not using file-based DCV, the Add domain endpoint always removes the www. subdomain label from the name value. For example, if you send www.example.com, DigiCert adds example.com to your account and submits it for validation.

To keep the www and limit the scope of the approval to the www subdomain, set the value of the keep_www request parameter to true:

keep_www example JSON

Learn more

enhancement

CertCentral Services API: Added label for verified contacts

In the CertCentral Services API, we added a new contact_type label for verified contacts: verified_contact.

Use the verified_contact label to identify verified contacts for an organization when you submit a request for an EV TLS, Verified Mark, Code Signing, or EV Code Signing certificate. The updated label applies to all verified contacts, regardless of which product type the order is for.

For example, this JSON payload shows how to use the verified_contact label to add a verified contact to an organization in a new certificate order request:

verified_contact.png

Note: Before this change, verified contacts were always identified with the label ev_approver. The CertCentral Services API will continue accepting ev_approver as a valid label for verified contacts on EV TLS, Verified Mark, Code Signing, and EV Code Signing certificate orders. The verified_contact label works the same as the ev_approver label, but the name is updated to apply to all products that require a verified contact.

enhancement

Improved API documentation for adding organizations to Code Signing and EV Code Signing orders

We updated the Order code signing certificate API documentation to describe three ways to add an organization to your Code Signing (CS) or EV Code Signing (EV CS) order requests:

  1. Add an existing organization already validated for CS or EV CS certificate issuance.
  2. Add an existing organization not validated for CS or EV CS and submit the organization for validation with your order.
  3. Create a new organization and submit it for validation with your CS or EV CS order request.

Learn more: Order code signing certificate – CS and EV CS organization validation

new

CertCentral: Edit SANs on pending orders: new, renewals, and reissues

DigiCert is happy to announce that CertCentral allows you to modify the common name and subject alternative names (SANs) on pending orders: new, renewals, and reissues.

Tired of canceling an order and placing it again because a domain has a typo? Now, you can modify the common name/SANs directly from a pending order.

Items to note when modifying SANs

  • Only admins and managers can edit SANs on pending orders.
  • Editing domains does not change the cost of the order.
  • You can only replace a wildcard domain with another wildcard domain and a fully qualified domain name (FQDN) with another FQDN.
  • The total number of domains cannot exceed the number included in the original request.
  • Removed SANs can be added back for free, up to the amount purchased, any time after DigiCert issues your certificate.
  • To reduce the certificate cost, you must cancel the pending order. Then submit a new request without the SANs you no longer want the certificate to secure.

See for yourself

  1. In your CertCentral account, in the left main menu, go to Certificates > Orders.
  2. On the Orders page, select the pending order with the SANs you need to modify.
  3. On the certificate’s Order details page, in the Certificate status section, under What do you need to do, next to Prove control over domains, select the edit icon (pencil).

See Edit common name and SANs on a pending TLS/SSL order: new, renewals, and reissues.


CertCentral Services API: Edit SANs on a pending order and reissue

To allow you to modify SANs on pending new orders, pending renewed orders, and pending reissues in your API integrations, we added a new endpoint to the CertCentral Services API. To learn how to use the new endpoint, visit Edit domains on a pending order or reissue.

enhancement

CertCentral Services API: New response parameters for Domain info and List domains endpoints

To make it easier for API clients to get the exact date and time domain validation reuse periods expire, we added new response parameters to the Domain info and List domains API endpoints:

  • dcv_approval_datetime: Completion date and time (UTC) of the most recent DCV check for the domain.
  • dcv_expiration_datetime: Expiration date and time (UTC) of the most recent DCV check for the domain.

Note: For domain validation expiration dates, use the new dcv_expiration_datetime response parameter instead of relying on the dcv_expiration.ov and dcv_expiration.ev fields. Since October 1, 2021, the domain validation reuse period is the same for both OV and EV TLS/SSL certificate issuance. The new dcv_expiration_datetime response parameter returns the expiration date for both OV and EV domain validation.

Learn more:

new

Upcoming scheduled maintenance

Some DigiCert services will be down for about 15 minutes during scheduled maintenance on August 6, 2022, 22:00 – 24:00 MDT (August 7, 2022, 04:00 – 06:00 UTC).

Infrastructure-related maintenance downtime

The infrastructure-related maintenance starts at 22:00 MDT (04:00 UTC). At that time, the services listed below may be down, or experience delayed responses for approximately 15 minutes.

Affected services:

CertCentral® / Services API

  • Unable to access your CertCentral account.
  • Services API will be unable to process requests.
  • APIs will return a "503 Service is unavailable" error.
  • Resubmit failed requests after services are restored.

CertCentral Automation / API

  • Reschedule automation events around maintenance.
  • If automation events cannot be rescheduled, retry failed events after services are restored.

CertCentral Discovery / API

  • Reschedule Discovery scans around maintenance.
  • If scans cannot be rescheduled, retry failed scans after services are restored.

CertCentral Certificate Issuing Service (CIS) and Simple Certificate Enrollment Protocol (SCEP)

  • Requests submitted during this time will fail.
  • APIs will return a "503 Service is unavailable" error.
  • Failed requests should be resubmitted after services are restored.

Direct Cert Portal / API

  • Unable to access your Direct Cert Portal account.
  • Direct Cert Portal API will be unable to process requests.
  • APIs will return a "503 Service is unavailable" error.
  • Resubmit failed requests after services are restored.

What can I do?
Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • Expect interruptions if you use the APIs for immediate certificate issuance and automated tasks.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance starts and when maintenance ends.
  • For scheduled maintenance dates and times, see DigiCert 2022 scheduled maintenance.

Services will be restored as soon as the maintenance is completed.

new

CertCentral Services API: Archive and restore certificates

To give API clients the option to hide unused certificates from API response data, we released new API endpoints to archive and restore certificates. By default, archived certificates do not appear in response data when you submit a request to the List reissues or List duplicates API endpoints.

New API endpoints

Updated API endpoints

We updated the List reissues and List duplicates endpoints to support a new optional URL query parameter: show_archived. If the value of show_archived is true, the response data includes archived certificates. If false (default), the response omits archived certificates.

new

Upcoming Schedule Maintenance

Some DigiCert services will be down for a total of 20 minutes during scheduled maintenance on July 9, 2022, 22:00 – 24:00 MDT (July 10, 2022, 04:00 – 06:00 UTC).

Infrastructure-related maintenance downtime

The services listed below will be down for a total of 20 minutes while we perform our infrastructure-related maintenance. The downtime consists of two 10-minute windows, one at the start and one at the end of the infrastructure-related work:

  • Start: 22:00 – 22:10 MDT (UTC -6)
  • End: 23:30 – 23:40 MDT (UTC -6)*

*The plan is to end our maintenance at approximately 23:30 MDT (UTC –6). However, if issues occur, we will need to end this work early, which means the second downtime may happen earlier than planned.


Affected services

CertCentral® / Services API

  • Unable to access your CertCentral account.
  • Services API will be unable to process requests.
  • APIs will return a "503 Service is unavailable" error.
  • Resubmit failed requests after services are restored.

CertCentral Automation / API

  • Reschedule automation events around maintenance.
  • If automation events cannot be rescheduled, retry failed events after services are restored.

Discovery / API

  • Reschedule Discovery scans around maintenance.
  • If scans cannot be rescheduled, retry failed scans after services are restored.

Direct Cert Portal / API

  • Unable to access your Direct Cert Portal account
  • Direct Cert Portal API will be unable to process requests.
  • APIs will return a "503 Service is unavailable" error.
  • Resubmit failed requests after services are restored.

QuoVadis® TrustLink® certificate issuance

  • TrustLink certificate requests submitted during this time will be delayed
  • Requests will be queued and processed after services are restored

PKI Platform 8 new domain and organization validation

  • New domains submitted for validation during this time will be delayed.
  • New organizations submitted for validation during this time will be delayed.
  • Requests will be queued and processed after services are restored.


What can I do?

Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • Expect interruptions if you use the APIs for immediate certificate issuance and automated tasks.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance begins and when it ends.
  • For scheduled maintenance dates and times, see DigiCert 2022 scheduled maintenance.

Services will be restored as soon as we complete the maintenance.

enhancement

CertCentral Services API: Improved Order info API response

Update: To give API consumers more time to evaluate the impact of the Order info API response changes on their integrations, we are postponing this update until May 31, 2022. We originally planned to release the changes described below on April 25, 2022.

On May 31, 2022, DigiCert will make the following improvements to the Order info API. These changes remove unused values and update the data structure of the order details object to be more consistent for orders in different states across product types.

For more information and response examples for public TLS, code signing, document signing, and Class 1 S/MIME certificates, see the reference documentation for the Order info endpoint.

If you have questions or need help with these changes, contact your account representative or DigiCert Support.

Need to test your API integration?

To help CertCentral Services API consumers evaluate the impact of these changes, DigiCert is providing a beta server for API consumers to test their integrations prior to the May 31, 2022 release. To learn more, see our knowledge base article: DigiCert CertCentral Services API beta server.


General enhancements

The following changes apply to orders for various certificate types irrespective of order status.

Removed parameters:

  • public_id (string)
    For all orders, the API will stop returning the public_id parameter. DigiCert no longer supports the Express Install workflow that required a public_id value.
  • certificate.ca_cert_id (string)
    For DV certificate orders, the API will stop returning the ca_cert_id parameter. The value of this parameter is an internal ID for the issuing ICA certificate and cannot be used externally. The API already excludes the ca_cert_id parameter from the order details for other product types.

