- DigiCert product docs
- What's new
- Release notes
- IoT Trust Manager
Release notes RSS
DigiCert® ONE version: 1.9391.0 | IoT Trust Manager: 1.735.0
A new job has been introduced to populate missing device value fields that were overlooked during migration. Records where the device value identifier is missing have been updated. This ensures clients can reliably filter and search using the device value.
Certificate renewals now correctly retain the Subject Directory Attribute from the original certificate. This fix helps maintain required attributes for compliance and interoperability.
When requesting a certificate with server-side key generation, users are now redirected properly:
After copying the password and downloading the certificate, users are taken to the Certificate Details page.
This resolves the previous issue where users were mistakenly sent to the Request List page.
Weekly scheduled reports now include all necessary certificate data.
Both Device Profile and Enrollment profile details are now included.
This update ensures reports provide comprehensive information for tracking and compliance.
The enrollment process for the ACME Lego client using the EC256 key type has been corrected:
Users are now directed to the Certificate details page after enrollment.
This resolves the issue where users were redirected to the Request list page instead.
On the Create Enrollment Profile page, the Certificate Profile dropdown now behaves as expected:
The dropdown remains visible with an empty list when no matching profiles are found.
This prevents confusion by ensuring users see that no available profiles exist rather than having the dropdown disappear.
A search/filter option has been added to the Enrollment Profile dropdown on the Start batch certificate request form:
Users can now type to filter and quickly locate the desired enrollment profile.
This eliminates the need for manual scrolling through long lists.
The Allow use of pre-generated keys checkbox now accurately reflects its current state during profile editing:
The checkbox remains selected if it was previously enabled.
This prevents users from mistakenly altering key generation settings due to UI discrepancies.
The search functionality for Common Name (CN) has been reverted to its original behavior:
Searches now use a “Starts With” filter rather than “Contains.”
This change ensures users can more efficiently locate certificates by matching the CN prefix.
DigiCert® ONE version: 1.9100.10 | IoT Trust Manager: 1.733.0
The deployment YAML file has been reverted to its previous configuration to ensure proper functionality when smtpAuth
is enabled:
Restored email server password: The email server password is now correctly included when
smtpAuth
is set.Reverted modifications: Previous changes to the YAML file have been undone to maintain the intended configuration.
The certificate templates filter has been updated to display only relevant options for for applicable user roles. For most users, only the custom certificate template type is shown. System administrators can still view system certificate template types.
DigiCert® ONE version: 1.9100.9 | IoT Trust Manager: 1.731.0
A new certificate template designed specifically for Matter use cases has been introduced. This template enables the issuance of certificates compatible with Matter environments.
A new flag has been introduced, allowing DigiCert® to internally disable audit logging on a per-enrollment profile basis. This feature helps prevent excessive logging for clients who repeatedly submit invalid or malformed certificate requests, reducing unnecessary database writes.
Read and write speeds have been optimized, leading to faster certificate issuance rates. These improvements enhance system efficiency and allow for better handling of high-concurrency scenarios. Users will experience reduced latency and increased throughput, particularly during peak loads.
A critical issue that caused the Gateway service to fail during startup due to a decryption error has been resolved. An updated Gateway JAR file is now available for download.
PKCS7 Encoding: Transitioned from BER (Basic Encoding Rules) to DER (Distinguished Encoding Rules) for PKCS7 encoding. DER is more widely accepted and ensures consistent encoding for certificate responses.
Empty Extensions in CSRs: Enabled support for empty extension sequences in Certificate Signing Requests (CSRs) for
ca_certs
in the Enrollment over Secure Transport (EST) protocol. This fix enhances interoperability with client systems adhering to EST standards.
DigiCert® ONE version: 1.8893.10 | IoT Trust Manager: 1.697.0
Introduced several improvements to streamline certificate processing and reduce issuance times.
DigiCert® ONE version: 1.8663.5 | IoT Trust Manager: 1.669.0
Introduced a feature that allows opting out of automatic device creation during enrollment profile setup. This option provides greater flexibility and control over device management within the enrollment process.
Transitioned the license update mechanism to an asynchronous process for faster, more efficient updates. License updates now occur periodically instead of in real time, improving overall performance and reducing system load.
DigiCert® ONE version: 1.8279.6 | IoT Trust Manager: 1.654.0
We have updated the certificate renewal process with stricter rules to ensure the Subject Distinguished Name (DN) remains consistent with the original certificate. Any changes to the Subject DN, such as common name or organizational details, are now rejected to maintain certificate integrity. This change applies to both UI and API certificate renewals.
The character limit for regular expressions in registered value containers has been increased to allow for more complex configurations.
The List assignable ICAs endpoint for returning assignable Certificate Authorities (CAs) now supports more than 1,000 CAs. This provides better management capabilities for customers with large environments.