    To get the name and public ID of the issuing ICA certificate associated with the order, use the ca_cert object instead.
  • verified_contacts (array of objects)
    For document signing certificate orders, the API will stop returning the verified_contacts array. The API already excludes the verified_contacts array from the order details for other product types.
  • certificate.dns_names (array of strings)
    If there are no DNS names associated with the order (for example, if the order is for a code signing, document signing, or Class 1 S/MIME certificate), the API will stop returning the dns_names array.

    Before, the API returned a dns_names array with an empty string: [" "]
  • certificate.organization_units (array of strings)
    If there are no organization units associated with the order, the API will stop returning an organization_units array.

    Before, for some product types, the API returned an organization_units array with an empty string: [" "]
  • certificate.cert_validity
    In the cert_validity object, the API will only return a key/value pair for the unit used to set the certificate validity period when the order was created. For example, if the validity period of the certificate is for 1 year, the cert_validity object will return a years parameter with a value of 1.

    Before, the cert_validity object sometimes returned values for both days and years.

Added parameters:

  • order_validity (object)
    For code signing, document signing, and client certificate orders, the API will start returning an order_validity object.

    The order_validity object returns the days, years, or custom_expiration_date for the order validity period. The API already includes an order_validity object in the order details for public SSL/TLS products.
  • payment_profile (object)
    For DV certificate orders, if the order is associated with a saved credit card, the API will start returning a payment_profile object. The API already includes a payment_profile object in the order details for other product types.
  • server_licenses
    For DV certificate orders, the API will start returning the server_licenses parameter. The API already includes the server_licenses parameter in the order details for other product types.

Unapproved order requests

The following changes apply only to certificate order requests that are pending approval or that have been rejected. These changes bring the data structure of the response closer to what the API returns after the request is approved and the order is submitted to DigiCert for validation and issuance.

To manage unapproved and rejected requests, we recommend using the Request endpoints (/request) instead of retrieving the order details. We designed the /request endpoints to manage pending and rejected certificate order requests, and these endpoints remain unchanged.

Note: For quicker certificate issuance, we recommend using a workflow that skips or omits the request approval step for new certificate orders. If your API workflow already skips or omits the approval step, you can safely ignore the changes below. Learn more about removing the approval step:

Added parameters:

  • disable_ct (boolean)
  • allow_duplicates (boolean)
  • cs_provisioning_method (string)

Removed parameters:

  • server_licenses (integer)
    For unapproved order requests, the API will stop returning the server_licenses parameter. The API will continue including the server_licenses parameter in order details for approved order requests.

Improved organization object
To provide a consistent data structure in the order details for unapproved and approved order requests, the API will return a modified organization object on unapproved order requests for some product types.

The API will stop returning the following unexpected properties on unapproved order requests for all product types:

  • organization.status (string)
  • organization.is_hidden (boolean)
  • organization.organization_contact (object)
  • organization.technical_contact (object)
  • organization.contacts (array of objects)

The API will start returning the following expected properties, if existing, on unapproved order requests for all product types:

  • organization.name (string)
  • organization.display_name (string)
  • organization.assumed_name (string)
  • organization.city (string)
  • organization.country (string)

To get organization details not included in the Order info response, use the Organization info API endpoint.

new

CertCentral: Update organization and technical contacts from the organization's details page

We are happy to announce you can now manage your organization and technical contacts from your organization's details page. This new feature allows you to replace incorrect contacts anytime.

Note: Before, you could only view the existing organization and technical contacts when visiting the organization's details page. The only way to replace an organization or technical contact was when requesting a TLS certificate.

The next time you visit an organization's details page, you can update the organization contact and technical contact for the organization. After editing a contact, you will see the new contact information the next time you order a certificate that includes organization and technical contacts.

Items to note when replacing contacts:

  • Replacing a contact is not retroactive and does not affect existing certificate orders, issued or pending.
  • Replacing the organization contact does not affect the organization validation. However, we will contact the organization directly to verify the new organization contact.

See for yourself

  1. In your CertCentral account, in the left main menu, go to Certificates > Organizations.
  2. On the Organizations page, select the name of the organization.
  3. On the organization's details page, you can now replace the organization contact and add, delete, and replace the technical contact.

Learn more:

new

CertCentral Services API: Update organization and technical contacts

To help you manage the organization and technical contacts for your organizations in your API integrations, we added the following endpoints to the CertCentral Services API:

new

Upcoming Schedule Maintenance

Update: There is no planned downtime during maintenance on May 7, MDT (May 8, UTC).

DigiCert will perform scheduled maintenance on May 7, 2022, between 22:00 – 24:00 MDT (May 8, 2022, between 04:00 – 06:00 UTC). Although we have redundancies to protect your services, some DigiCert services may be unavailable during this time.

What can I do?

Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • Expect interruptions if you use the APIs for immediate certificate issuance and automated tasks.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance begins and when it ends.
  • See the DigiCert 2022 maintenance schedule for maintenance dates and times.

Services will be restored as soon as we complete the maintenance.

new

CertCentral Services API: Domain locking API endpoints

DigiCert is happy to announce our domain locking feature is now available in the CertCentral Services API.

Note: Before you can use the domain locking endpoints, you must first enable domain locking for your CertCentral account. See Domain locking  – Enable domain locking for your account.

New API endpoints

Updated API endpoints

We updated the response for the Domain info and List domains endpoints to include the following parameters with domain lock details:

  • domain_locking_status (string)
    Domain lock status. Only returned if domain locking is enabled for the account.
  • account_token (string)
    Domain lock account token. Only returned if domain locking is enabled for the account, and if domain locking has been activated for the domain at least once.

To learn more, see:

new

Upcoming Schedule Maintenance

DigiCert will perform scheduled maintenance on April 2, 2022, between 22:00 – 24:00 MDT (April 3, 2022, between 04:00 – 06:00 UTC). During this time, some services may be down for up to two hours.

Note: Maintenance will be one hour earlier for those who don't observe daylight savings.

Infrastructure-related maintenance downtime

We will start this infrastructure-related maintenance at 22:00 MDT (04:00 UTC). Then the services listed below may be down for up to two hours.

CertCentral® TLS certificate issuance:

  • TLS certificate requests submitted during this time will fail
  • Failed requests should be resubmitted after services are restored

CIS and CertCentral® SCEP:

  • Certificate Issuing Service (CIS) will be down
  • CertCentral Simple Certificate Enrollment Protocol (SCEP) will be down
  • Requests submitted during this time will fail
  • CIS APIs will return a "503 Service is unavailable" error
  • Failed requests should be resubmitted after services are restored

Direct Cert Portal new domain and organization validation:

  • New domains submitted for validation during this time will fail
  • New organizations submitted for validation during this time will fail
  • Failed requests should be resubmitted after services are restored

QuoVadis® TrustLink® certificate issuance:

  • TrustLink certificate requests submitted during this time will be delayed
  • Requests will be added to a queue for processing later
  • Queued-up requests will be processed after services are restored

PKI Platform 8 new domain and organization validation:

  • New domains submitted for validation during this time will fail
  • New organizations submitted for validation during this time will fail
  • Requests will be added to a queue for processing later
  • Queued-up requests will be processed after services are restored
  • Access to User Authorization Agent (UAA) services will be disabled: both the UAA Admin and User web portals

What can I do?

Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • Expect interruptions if you use the APIs for immediate certificate issuance and automated tasks.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance begins and when it ends.
  • For scheduled maintenance dates and times, see DigiCert 2022 scheduled maintenance.

Services will be restored as soon as we complete the maintenance.

new

CertCentral: DNS CNAME DCV method now available for DV certificate orders

In CertCentral and the CertCentral Services API, you can now use the DNS CNAME domain control validation (DCV) method to validate the domains on your DV certificate order.

Note: Before, you could only use the DNS CNAME DCV method to validate the domains on OV and EV certificate orders and when prevalidating domains.

To use the DNS CNAME DCV method on your DV certificate order:

  • In CertCentral:
    • When ordering a DV TLS certificate, you can select DNS CNAME as the DCV method.
    • On the DV TLS certificate's order details page, you can change the DCV method to DNS CNAME Record.
  • In the Services API:
    • When requesting a DV TLS certificate, set the value of the dcv_method request parameter to dns‑cname‑token.

Note: The AuthKey process for generating request tokens for immediate DV certificate issuance does not support the DNS CNAME DCV method. However, you can use the File Auth (http‑token) and DNS TXT (dns‑txt‑token) DCV methods. To learn more, visit DV certificate immediate issuance.

To learn more about using the DNS CNAME DCV method:

enhancement

CertCentral Services API: Improved List domains endpoint response

To make it easier to find information about the domain control validation (DCV) status for domains in your CertCentral account, we added these response parameters to domain objects in the List domains API response:

  • dcv_approval_datetime: Completion date and time of the most recent DCV check for the domain.
  • last_submitted_datetime: Date and time the domain was last submitted for validation.

For more information, see the reference documentation for the List domains endpoint.

new

Upcoming Schedule Maintenance

DigiCert will perform scheduled maintenance on March 5, 2022, between 22:00 – 24:00 MST (March 6, 2022, between 05:00 – 07:00 UTC). During this time, some services may be down for up to two hours.

Infrastructure-related maintenance downtime

We will start this infrastructure-related maintenance at 22:00 MST (05:00 UTC). Then the services listed below may be down for up to two hours.

CertCentral™ TLS certificate issuance:

  • TLS certificate requests submitted during this time will fail
  • Failed requests should be resubmitted after services are restored

CIS and CertCentral™ SCEP:

  • Certificate Issuing Service (CIS) will be down
  • CertCentral Simple Certificate Enrollment Protocol (SCEP) will be down
  • Requests submitted during this time will fail
  • CIS APIs will return a "503 Service is unavailable" error
  • Failed requests should be resubmitted after services are restored

Direct Cert Portal new domain and organization validation:

  • New domains submitted for validation during this time will fail
  • New organizations submitted for validation during this time will fail
  • Failed requests should be resubmitted after services are restored

QuoVadis™ TrustLink™ certificate issuance:

  • TrustLink certificate requests submitted during this time will be delayed
  • Requests will be added to a queue for processing later
  • Queued-up requests will be processed after services are restored

PKI Platform 8 new domain and organization validation:

  • New domains submitted for validation during this time will fail
  • New organizations submitted for validation during this time will fail
  • Requests will be added to a queue for processing later
  • Queued-up requests will be processed after services are restored

What can I do?

Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • Expect interruptions if you use the APIs for immediate certificate issuance and automated tasks.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance begins and when it ends.
  • For scheduled maintenance dates and times, see DigiCert 2022 scheduled maintenance.

Services will be restored as soon as we complete the maintenance.

fix

CertCentral: Improved verified contact EV TLS certificate request approval process

In CertCentral and the CertCentral Services API, we updated the EV TLS certificate request process to only send the EV TLS request approval emails to the verified contacts you include on the certificate request.

Note: Before, when you requested an EV TLS certificate, we sent the EV order approval email to all the verified contacts for the organization.

Add verified contacts to an EV TLS certificate request:

  • CertCentral
    When requesting an EV TLS certificate, you can:
    • Keep the existing verified contacts assigned to the organization
    • Remove contacts (at least one is required)
    • Add new contacts (we must validate each new contact, which may delay certificate issuance).
  • Services API
    When requesting an EV TLS certificate, include the verified contacts in the organization.contacts array of the JSON request. For verified contacts, the value of the contact_type field is ev_approver.

To learn more about EV TLS certificate requests:

enhancement

CertCentral Services API: Domain info enhancement

We updated the Domain info API response to include the expiration_date parameter for the DCV token associated with the domain. Now, when you call the Domain info API and set the value of the include_dcv query parameter to true, the dcv_token object in the response includes the expiration_date of the DCV token for the domain.

enhancement

Improved Domains page, Validation status filter—Completed / Validated

On the Domains page, in the Validation status dropdown, we updated the Completed / Validated filter to make it easier to find domains with completed and active domain control validation (DCV).

Note: Before, when you searched for domains with Completed / Validated DCV, we returned all domains with completed DCV even if the domain validation had expired.

Now, when you search for domains with Completed / Validated DCV, we only return domains with completed and active DCV in your search results. To find domains with expired DCV, use the Expired filter in the Validation status dropdown.

Find domains with completed and active DCV

  1. In CertCentral, in the left main menu, go to Certificates > Domains.
  2. On the Domains page, in the Validation status dropdown, select Completed / Validated.
enhancement

CertCentral Services API: List domains enhancement

For the List domains API, we updated the filters[validation]=completed filter to make it easier to find domains validated for OV or EV certificate issuance.

Before, this filter returned all domains with completed DCV checks, even if the domain validation had expired. Now, the filter only returns domains with an active OV or EV domain validation status

new

Upcoming Scheduled Maintenance

DigiCert will perform scheduled maintenance on January 8, 2022, between 22:00 – 24:00 MST (January 9, 2022, between 05:00 – 07:00 UTC). Although we have redundancies to protect your service, some DigiCert services may be unavailable during this time.

What can I do?

Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • If you use the APIs for immediate certificate issuance and automated tasks, expect interruptions.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance begins and when it ends.
  • For scheduled maintenance dates and times, see DigiCert 2022 scheduled maintenance.

Services will be restored as soon as we complete the maintenance.

new

Para que sea más fácil planificar sus tareas relacionadas con sus certificados, hemos programado nuestro cronograma de períodos de mantenimiento para 2021 con anticipación. Consulte Mantenimiento programado para 2021 de DigiCert (esta página se actualiza con toda la información del cronograma de mantenimiento).

Debido a que tenemos clientes en todo el mundo, entendemos que no hay un buen momento para todos. Sin embargo, luego de examinar la información de uso por los clientes, seleccionamos los horarios que afectarán a la menor cantidad de clientes posible.

Acerca de nuestro cronograma de mantenimiento

  • Programamos el mantenimiento para el primer fin de semana de cada mes, salvo indicación contraria.
  • Cada período de mantenimiento dura 2 horas.
  • Aunque tenemos redundancias para proteger su servicio, algunos servicios de DigiCert podrían no estar disponibles.
  • Todas las funciones normales volverán a estar disponibles tras el mantenimiento.

Si necesita más información sobre estos períodos de mantenimiento, comuníquese con su gestor de cuentas o con el equipo de asistencia de DigiCert. Para obtener actualizaciones en vivo, suscríbase a la página de estado de DigiCert.

new

Upcoming Scheduled Maintenance

DigiCert will perform scheduled maintenance on December 4, 2021, between 22:00 – 24:00 MST (December 5, 2021, between 05:00 – 07:00 UTC). Although we have redundancies to protect your service, some DigiCert services may be unavailable during this time.

What can I do?

Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • Expect interruptions if you use the APIs for immediate certificate issuance and automated tasks.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance begins and when it ends.
  • For scheduled maintenance dates and times, see DigiCert 2021 scheduled maintenance.

Services will be restored as soon as we complete the maintenance.

compliance

Industry changes to file-based DCV (HTTP Practical Demonstration, file auth, file, HTTP token, and HTTP auth)

To comply with new industry standards for the file-based domain control validation (DCV) method, you can only use the file-based DCV to demonstrate control over fully qualified domain names (FQDNs), exactly as named.

To learn more about the industry change, see Domain validation policy changes in 2021.

How does this affect me?

As of November 16, 2021, you must use one of the other supported DCV methods, such as Email, DNS TXT, and CNAME, to:

  • Validate wildcard domains (*.example.com)
  • To include subdomains in the domain validation when validating the higher-level domain. For example, if you want to cover www.example.com, when you validate the higher-level domain, example.com.
  • Prevalidate entire domains and subdomains.

To learn more about the supported DCV method for DV, OV, and EV certificate requests:

compliance

CertCentral: Pending certificate requests and domain prevalidation using file-based DCV

Pending certificate request

If you have a pending certificate request with incomplete file-based DCV checks, you may need to switch DCV methods* or use the file-based DCV method to demonstrate control over every fully qualified domain name, exactly as named, on the request.

*Note: For certificate requests with incomplete file-based DCV checks for wildcard domains, you must use a different DCV method.

To learn more about the supported DCV methods for DV, OV, and EV certificate requests:

Domain prevalidation

If you plan to use the file-based DCV method to prevalidate an entire domain or entire subdomain, you must use a different DCV method.

To learn more about the supported DCV methods for domain prevalidation, see Supported domain control validation (DCV) methods for domain prevalidation.

compliance

CertCentral Services API

If you use the CertCentral Services API to order certificates or submit domains for prevalidation using file-based DCV (http-token), this change may affect your API integrations. To learn more, visit File-based domain control validation (http-token).

new

Upcoming Schedule Maintenance

DigiCert will perform scheduled maintenance on November 6, 2021, between 22:00 – 24:00 MDT (November 7, 2021, between 04:00 – 06:00 UTC).


CertCentral infrastructure-related maintenance downtime

We will start this infrastructure-related maintenance between 22:00 and 22:10 MDT (04:00 and 04:10 UTC). Then, for approximately 30 minutes, the following services will be down:

DV certificate issuance for CertCentral, ACME, and ACME agent automation

  • DV certificate requests submitted during this time will fail
  • APIs will return a "cannot connect" error
  • Failed requests should be resubmitted after services are restored

CIS and SCEP

  • Certificate Issuing Service (CIS) will be down
  • Simple Certificate Enrollment Protocol (SCEP) will be down
  • DigiCert will be unable to issue certificates for CIS and SCEP
  • APIs will return a "cannot connect" error
  • Requests that return "cannot connect" errors should be resubmitted after services are restore

QuoVadis TrustLink certificate issuance

  • TrustLink certificate requests submitted during this time will fail
  • However, failed requests will be added to a queue for processing later
  • Queued-up requests will be processed after services are restored, as required

This maintenance only affects DV certificate issuance, CIS, SCEP, and TrustLink certificate issuance. It does not affect any other DigiCert platforms or services .


PKI Platform 8 maintenance

We will start the PKI Platform 8 maintenance at 22:00 MDT (04:00 UTC). Then, for approximately 30 minutes, the PKI Platform 8 will experience service delays and performance degradation that affect:

  • Signing in and using your PKI Platform 8 to perform in-console certificate lifecycle tasks.
  • Using any of your PKI Platform 8 corresponding APIs or protocols (for example, SOAP, REST, SCEP, and EST) to perform certificate lifecycle operations.
  • Performing certificate lifecycle tasks/operations:
    • Enrolling certificates: new, renew, or reissues
    • Adding domains and organizations
    • Submitting validation requests
    • Viewing reports, revoking certificates, and creating profiles
    • Adding users, viewing certificates, and downloading certificates
  • Certificate issuance for PKI Platform 8 and its corresponding API.