Fixed an issue where the Registered values details page would not load if an associated enrollment profile was disabled. The page now loads correctly regardless of the profile status.
Resolved a problem where certificate requests were rejected if the SAN DNS field met specific ends with conditions. Requests now process correctly, ensuring accurate validation.
Fixed an issue that prevented trust bundle downloads where multiple certificates shared the same common name. Trust bundles can now be downloaded without errors.
The trust bundle download URL now allows direct access without needing to sign in. This simplifies the download process.
DigiCert® ONE version: 1.7827.6 | IoT Trust Manager: 1.639.0
The term Certificate policy in the notification banner has been updated to Certificate management policy to align with our adoption of new industry standard terminology.
Added the ability to exclude Authority Key Identifier (AKI) and Subject Key Identifier (SKI) extensions in certificates based on template settings. This allows for more precise control over certificate attributes.
Now when you add AKI/SKI extensions to a template with the include
parameter set to no
, these extensions will be excluded from the generated certificates.
Example
{
"extensions": {
"ski_extension": {
"include": "no"
},
"aki_extension": {
"include": "no"
}
}
}
Blank values: Blank values in a certificate request will override CSR values, allowing for precise control over final certificate attributes.
Subject values: For renewals, the subject values from the original certificate are used. Values in the CSR are ignored. This prevents unintended changes to the certificate’s subject information.
Resolved an issue where reports generated successfully but failed to download due to recent memory patch fixes. This fix ensures that reports can now be downloaded successfully.
DigiCert® ONE version: 1.7827.2 | IoT Trust Manager: 1.627.0
We have improved our reporting functionality to use memory more efficiently, especially for larger reports, ensuring smoother and more reliable performance.
A Learn more link has been added to the name changes banner on the dashboard, providing users with detailed information about upcoming product name changes.
Following updates to CMPv2 protocol logging, we have enhanced logging for the EST protocol:
Key changes:
Additional object information:
Enrollment profile information included.
Authentication information section:
For passcode authentication, logs will show the username (if present) and passcode (partially obscured).
For certificate authentication, logs will include details of the authentication certificate.
Request information section:
Subject DN and CSR from the request included.
These enhancements improve transparency and traceability for better auditing and troubleshooting.
Fixed an issue where decrypted files incorrectly contained the PGP public key instead of the generated private key in batch jobs using server-side key generation and JSON output format.
Resolved an issue where certificate requests using the MLDSA key type failed with an unsupported_public_key_algorithm
error. Certificate requests using MLDSA key type will now be processed successfully.
DigiCert® ONE version: 1.7460.4 | IoT Trust Manager: 1.623.0
Introduced an advanced feature allowing solution operators to set specific conditions for certificate fields within enrollment profiles. This ensures certificate requests meet predefined criteria and provides detailed logs for rejected requests.
Customizable validation conditions: You are now able to define conditions for certificate fields (for example, common name) with criteria such as character limits and required prefixes. You can also set different allowed values for various enrollment profiles to cater to different product lines and groups.
Support for regular expressions: You can now use regular expressions for precise and complex validation rules.
Certificate request validation: Certificate requests are now automatically verified against defined conditions and non-compliant requests will be rejected.
Detailed rejection logging: Comprehensive logs of rejected requests for troubleshooting and rule refinement are now available.
Improved clarity and organization of batch reports and output files by including the batch job name and its UUID in their names.
Batch report naming: Updated batch report names to include the batch job name followed by its UUID.
Batch output file naming: Updated batch output file names (ZIP and JSON formats) to include the batch job name and its UUID.
Introduced the ASN1_Algorithm
field in the certificate issuance API, allowing users to specify the ASN.1 algorithm directly.
New field: ASN1_Algorithm: Added the
ASN1_Algorithm
field to the certificate issuance API for direct specification of the ASN.1 algorithm.Behavior change for
RSA_OAEP
: Changed CMS encryption method fromCMSAlgorithm.AES256_CBC
toCMSAlgorithm.RSA_OAEP
whenASN1_Algorithm
is set toRSA_OAEP
.
Enhanced system defenses to ensure accurate license counts, especially during device and certificate failures.
DigiCert® ONE version: 1.7277.0 | IoT Trust Manager: 1.616.0
Users with the appropriate permissions now have the ability not only to create and edit, but also to disable and delete custom certificate templates directly from their account.
Upgraded CMPv2 with additional logging capabilities to provide more in-depth insights into its operations and interactions.
DigiCert® ONE version: 1.7083.5 | IoT Trust Manager: 1.614.0
Implemented code changes in IoT Trust Manager to unify the naming conventions for Post Quantum Crypto Dilithium across CA Manager and the server-side key generation for Dilithium keys. This adjustment ensures IoT Trust Manager continues to support certificate requests for Dilithium type keys and algorithms, alongside introducing server-side Dilithium key generation capabilities.