Additionally:

  • APIs will return a "cannot connect" error.
  • Certificate enrollments that receive "cannot connect" errors must be resubmitted after DigiCert restores services.

The PKI Platform 8 maintenance only affects PKI Platform 8. It does not affect any other DigiCert platforms or services.


Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • Expect interruptions if you use the APIs for immediate certificate issuance and automated tasks.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance begins and when it ends.
  • For scheduled maintenance dates and times, see DigiCert 2021 scheduled maintenance.

Services will be restored as soon as we complete the maintenance.

new

Upcoming Schedule Maintenance

On October 2, 2021, between 22:00 – 24:00 MDT (October 3, 2021, between 04:00 – 06:00 UTC), DigiCert will perform scheduled maintenance.


CertCentral, CIS, SCEP, Direct Cert Portal, and DigiCert ONE maintenance

DigiCert will perform scheduled maintenance. Although we have redundancies to protect your service, some DigiCert services may be unavailable during this time.

What can I do?

Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • Expect interruptions if you use the APIs for immediate certificate issuance and automated tasks.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance begins and when it ends.
  • For scheduled maintenance dates and times, see DigiCert 2021 scheduled maintenance.

Services will be restored as soon as we complete the maintenance.


PKI Platform 8 maintenance and downtime:

DigiCert will perform scheduled maintenance on PKI Platform 8. During this time, the PKI Platform 8 and its corresponding APIs will be down for approximately 20 minutes.

We will start the PKI Platform 8 maintenance at 22:00 MDT (04:00 UTC).

Then, for approximately 20 minutes:

  • You will be unable to sign in and use your PKI Platform 8 to perform in-console certificate lifecycle tasks.
  • You will be unable to use any of your PKI Platform 8 corresponding APIs or protocols (for example, SOAP, REST, SCEP, and EST) to perform certificate lifecycle operations.
  • You will be unable to:
    • Enroll certificates: new, renew, or reissues
    • Add domains and organizations
    • Submit validation requests
    • View reports, revoke certificates, and create profiles
    • Add users, view certificates, and download certificates
  • DigiCert will be unable to issue certificates for PKI Platform 8 and its corresponding API.
  • APIs will return a "cannot connect" error.
  • Certificate enrollments that receive "cannot connect" errors must be resubmitted after DigiCert restores services.

The PKI Platform 8 maintenance only affects PKI Platform 8. It does not affect any other DigiCert platforms or services.

What can I do?

Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • Expect interruptions if you use the APIs for immediate certificate issuance and automated tasks.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance begins and when it ends.
  • For scheduled maintenance dates and times, see DigiCert 2021 scheduled maintenance.

Services will be restored as soon as we complete the maintenance.

new

Upcoming Schedule Maintenance

On September 11, 2021, between 22:00 – 24:00 MDT (September 12, 2021, between 04:00 – 06:00 UTC), DigiCert will perform scheduled maintenance.


CertCentral, CIS, SCEP, Direct Cert Portal, and DigiCert ONE maintenance

DigiCert will perform scheduled maintenance. Although we have redundancies to protect your service, some DigiCert services may be unavailable during this time.

What can I do?

Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • Expect interruptions if you use the APIs for immediate certificate issuance and automated tasks.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance begins and when it ends.
  • For scheduled maintenance dates and times, see DigiCert 2021 scheduled maintenance.

Services will be restored as soon as we complete the maintenance.


PKI Platform 8 maintenance and downtime:

DigiCert will perform scheduled maintenance on PKI Platform 8. During this time, the PKI Platform 8 and its corresponding APIs will be down for approximately 60 minutes.

We will start the PKI Platform 8 maintenance at 22:00 MDT (04:00 UTC).

Then, for approximately 60 minutes:

  • You will be unable to sign in and use your PKI Platform 8 to perform in-console certificate lifecycle tasks.
  • You will be unable to use any of your PKI Platform 8 corresponding APIs or protocols (for example, SOAP, REST, SCEP, and EST) to perform certificate lifecycle operations.
  • You will be unable to:
    • Enroll certificates: new, renew, or reissues
    • Add domains and organizations
    • Submit validation requests
    • View reports, revoke certificates, and create profiles
    • Add users, view certificates, and download certificates
  • DigiCert will be unable to issue certificates for PKI Platform 8 and its corresponding API.
  • APIs will return a "cannot connect" error.
  • Certificate enrollments that receive "cannot connect" errors must be resubmitted after DigiCert restores services.

The PKI Platform 8 maintenance only affects PKI Platform 8. It does not affect any other DigiCert platforms or services.

What can I do?

Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • Expect interruptions if you use the APIs for immediate certificate issuance and automated tasks.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance begins and when it ends.
  • For scheduled maintenance dates and times, see DigiCert 2021 scheduled maintenance.

Services will be restored as soon as we complete our maintenance.

enhancement

CertCentral Services API: Domain management enhancements

To make it easier to maintain active validation for domains in your account, we added new filters, response fields, and a new endpoint to our domain management APIs. With these updates, you can:

  • Find domains with OV and EV validation reuse periods that are expired or expiring soon.
  • Find domains affected by the September 27, 2021 policy change to shorten OV domain validation reuse periods.*

Enhanced APIs: List domains and List subaccount domains

We made the following enhancements to the List domains and List subaccount domains endpoints:

  • Added validation filter values
    On September 27, 2021*, existing OV domain validation reuse periods will shorten to 397 days from the date validation was completed. For some domains, the reduced validation period will have already expired, or will expire before the end of 2021.

    To help you find these domains so you can resubmit them for validation, we added a new value for the validation filter: shortened_by_industry_changes. We also added filter values to help you find domains with OV or EV domain validation periods that expire in different timeframes. The new validation filter values include:
    • shortened_by_industry_changes
    • ov_expired_in_last_7_days
    • ov_expiring_within_7_days
    • ov_expiring_within_30_days
    • ov_expiring_from_31_to_60_days
    • ov_expiring_from_61_to_90_days
    • ev_expired_in_last_7_days
    • ev_expiring_within_7_days
    • ev_expiring_within_30_days
    • ev_expiring_from_31_to_60_days
    • ev_expiring_from_61_to_90_days
  • Added fields to the dcv_expiration object
    You can now submit a request that returns the following fields in the dcv_expiration object: ov_shortened, ov_status, ev_status, and dcv_approval_date. These fields only return if your request includes the newly added query string filters[include_validation_reuse_status]=true.
  • Added dcv_method filter
    We added the option to filter domains by domain control validation (DCV) method. To use this filter, append the query string filters[dcv_method]={{value}} to the request URL. Possible values are email, dns-cname-token, dns-txt-token, http-token, and http-token-static.

Enhanced API: Domain info
You can now submit a request to the Domain info endpoint that returns the following fields in the dcv_expiration object: ov_shortened, ov_status, ev_status, and dcv_approval_date. These fields only return if your request includes the newly added query string include_validation_reuse_status=true.


New API: Expiring domains count

We added a new endpoint that returns the number of domains in your account with expired or expiring OV or EV domain validations. For more information, see Expiring domains count.

*On September 27, 2021, the expiration date for existing OV domain validations will shorten to 397 days from the date validation was completed. Learn more about this policy change: Domain validation changes in 2021.

new

CertCentral Services API: Get orders by alternative order ID

We created a new endpoint to make it easier to get certificate order details using alternative order IDs: Get orders by alternative order ID. This endpoint returns the order ID, certificate ID, and order status of certificate orders with the alternative_order_id you provide in the URL path.

new

Verified Mark Certificates available now.

Verified Mark Certificates (VMCs) are a new type of certificate that allow companies to place a certified brand logo next to the “sender” field in customer inboxes—visible before the message is opened—acting as confirmation of your domain’s DMARC status and your organization’s authenticated identity. Learn more about VMC certificates.

To disable or change availability of VMC in your account, visit the Product Settings page.

Note: If you do not see VMCs in your account, it may be because we are not offering the product to all account types yet. It is also possible that the product is available, but one of your CertCentral account’s administrators turned the product off in Product Settings.

new

CertCentral Services API: Verified Mark Certificate enhancements

To help you manage your Verified Mark Certificate (VMC) orders in your API integrations, we’ve made the following updates to the CertCentral Services API.

New endpoints:

Updated endpoints:

  • Order info
    We updated the Order info endpoint to return a vmc object with the trademark country code, registration number, and logo information for VMC orders.
  • Email certificate
    We updated the Email certificate endpoint to support emailing a copy of your issued VMC.

To learn more about managing VMC certificates from your API integrations, visit Verified Mark Certificate workflow.

new

Upcoming schedule maintenance

On July 10, 2021, between 22:00 – 24:00 MDT (July 11, 2021, between 04:00 – 06:00 UTC), DigiCert will perform scheduled maintenance.

During maintenance, for approximately 60 minutes, the services specified below under Service downtime will be down. Due to the scope of the maintenance, the services specified below under Service interruptions may experience brief interruptions during a 10-minute window.

Service downtime

From 22:00 – 23:00 MDT (04:00 – 05:00 UTC), while we perform database-related maintenance, the following services will be down for up to 60 minutes:

  • CertCentral / Services API
  • Direct Cert Portal / API
  • ACME
  • Discovery / API
  • ACME agent automation / API

API Note: Affected APIs will return “cannot connect” errors. Certificate-related API requests that return a “cannot connect” error message during this window will need to be placed again after services are restored.

Service interruptions

During a 10-minute window, while we perform infrastructure maintenance, the following DigiCert service may experience brief service interruptions:

  • Certificate Issuing Service (CIS)
  • Simple Certificate Enrollment Protocol (SCEP)
  • DigiCert ONE
  • Automation service
  • CT Log monitoring
  • Vulnerability assessment
  • PCI compliance scans

Services not affected

These services are not affected by the maintenance activities:

  • PKI Platform 8
  • PKI Platform 7
  • QuoVadis TrustLink

What can I do?

Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • Expect interruptions if you use the APIs for immediate certificate issuance and automated tasks.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance starts and when maintenance ends.
  • For scheduled maintenance dates and times, see DigiCert 2021 scheduled maintenance.

Services will be restored as soon as the maintenance is completed.

new

Upcoming scheduled maintenance

On June 5, 2021, between 22:00 – 24:00 MDT (June 6, 2021, between 04:00 – 06:00 UTC), DigiCert will perform scheduled maintenance. Although we have redundancies to protect your service, some DigiCert services may be unavailable during this time.

What can I do?

Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance starts and when maintenance ends.
  • For scheduled maintenance dates and times, see DigiCert 2021 scheduled maintenance.

Services will be restored as soon as we complete the maintenance.

enhancement

CertCentral Services API: Improved domains array in OV/EV order response

To make it easier to see how the Services API groups the domains on your OV/EV TLS certificate orders for validation, we added a new response parameter to the endpoints for submitting certificate order requests: domains[].dns_name.*

The dns_name parameter returns the common name or SAN of the domain on the order. To prove you control this domain, you must have an active validation for the domain associated with the domains[].name and domains[].id key/value pairs.

Example OV certificate order

JSON payload:

JSON payload

JSON response:

JSON response

The Services API returns the domains[].dns_name parameter in the JSON response for the following endpoints:

*Note: Only order requests for OV/EV TLS certificates return a domains array.

new

Upcoming scheduled maintenance

On May 1, 2021, between 22:00 – 24:00 MDT (May 2, 2021, between 04:00 – 06:00 UTC), DigiCert will perform scheduled maintenance.

For up to 10 minutes total during the 2-hour window, we will be unable to issue certificates for the DigiCert platforms, their corresponding APIs, immediate certificate issuance, and those using the APIs for other automated tasks.

Affected services:

  • CertCentral / Service API
  • ACME
  • ACME agent automation / API
  • Direct Cert Portal / API
  • Certificate Issuing Service (CIS)
  • Simple Certificate Enrollment Protocol (SCEP)
  • QuoVadis TrustLink

Services not affected

  • PKI Platform 8
  • PKI Platform 7
  • DigiCert ONE managers

API note:

  • APIs will return "cannot connect" errors.
  • Certificate requests submitted during this window that receive a "cannot connect" error message will need to be placed again after services are restored.

What can I do?

Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • Expect interruptions if you use the APIs for immediate certificate issuance and automated tasks.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance starts and when maintenance ends.
  • For scheduled maintenance dates and times, see DigiCert 2021 scheduled maintenance.

Services will be restored as soon as we complete the maintenance.

enhancement

CertCentral Services API: Domain validation status in Domain info response

To make it easier to get a comprehensive validation status for your domains, DigiCert is deprecating the status parameter in the Domain info response. To ensure you are getting complete and accurate status information for each different validation type on your domains, you should use the validations array when you call the Domain info endpoint from your API integrations instead.

Note: The Domain info endpoint will continue to return a status parameter value.

Background

In the Domain info response, the status parameter is designed to return a single string value. When DigiCert offered fewer products, a single value in the API was enough to represent the validation status for your domains.

Now, DigiCert offers certificate products that use many different types of validation. Different validation types have different requirements, and these requirements change as industry standards evolve. As DigiCert validates your domains for different types of certificate issuance, each type of validation that you request can be in a different state.

For example:

  • The OV validation for a domain may be completed.
  • The EV validation for the same domain may be expired.

As a result, DigiCert can no longer use a single value to return comprehensive information about the validation status for a domain.

Instead of relying on a single value, use the Domain info endpoint to request a validations array – a list of objects with status information for each type of validation on the domain. To get this data, include the query parameter include_validation=true when you submit your request.

For example:

Example validations array in domain info response data

Learn more about using the Domain info endpoint

new

CertCentral Services API: Site seal enhancements

To help you manage your site seals in your API integrations, we’ve made the following updates to the CertCentral Services API:

  • New endpoint: Upload site seal logo
    We added a new endpoint – Upload site seal logo – you can use to upload your company logo for use with a DigiCert Smart Seal. This logo appears in the site seal on your website. Note: Only Secure Site and Secure Site Pro SSL/TLS certificates support the option to display your company logo in the site seal.
  • New endpoint: Update site seal settings
    We added a new endpoint – Update site seal settings – you can use to change the appearance of your site seal and the information that displays on the site seal information page.
  • Updated endpoint: Get site seal settings
    We updated the Site seal settings endpoint to return information about each property you can customize with the Update site seal settings endpoint.

Related topics:

enhancement

CertCentral Services API: Revoke certificate by serial number

To make it easier to manage certificates from your API integrations, we updated the Revoke certificate endpoint path to accept the certificate ID or the serial number of the certificate to revoke. Previously, the Revoke certificate endpoint path only accepted the certificate ID.

Example Revoke certificate path using the certificate ID:

https://www.digicert.com/services/v2/certificate/{{certificate_id}}/revoke

Example Revoke certificate path using the certificate serial number:

https://www.digicert.com/services/v2/certificate/{{serial_number}}/revoke

Learn more about using the Revoke certificate endpoint

new

Upcoming scheduled maintenance

On April 3, 2021, between 22:00 – 24:00 MDT (April 4, 2021, between 04:00 – 06:00 UTC), DigiCert will perform scheduled maintenance.

During maintenance, for up to 10 minutes, we will be unable to issue certificates for the DigiCert platforms, their corresponding APIs, immediate certificate issuance, and those using the APIs for other automated tasks.

Affected services

For approximately 10 minutes, DigiCert will be unable to issue certificates for these services and APIs:

  • CertCentral / Service API
  • ACME
  • ACME agent automation / API
  • Direct Cert Portal / API
  • Certificate Issuing Service (CIS)
  • Simple Certificate Enrollment Protocol (SCEP)
  • QuoVadis TrustLink

Services not affected

These services are not affected by the maintenance activities:

  • PKI Platform 8 / API
  • PKI Platform 8 SCEP
  • PKI Platform 7 / API
  • PKI Platform 7 SCEP
  • DigiCert ONE managers

API note:

  • APIs will return "cannot connect" errors.
  • Certificate requests submitted during this window that receive a "cannot connect" error message will need to be placed again after services are restored.

What can I do?

Plan accordingly:

  • Schedule high-priority orders, renewals, and reissues before or after the maintenance window.
  • Expect interruptions if you use the APIs for immediate certificate issuance and automated tasks.
  • To get live maintenance updates, subscribe to the DigiCert Status page. This subscription includes email alerts for when maintenance starts and when maintenance ends.
  • For scheduled maintenance dates and times, see DigiCert 2021 scheduled maintenance.

Services will be restored as soon as we complete the maintenance.

new

CertCentral: New purchase order and invoice system

We are happy to announce that we are using a new purchase order and invoice system in CertCentral. We've made several changes to make it easier for you to manage your purchase orders and invoices.

The next time you sign in to CertCentral, you will see two new menu options under Finances: Pay Invoice and Purchase Orders and Invoices. Additionally, we now send all invoice emails from our new invoice system.

Pay invoices page

When you open the Pay invoice page, all invoices are preselected by default. You can choose to pay them all or select those you want to pay.

Note: If you use divisions with separate funds, when you open the Pay invoice page, all invoices for the top-level division are selected by default. Use the For dropdown to view the unpaid invoices by division in your account.

Purchase orders and invoices page

On the new Purchase orders and invoices page, you can create a purchase order (PO). In the Purchaseorders table, you can view pending and rejected POs. After we approve a PO, it becomes an invoice and moves to the Invoices table.

Note: If you use divisions with separate funds, you see the Purchase order and invoice summary page. When you click a division name, it opens the Purchase order and invoices page, where you can view the POs and invoices for that division.

In the Invoices column of the Invoices table, you can see the invoice number and the PO from which we generated it. You can download a copy of the invoice or pay the invoice. When you click Pay invoice, we take you to the Pay invoice page to pay the invoice and make the funds available in your account.

Existing PO and Invoice migration

  • Autogenerated invoices
    When we migrated our billing system, we did not migrate your autogenerated invoices. At the end of March, we will autogenerate a new invoice for your total amount owed. However, you can make a payment on your account at any time on the Deposit Funds page (in the left main menu, go to Finances > Deposit Funds).
  • Invoices generated from approved purchase orders
    When we migrated your invoices to the new system, we gave them new invoice numbers. However, the associated purchase order number remains the same. If you have questions or trouble finding an invoice, please contact your account manager or DigiCert Accounts Receivable. Make sure to include your PO number and the original invoice number in the email.
enhancement

CertCentral Services API: View balance enhancements

To help you track financial data in your API integrations, we updated the View balance endpoint to return the following data:

  • unpaid_invoice_balance
    Unpaid invoice balance
  • negative_balance_limit
    Amount the balance can go into the negative
  • used_credit_from_other_containers
    Amount owed by other divisions in the account (for accounts with separate division funds enabled)
  • total_available_funds
    Total funds available for future purchases

Example response: 

Example response from the View balance endpoint

For more information, see the documentation for the View balance endpoint.

enhancement

CertCentral Services API: Auto-reissue support for Multi-year Plans

We are happy to announce that the CertCentral Services API now supports automatic certificate reissue requests (auto-reissue) for Multi-year Plans. The auto-reissue feature makes it easier to maintain SSL/TLS coverage on your Multi-year Plans.