Addressed an issue where mismatches between the signature algorithms of authentication certificates and their issuing CA, designated as the “authentication CA” in IoT Trust Manager, led to authentication failures. This correction prevents failed certificate requests stemming from the rejection of authentication certificates due to algorithm mismatches.
DigiCert® ONE version: 1.7083.4 | IoT Trust Manager: 1.610.0
Users now have the ability to easily remove the association between a registered values object and an enrollment profile, offering greater flexibility in managing the configuration and lifecycle of enrollment profiles.
Assignment limitation Updated to restrict the assignment to only one registered values object per enrollment profile, streamlining the setup process.
Assignment flexibility Enhanced to allow a registered values object to be linked with multiple enrollment profiles, offering more versatility in configurations.
List view enhancement Introduced a new column in the Enrollment Profile List page that shows the registered values object associated with each profile, improving oversight.
Filtering update Launched advanced filtering options on the Enrollment Profiles List page, enabling users to filter profiles based on the registered values object assigned, facilitating easier management.
Addressed a bug in the CSV template download functionality within the Registered values details page. The fix ensures that the downloaded CSV template accurately mirrors the certificate values specific to the dataset being managed, fixing an issue where a generic template was received, leading to inconsistencies.
Resolved an issue where email notifications for batch downloads incorrectly displayed 'null null' for the Service User. Notifications now include the Service User's email (friendly name), providing clear identification.
Fixed a problem where batch job reports erroneously indicated no successful records, even when jobs were completed successfully. Reports now accurately reflect the success of job executions and document any issues or errors, enhancing trust in the system's reporting capabilities.
Implemented a correction for a misrepresentation issue where batch enrollments marked as 'Rejected' inaccurately showed records as having been processed successfully. The system now correctly reflects the actual status of each record in rejected batches.
DigiCert® ONE version: 1.7083.2 | IoT Trust Manager: 1.606.0
In this update, we're introducing a significant enhancement to our container management system: the pre-termination hook. This new feature is designed to give you more control and predictability over how your containers shut down—ensuring a smoother, more reliable system operation.
Key features
Enhanced control Pre-termination hook triggers right before a container shutdown, ensuring essential tasks are neatly wrapped up. This timely intervention allows for a smoother transition and a more graceful system behavior.
Predictability across operations Regardless of what initiates a container's termination—be it API requests, management events, or other system conditions—the pre-termination hook provides a reliable and predictable way to manage the shutdown process, enhancing system stability.
Seamless system integration Pre-termination hook does not delay container termination process. The termination grace period begins prior to the hook's activation, guaranteeing that containers will terminate within their allotted time, regardless of the hook's actions.
DigiCert® ONE version: 1.7083.0 | IoT Trust Manager: 1.603.0
Implemented registered values in IoT Trust Manager to enhancing certificate issuance control. Registered values ensure that certificate request values adhere to predefined criteria, including lists of allowed values and conditions. This enhancement enables stricter validation of certificate fields according to specific requirements.
Registered values can also be managed and viewed by all divisions within an account or restricted to specific divisions only. This allows for the assignment of a registered values container to specific divisions.
To start using registered values, sign in to your DigiCert ONE IoT Trust Manager account and go to Certificates > Registered values.
Adding the entire IP range, specifically from 0.0.0.0 to 255.255.255.255, to the list of allowed IP addresses is no longer possible. This change addresses potential security risks by preventing these broad ranges from being used.
A new toggle switch feature allows you to easily control the limitations on IP address entries. This provides flexibility between restricted and unrestricted IP address entries.
Resolved a bug that prevented sending batch external emails via API.
DigiCert® ONE version: 1.6887.2 | IoT Trust Manager: 1.593.0
Resolved an issue that prevented zipped files from uploading correctly, allowing users to upload zipped trust bundles without errors.
Fixed an issue to enable successful uploading of P7B files.
Addressed an issue that caused files with whitespaces in their names to fail during upload.
Fixed an issue where the signature algorithm was not correctly applied when creating a certificate profile for CMPv2.
DigiCert® ONE version: 1.6887.0 | IoT Trust Manager: 1.587.0
Introduced trust bundle division access feature to enhance security and access control, allowing trust bundles to be limited by divisions for granular access control.
Initiated integration of Post-Quantum Cryptography (PQC) support with the incorporation of the Dilithium algorithm, marking a step towards enhanced security.
Importante
Because the standard for Dilithium has not been finalized, this should not be used in production environments.
Enhanced gateway installation process to allow for unlimited downloads and introduced a predefined expiration period of 3 days (72 hours) for the download link.