You can enable auto-reissue for individual orders in your CertCentral account. When auto-reissue is enabled, we automatically create and submit a certificate reissue request 30 days before the most recently issued certificate on the order expires.

Enable auto-reissue for a new order

To give you control over the auto-reissue setting for new Multi-year Plans, we added a new request parameter to the endpoints for ordering DV, OV, and EV TLS/SSL certificates: auto_reissue.

By default, auto-reissue is disabled for all orders. To enable auto-reissue when you request a new Multi-year Plan, set the value of the auto_reissue parameter to 1 in the body of your request.

Example request body:

Example order request body with auto reissue enabled

Note: In new order requests, we ignore the auto_reissue parameter if:

  • The product does not support Multi-year Plans.
  • Multi-year Plans are disabled for the account.

Update auto-reissue setting for existing orders

To give you control over the auto-reissue setting for existing Multi-year Plans, we added a new endpoint: Update auto-reissue settings. Use this endpoint to enable or disable the auto-reissue setting for an order.

Get auto-reissue setting for an existing order

To help you track the auto-reissue setting for existing certificate orders, we added a new response parameter to the Order info endpoint: auto_reissue. The auto_reissue parameter returns the current auto-reissue setting for the order.

new

ICA certificate chain selection for public DV flex certificates

We are happy to announce that select public DV certificates now support Intermediate CA certificate chain selection:

  • GeoTrust DV SSL
  • Thawte SSL 123 DV
  • RapidSSL Standard DV
  • RapidSSL Wildcard DV
  • Encryption Everywhere DV

You can add a feature to your CertCentral account that enables you to control which DigiCert ICA certificate chain issues the end-entity certificate when you order these public DV products.

This feature allows you to:

  • Set the default ICA certificate chain for each supported public DV certificate.
  • Control which ICA certificate chains certificate requestors can use to issue their DV certificate.

Configure ICA certificate chain selection

To enable ICA selection for your account:

  1. Contact your account manager or our Support team.
  2. Then, in your CertCentral account, in the left main menu, go to Settings > Product Settings.
  3. On the Product Settings page, configure the default and allowed intermediates for each supported and available DV certificate.

For more information and step-by-step instructions, see the Configure the ICA certificate chain feature for your public TLS certificates.

new

DigiCert Services API: DV certificate support for ICA certificate chain selection

In the DigiCert Services API, we made the following updates to support ICA selection in your DV certificate order requests:

Pass in the issuing ICA certificate's ID as the value for the ca_cert_id parameter in your order request's body.

Example DV certificate request:

Example DV TLS certificate request

For more information about using ICA selection in your API integrations, see DV certificate lifecycle – Optional ICA selection.

new

Upcoming scheduled maintenance

On March 6, 2021, between 22:00 – 24:00 MST (March 7, 2021, between 05:00 – 07:00 UTC), DigiCert will perform scheduled maintenance.

Although we have redundancies in place to protect your service, some DigiCert services may be unavailable during this time.

What can you do?

Please plan accordingly.

  • Schedule your high-priority orders, renewals, and reissues around the maintenance window.
  • To get live maintenance updates, subscribe to the DigiCert Status page. The subscription includes emails to let you know when maintenance starts and ends.
  • For scheduled maintenance dates and times, see DigiCert 2021 scheduled maintenance.

Services will be restored as soon as the maintenance is completed.

new

API de servicio de CertCentral: Nuevos terminales de subcuentas

Para hacer que sea más fácil administrar sus subcuentas, agregamos dos nuevos terminales a la API de servicio de CertCentral: Lista de dominios de la subcuenta y Lista de organizaciones de la subcuenta.

enhancement

API de servicio de CertCentral: terminal mejorada de Crear subcuenta

Para darle mayor control sobre sus subcuentas, agregamos dos nuevos parámetros de solicitud al terminal Crear subcuenta: child_name y max_allowed_multi_year_plan_length.

  • child_name: use este parámetro para configurar el nombre personalizado para mostrar para la subcuenta.
  • max_allowed_multi_year_plan_length: use este parámetro para personalizar la duración máxima de los pedidos de Planes multianuales para la subcuenta.

Ejemplo de solicitud JSON:

Create subaccount example request

Después de crear una subcuenta, use el terminal Información de la subcuenta para ver el nombre "para mostrar" de la subcuenta y la duración del pedido del Plan multianual permitida.

new

Próximo mantenimiento programado

El 6 de febrero de 2021 de 22:00 a 24:00 MST (7 de febrero de 2021 de 05:00 a 07:00 UTC), DigiCert realizará mantenimiento crítico.

Durante el mantenimiento, los servicios que se enumeran a continuación estarán inactivos unos 60 minutos. Sin embargo, debido al alcance del trabajo que se está realizando, es posible que haya interrupciones adicionales en el servicio durante el período de mantenimiento de dos horas.

No podrá iniciar sesión en estas plataformas y acceder a estos servicios y a estas API:

  • CertCentral/API de servicio
  • Portal Direct Cert/API del Portal Direct Cert
  • Servicio de emisión de certificados (CIS)
  • Protocolo de inscripción de certificados simple (SCEP)
  • Discovery/API
  • ACME
  • Automatización del agente ACME/API

DigiCert no podrá emitir certificados para estos servicios y API:

  • CertCentral/API de servicios
  • Portal Direct Cert/API del Portal Direct Cert
  • Servicio de emisión de certificados (CIS)
  • Protocolo de inscripción de certificados simple (SCEP)
  • Complete Website Security (CWS)/API
  • PKI administrada para SSL (MSSL)/API
  • Enlace de confianza QV

Estos servicios no se verán afectados por las actividades de mantenimiento:

  • Plataforma PKI 8
  • Plataforma PKI 7
  • Administradores de DigiCert ONE

Nota sobre la API:

  • Los servicios para procesar transacciones relacionadas con los certificados no estarán disponibles, como solicitar certificados, agregar dominios y realizar solicitudes de validación.
  • Las API devolverán errores de “no se puede conectar”.
  • Las solicitudes de certificados realizadas durante este período que reciban un mensaje de error "no se puede conectar" tendrán que volver a realizarse un vez que se restablezcan los servicios.

¿Qué puedo hacer?

Planifique en consecuencia:

  • Programe los pedidos, renovaciones y reemisiones de prioridad alta en torno al período de mantenimiento.
  • Espere que ocurran interrupciones si usa las API para la emisión de certificados inmediata y las tareas automatizadas.
  • Suscríbase a la página  Estado de DigiCert para recibir actualizaciones en vivo, .
  • Consulte el mantenimiento programado para 2021 de DigiCert para consultar las fechas y horas del mantenimiento programado.

Los servicios se restablecerán tan pronto como se complete el mantenimiento.

new

API de servicio de CertCentral: Nuevos terminales Detalles del pedido de unidades y Cancelar el pedido de unidades

Nos complace anunciar que agregamos dos nuevos terminales a la API de servicios de CertCentral: Detalles del pedido de unidades y Cancelar el pedido de unidades.

Estos terminales le permiten obtener información sobre un pedido de unidades y cancelar un pedido de unidades.

Cancelar pedidos de unidades:

  • Solamente puede cancelar un pedido dentro de treinta días de su realización.
  • No puede cancelar un pedido de unidades si la subcuenta en el pedido ha gastado cualquiera de las unidades.

Si administra una subcuenta que usa unidades como método de pago, ahora puede usar la API de servicios para hacer las siguientes tareas:

enhancement

API de servicio de CertCentral: terminales mejorados de Lista de productos, Límites de productos e Información del producto

Para hacer que sea más fácil encontrar los períodos de validez del pedido disponibles para los productos de certificados digitales en su cuenta, agregamos nuevos parámetros de respuesta a los terminales Lista de productos, Límites de productos e Información del producto.

Estos nuevos parámetros de respuesta le permiten ver los límites de validez del pedido predeterminados y personalizados para cada producto en su cuenta.

Terminal de Lista de productos

El parámetro allowed_order_validity_years devuelve una lista de los períodos de validez del pedido admitidos para cada producto en su cuenta.

Terminal de Límites de productos

El parámetro allowed_order_lifetimes devuelve una lista de límites personalizados de validez del pedido para usuarios con distintas asignaciones de rol de división y rol de usuario en su cuenta.

Terminal de Información del producto

  • El parámetro allowed_order_validity_years devuelve una lista de períodos de validez del pedido que están disponibles cuando solicita el producto de certificado.
  • El parámetro custom_order_expiration_date_alloweddevuelve un valor booleano que describe si puede configurar una fecha personalizada de vencimiento del pedido cuando solicita el producto de certificado.
enhancement

API de servicio de CertCentral: terminal mejorada de Información de pedidos de la subcuenta

Para hacer que sea más fácil encontrar información sobre los períodos de validez para los pedidos de la subcuenta, agregamos nuevos parámetros de respuesta al terminal Información de pedidos de la subcuenta. Estos nuevos parámetros de respuesta le permiten ver la fecha de inicio del pedido, la fecha de finalización del pedido y si el pedido es un Plan multianual.

  • El parámetro is_multi_year_plan devuelve "1" si el pedido es un Plan multianual.
  • El parámetro order_valid_from devuelve la fecha de inicio del período de validez del pedido.
  • El parámetro order_valid_till devuelve la fecha de finalización del período de validez del pedido.

Ejemplo de respuesta con nuevos parámetros

Subaccount order updates

new

Próximo mantenimiento programado

El 9 de enero de 2021 de 22:00 a 24:00 MST (10 de enero de 2021 de 05:00 a 07:00 UTC), DigiCert realizará mantenimiento programado.

Aunque tenemos redundancias para proteger su servicio, algunos servicios de DigiCert podrían no estar disponibles en este momento.

¿Qué puede hacer?
Planifique en consecuencia.

  • Programe los pedidos, las renovaciones, las reemisiones y la emisión de duplicados de prioridad alta para no hacerlos durante el período de mantenimiento.
  • Para obtener actualizaciones en vivo, suscríbase a la página de estado de DigiCert.
  • Para las fechas y horas de mantenimiento programado, consulte Mantenimiento programado para 2021 de DigiCert.

Los servicios se restablecerán tras el mantenimiento.

new

API de servicio de CertCentral: Actualizar la configuración de notificaciones de renovación

Agregamos un nuevo terminal al contrato de la API de servicios de CertCentral: Actualizar la configuración de notificaciones de renovación. Use este terminal para habilitar o deshabilitar las notificaciones de renovación para un pedido de certificado. 

Para obtener más información, visite el tema de referencia para este terminal en la documentación de la API de servicios:

enhancement

Personalizar la duración de su Plan multianual de DigiCert

Nos complace anunciar que ahora puede configurar una duración personalizada para su Plan multianual (MyP) cuando solicita un certificado TLS en CertCentral. En los formularios de solicitud de certificado TLS, use la nueva opción Validez del pedido personalizada para personalizar la duración de su pedido de certificados TLS.

Nota: La validez máxima del certificado TLS es de 397 días según las prácticas recomendadas de la industria. Consulte Fin de los certificados SSL/TLS públicos de 2 años.

Las duraciones de pedidos del Plan multianual personalizadas se pueden configurar en días o por fecha de vencimiento. La duración máxima del pedido es de 2190 días (6 años). La duración mínima del pedido es de 7 días.

Nota: Los pedidos personalizados se inician el día en que emitimos el certificado para el pedido. Los precios del pedido se prorratean para coincidir con el certificado seleccionado y la duración personalizada del pedido.

Para personalizar su cobertura del Plan multianual

  1. En el formulario de Solicitud de certificado, haga clic en Seleccionar la duración de la cobertura.
  2. En la ventana emergente Por cuánto tiempo necesita proteger su sitio, seleccione Validez del pedido personalizada.
  3. En Seleccione la duración personalizada de su pedido, configure la duración de su Plan multianual:
    1. Duración personalizada del pedido
      Especifique la duración de su plan en días.
    2. Fecha personalizada de vencimiento del pedido
      Seleccione el día en el que desea que su plan caduque.
  4. Haga clic en Guardar.
enhancement

Configuración del producto actualizada para certificados TLS públicos

Para darle más control sobre el proceso de solicitud de sus certificados, actualizamos la configuración del producto para los certificados TLS públicos. Ahora, puede determinar las duraciones de pedidos de Planes multianuales permitidas que los usuarios pueden seleccionar al solicitar un certificado TLS público.

En la página de configuración de producto del certificado TLS, use la opción Períodos de validez permitidos para determinar qué duraciones de pedidos de Planes multianuales aparecen en un formulario de solicitud de certificado TLS: 1 año, 2 años, 3 años, 4 años, 5 años y 6 años. Tenga en cuenta que los cambios hechos a las configuraciones de productos se aplican a las solicitudes realizadas a través de CertCentral y de la API de servicios.

Nota: Anteriormente, la opción Períodos de validez permitidos se usaba para determinar la duración máxima del certificado que un usuario podía seleccionar al pedir un certificado TLS público. No obstante, como la industria está pasando a un certificado de 1 año, esta opción ya no se necesita para las duraciones de los certificados. Consulte Fin de los certificados SSL/TLS públicos de 2 años.

Para configurar las duraciones de pedidos de Planes multianuales permitidas para un certificado TLS

  1. En el menú principal izquierdo, vaya a Configuración > Configuración del producto.
  2. En la página Configuración del producto, seleccione un certificado TLS público. Por ejemplo, seleccione Secure Site OV.
  3. En Secure Site OV, en la lista desplegable Períodos de validez permitidos, seleccione los períodos de validez.
  4. Haga clic en Guardar configuración.

La próxima vez que un usuario pida un certificado Secure Site OV, solamente verá las duraciones del período de validez que seleccionó en el formulario de solicitud.

Nota: Establecer límites para las duraciones de un pedido de Plan multianual elimina la opción de validez personalizada de sus formularios de solicitud de certificado TLS.

enhancement

Página de dominios de CertCentral: informe mejorado de domains.csv

En la página Dominios, mejoramos el informe de CSV para hacer más fácil realizar un seguimiento de las fechas de vencimiento de validación de dominios de OV y EV, y para ver el método de validación de control de dominio (DCV) utilizado anteriormente.

La próxima vez que descargue el archivo de CSV, verá tres columnas nuevas en el informe:

  • Caducidad de OV
  • Caducidad de EV
  • Métodos DCV

Para descargar el informe de domains.csv

  1. En el menú principal izquierdo, vaya a Certificados > Dominios.
  2. En la página Dominios, en la lista desplegable Descargar CSV, seleccione Descargar todos los registros.

Cuando abra domains.csv, debería ver las nuevas columnas e información en su informe.

enhancement

Página de pedidos de CertCentral: tiempos de carga mejorados

En CertCentral, actualizamos la página de Pedidos para mejorar los tiempos de carga para aquellos que administran grandes volúmenes de pedidos de certificados. La próxima vez que visite la página de Pedidos, se abrirá mucho más rápido (en el menú principal izquierdo, vaya a Certificados > Pedidos).

Para mejorar los tiempos de carga, cambiamos la forma en que filtramos sus pedidos de certificados en la vista inicial de la página. Anteriormente, filtrábamos la página para que mostrara solamente los pedidos de certificados Activos. Sin embargo, esto era problemático para aquellos con grandes volúmenes de pedidos de certificados. Cuantos más pedidos tenía en su cuenta, más tardaba la página de Pedidos en abrirse.

Ahora, cuando visita la página, devolvemos todos sus certificados, sin filtrar, en orden descendente con los pedidos de certificados creados más recientemente primeros en la lista. Para ver solamente sus certificados activos, en la lista desplegable de Estados, seleccione Activos y haga clic en Ir.

new

API de servicio de CertCentral: Comprar unidades para subcuentas y ver pedidos de unidades

En la API de servicios de CertCentral, hemos agregado nuevos terminales para comprar unidades y ver los pedidos de unidades. Ahora, si administra subcuentas que usan unidades como método de pago para las solicitudes de certificados, puede usar la API de servicios para comprar más unidades para una subcuenta y para obtener información de su historial de pedidos de unidades.

Para obtener más información, consulte la documentación de referencia para los terminales nuevos:

enhancement

API de servicio de CertCentral: Actualizaciones de la documentación

Nos complace anunciar las siguientes actualizaciones a la documentación para la API de servicios de CertCentral:

  • Nueva API de estimación de precios de vales
    Publicamos un nuevo tema de referencia para el terminal Estimación de precio del vale. Los clientes que usen vales pueden usar este terminal para estimar el costo (con impuesto incluido) de un pedido para configuraciones de vales específicas.
  • Glosario de API actualizado
    Actualizamos el Glosario con una nueva tabla para definir los distintos valores de estado de validación de la organización. Consulte Glosario: estados de validación de la organización.
  • Parámetro de solicitud agregado a la documentación de Actualizar correos electrónicos de la cuenta
    Agregamos el parámetro de solicitud emergency_emails a la documentación para el terminal Actualizar correos electrónicos de la cuenta. Use este parámetro para actualizar las direcciones de correo electrónico que reciben notificaciones de emergencia de DigiCert.

Ejemplo de cuerpo de solicitud Actualizar correos electrónicos de la cuenta:

emergency_emails.png
  • Parámetros de respuesta agregados a la documentación de Información del producto
    Agregamos los parámetros de respuesta validation_type, allowed_ca_certs, y default_intermediate a la documentación para el terminal Información del producto.
    • Use el parámetro validation_type para obtener el tipo de validación para un producto determinado.
    • Use el parámetro allowed_ca_certs para obtener información sobre los certificado ICA que puede seleccionar al pedir un producto determinado. *
    • Use el parámetro default_intermediate para obtener la Id. de la ICA predeterminada para un producto determinado. *

Ejemplo de datos de respuesta Información del producto:

Product info response.png

* Nota: El terminal Información del producto solamente devuelve los parámetros allowed_ca_certs y default_intermediates para productos que admiten la selección de ICA. Para certificados SSL públicos que admiten la selección de ICA (certificados flexibles OV y EV), estos parámetros solamente se devuelven si la selección de ICA está habilitada para la cuenta. Además, el parámetro default_intermediates solamente se devuelve si un administrador ha personalizado la configuración de un producto para un rol de división o de usuario en la cuenta. Para obtener más información, consulte Opción de cadena de certificados ICA para certificados flexibles públicos OV y EV.

enhancement

API de servicio de CertCentral: se agregaron autentificadores de DCV para nuevos dominios a los datos de respuestas para los pedidos de certificados OV y EV

Hemos actualizado los terminales para solicitar certificados OV y EV SSL públicos para que devuelvan los autentificadores de solicitud de validación de control de dominio (DCV) para los nuevos dominios en el pedido.