Introduced enhancements to CMPv2 functionality, enabling users to specify certificate validity duration and signature algorithm selection directly in CMPv2 requests.
Added a configuration option to enable or disable MAC address verification for DigiCert Gateway, catering to deployments in environments with dynamic MAC addresses, like Kubernetes containers.
DigiCert® ONE version: 1.6665.2 | IoT Trust Manager: 1.578.0
A trust bundle is an essential collection of certificates used to establish trust within digital environments. A trust bundle can include various types of certificates such as root CAs, intermediate CAs, code signing certificates, and others required for distribution into trust stores. Our system supports adding up to 100 certificates in a single trust bundle.
You can easily manage these trust bundles in the IoT Trust Manager console, where you can perform the action listed below. These actions enhance your ability to manage trust bundles effectively, ensuring that you can maintain the necessary digital trust and security for your operations. For detailed instructions or additional support, please refer to our documentation or contact our support team
Download trust bundle
Copy trust bundle download link
Delete trust bundle
Disable trust bundle
Enable trust bundle
These CMPv2 updates address the CMPv2 directory value limitation and enhance the enrollment profile interface for EST/SCEP/CMPv2 methods.
CMPv2 directory value issue
Resolves the issue for clients where the CMPv2 URL value is limited to 32 characters by adding alternative enroll/reenroll URLs for EST/SCEP/CMPv2 enrollment methods in the enrollment profile details. View alternative URLs under the enrollment profile details.
Reference ID for passcodes
Introduces a Reference ID field on the passcodes details page for CMPv2 enrollment method passcodes. Reference IDs are available on the passcode's details page for CMPv2 enrollments.
Certificate template creation with RSA 1024-bit
Users can now create certificate templates that include RSA 1024-bit in the list of allowed key types.
This enhancement allows for greater flexibility and customization in certificate management and caters to specific security requirements and compliance standards.
Server-side key generation support for RSA 1024-bit
Our platform now supports server-side generation of RSA 1024-bit keys. This update ensures stronger security protocols and aligns with the latest industry practices in key generation.
This update works for the following:
Batch Request Processing
Single Certificate Requests
API integration
We now support Post-Quantum Cryptography (PQC) Dilithium keys as a part of our commitment to providing advanced security features and keeping up with evolving industry standards.
By integrating PQC Dilithium keys, we are enhancing our platform's security and preparing for the quantum-resistant future of cybersecurity. This update empowers our users to adopt stronger cryptographic standards, ensuring the longevity and integrity of their security measures.
New features
Certificate template creation with PQC Dilithium keys
Users can now create certificate templates with PQC Dilithium keys as one of the allowed key types. This enhances flexibility and customization in certificate management and allows users to stay ahead in the security landscape.
This update caters to advanced security requirements and compliance with future-proofing standards.
Server-side key generation support for PQC Dilithium keys
We updated our platform to support the server-side generation of PQC Dilithium keys. This addition fortifies our security protocols and ensures alignment with cutting-edge key generation practices.
The support for PQC Dilithium keys extends across various functionalities, including:
Batch Request Processing
Single Certificate Requests
API integrations
Customers have expressed the need for clearer visibility into potential exceptions that may occur during the batch generation processes. The lack of detailed feedback when batch generation fails leaves customers uncertain about the nature and stage of the failure.
Therefore, we enhanced our exception-handling protocols to provide more informative and specific error feedback during batch-generation failures. Customers will now receive detailed error messages indicating the stage at which the batch process failed.
Examples of updated messages:
"Batch failed. Key generation failed."
"Batch failed. Unable to store parts."
Possible error codes
To further assist in troubleshooting, the following error codes will be provided, detailing the nature of the exception:
INVALID_REQUEST
- "Invalid request"CERTIFICATE_CREATION_ERROR
- "Certificate creation error"CERTIFICATE_AUTHORITY_ERROR
- "Certificate authority error"DATABASE_ERROR
- "Database error"ENCRYPTION_ERROR
- "Encryption error"ENTITY_NOT_FOUND_ERROR
- "Entity not found error"INPUT_FILE_READ_ERROR
- "Input file read error"INTERNAL_SERVER_ERROR
- "Internal server error"
Issue: CSV template missing the CSR column
The downloaded CSV template does not include a CSR column.
Select I have the keypairs and will provide the CSRs or public keys in the request.
Select I will upload CSV with request info.
Select Download template.
Fix: Updated the logic in the create batch page to handle the template request correctly
Now, when the client-side key generation is selected and the user requests a template download, the system will send the option “client_side” in the request. In all other cases, the system will default to the “server_side” option.
This change ensures the correct template, including the CSR column, is provided, aligning with the user's selection.