Ahora, cuando solicita un certificado OV o EV, ya no tiene que emitir solicitudes separadas para obtener los autentificadores de solicitud DCV para los nuevos dominios en el pedido. En cambio, puede obtener los autentificadores directamente de los datos de respuesta para la solicitud del pedido.

Datos de respuesta de ejemplo:

Example response for an OV order with a new domain

Nota: El objeto dcv_token no se devuelve para dominios que se validarán conforme al alcance de otro dominio en el pedido, para dominios que ya existan en su cuenta, o para subdominios de dominios existentes.

Esta actualización se aplica a los siguientes terminales:

new

Selección de cadena de certificados ICA para certificados flexibles públicos OV y EV

Nos complace anunciar que los certificados OV y EV públicos con capacidades flexibles ahora admiten la selección de cadena de certificados de CA intermedia.

Puede agregar una opción a su cuenta de CertCentral que le permita controlar qué cadena de certificados de ICA de DigiCert emite sus certificados "flexibles" OV y EV públicos.

Esta opción le permite:

  • Establecer la cadena de certificados ICA predeterminada para cada certificado flexible OV y EV público.
  • Controlar qué cadenas de certificados ICA pueden usar los solicitantes de certificados para emitir su certificado flexible.

Configurar la selección de cadena de certificados ICA

Para habilitar la selección de ICA para su cuenta, póngase en contacto con el gestor de su cuenta o con nuestro Equipo de asistencia. Después, en su cuenta de CertCentral, en la página Configuración del producto (en el menú principal izquierdo, vaya a Configuración > Configuración del producto), configure los intermediarios predeterminados y permitidos para cada tipo de certificado flexible OV y EV.

Para obtener más información e instrucciones paso a paso, consulte Opción de cadena de certificados ICA para certificados flexibles públicos OV y EV.

new

Soporte de la API de servicios de DigiCert para la selección de cadena de certificados ICA

En la API de servicios de DigiCert, hicimos las siguientes actualizaciones para admitir la selección de ICA en sus integraciones de la API:

  • Se creó un nuevo terminal de Límites de productos
    Use este terminal para obtener información sobre los límites y la configuración para los productos habilitados para cada división en su cuenta. Esto incluye los valores de Id. para las cadenas de certificados ICA predeterminadas y permitidas de cada producto.
  • Soporte agregado para la selección de ICA en las solicitudes de pedidos de certificados flexibles OV y EV TLS públicos
    Después de que configure los intermediarios permitidos para un producto, podrá seleccionar la cadena de certificados ICA que debería emitir su certificado cuando usted use la API para enviar una solicitud de pedido.
    Pase la Id. del certificado de ICA emisora como el valor para el parámetro ca_cert_id en el cuerpo de su solicitud de pedido

Ejemplo de solicitud de certificado flexible:

Example flex certificate request

Para obtener más información sobre cómo usar la selección de ICA en sus integraciones de la API, consulte Ciclo de vida de certificado OV/EV: selección de ICA (opcional).

enhancement

Planes multianuales de DigiCert® disponibles para todos los certificados SSL/TLS públicos de DigiCert

Nos complace anunciar que los Planes multianuales ahora se encuentran disponibles para todos los certificados SSL/TLS públicos en CertCentral. Estos planes le permiten pagar un único precio con descuento por hasta seis años de cobertura de certificado SSL/TLS.

Nota: Los contratos de acuerdo de licencia comercial (ELA) admiten solamente Planes multianuales de 1 y 2 años. Los contratos de tarifa plana no admiten Planes multianuales. Si tiene un contrato de tarifa plana, comuníquese con su gestor de cuenta para encontrar una solución que sirva para su contrato.

Con los Planes multianuales, usted elige el certificado SSL/TLS, la duración de cobertura que desee (hasta seis años) y la validez del certificado. Hasta que el plan caduque, puede volver a emitir el certificado sin costo cada vez que llegue al final de su período de validez. Para obtener más información, consulte Planes multianuales.

enhancement

Cambios en la API de servicios de DigiCert para admitir Planes multianuales

En nuestra API de servicios, actualizamos nuestros terminales de certificados SSL/TLS públicos para que admitan el pedido de un certificado con un Plan multianual.

En cada terminal para solicitar un certificado SSL/TLS público, agregamos nuevos parámetros de solicitud opcionales*. Además, hemos actualizado estos terminales para que el período de validez de su pedido ya no tenga que coincidir con el período de validez de su certificado.

  • Nuevo parámetro cert_validity opcional
    Use este parámetro para definir el período de validez del primer certificado emitido para el pedido. Si omite el parámetro cert_validity de su solicitud, la validez del certificado usa como valor predeterminado la validez máxima que DigiCert y los estándares de la industria permiten, o el período de validez del pedido, lo que sea más pronto.
  • Nuevo parámetro order_validity opcional*
    Use este parámetro para definir el período de validez del pedido. La validez del pedido determina la duración de un Plan multianual.
  • Parámetros actualizados validity_years, validity_days, custom_expiration_date de nivel superior*
    Para las integraciones de la API existentes, aún puede usar estos parámetros existentes para definir el período de validez del pedido. No obstante, recomendamos actualizar sus integraciones para que usen los nuevos parámetros. Recuerde, con los Planes multianuales, su pedido puede tener un período de validez distinto al de su certificado.

* Nota: Las solicitudes deben incluir un valor para el objeto order_validity o para uno de los parámetros de validez del pedido de nivel superior: validity_years, validity_days, o custom_expiration_date. Los valores que proporcionó en el objeto order_validity anulan los parámetros de validez de nivel superior.

Estos cambios no deben afectar a sus integraciones actuales. Sin embargo, para maximizar la cobertura de sus SSL/TLS, es recomendable comprar sus certificados SSL/TLS públicos con un Plan multianual. Para las integraciones de API, consulte Pedir Plan multianual.

Solicitud de certificado de ejemplo con los nuevos parámetros

Example SSL certificate request with new certificate and order valdity parameters

new

Planes multianuales ahora disponibles

Nos complace anunciar que los Planes multianuales ahora se encuentran disponibles en CertCentral y en socios de CertCentral.

Los Planes multianuales de DigiCert® le permiten pagar un único precio con descuento por hasta seis años de cobertura de certificado SSL/TLS. Con los Planes multianuales, usted elige el certificado SSL/TLS, la duración de cobertura que desee (hasta seis años) y la validez del certificado. Hasta que el plan caduque, puede volver a emitir el certificado sin costo cada vez que llegue al final de su período de validez.

La validez máxima de un certificado SSL/TLS pasará de 825 días a 397 días el 1 de septiembre de 2020. Cuando el certificado activo para un Plan multianual esté por caducar, debe reemitir el certificado para mantener la cobertura SSL/TLS.

compliance

La compatibilidad de los navegadores TLS 1.0 y 1.1 ha terminado

Los cuatro navegadores principales ya no son compatibles con la Seguridad de la capa de transporte (TLS) 1.0 y 1.1.

Lo que debe saber

Este cambio no afecta sus certificados DigiCert. Sus certificados siguen funcionando como siempre.

Este cambio afecta los servicios y las aplicaciones que dependen del navegador y cuentan con TLS 1.0 o 1.1. Ahora que los navegadores dejaron de ser compatibles con TLS 1.0 o 1.1, no se podrá entablar conexiones HTTPS mediante estos sistemas desactualizados.

Lo que debe hacer

Si se ve afectado por este cambio y su sistema admite versiones más recientes del protocolo TLS, actualice la configuración del servidor apenas pueda a TLS 1.2 o TLS 1.3.

Si no actualiza a TLS 1.2 o 1.3, su servidor web, sistema o agente no podrán usar HTTPS para comunicarse de manera segura con el certificado.

Información de obsolescencia de TLS 1.0/1.1 para navegadores

Firefox 78, lanzado el 30 de junio de 2020

Safari 13.1, lanzado el 24 de marzo de 2020

Chrome 84, lanzado el 21 de julio de 2020

Edge v84, lanzado el 16 de julio de 2020

Recursos útiles

Con tantos tipos de sistemas únicos que cuentan con TLS, no podemos hablar de todos los canales de actualización, pero estas son algunas referencias que podrían serle de utilidad:

enhancement

API de servicio de CertCentral: Documentación actualizada de mensajes de error

En la documentación de la API de servicios, hemos actualizado la página de Errores para incluir descripciones de los mensajes de error relacionados con:

  • Emisión inmediata de certificado DV
  • Validación de control de dominio (DCV)
  • Verificaciones de registros de recursos de autorización de la autoridad de certificados (CAA)

Anteriormente este año, mejoramos las API para los pedidos de certificado DV y solicitudes DCV para proporcionar mensajes de error más detallados cuando fallen la DCV, la autorización de archivos, las búsquedas de DNS o las verificaciones de registros de recursos de CAA. Ahora, cuando reciba uno de estos mensajes de error, verifique la página de Errores para obtener información adicional sobre la solución de problemas.

Para obtener más información, consulte: