Skip to main content

Release notes

Avis

For maintenance schedules and older releases, visit the What's new section of this website.

Recent releases

December 17, 2025

DigiCert® ONE version: 1.11494.6 | DigiCert® Private CA: 1.948.0

New

Native protocol support for ACME

This release adds native support for ACME in DigiCert Private CA, enabling automated certificate enrollment and lifecycle operations for devices and infrastructure systems. ACME supports certificate enrollment, and revocation. The protocol support is built directly into the Private CA stack, ensuring seamless interoperability with existing CA hierarchies, HSMs, and certificate policies. This allows organizations to deploy and automate certificate workflows across diverse enterprise, network, and IoT environments without additional components or configuration overhead.

Enhancements

Update to end entity certificate revocation reasons

Revocation capabilities have been enhanced to support the "cACompromise" reason code for end entity (EE) certificates. Previously limited to CA certificates, this revocation reason is now available for EE certificates as well. As part of this update, the applicable EE revocation endpoints have been updated, and the user interface now enables users to revoke EE certificates using the “cACompromise” reason code.

December 11, 2025

DigiCert® ONE version: 1.11494.3 | DigiCert® Private CA: 1.945.0

Enhancements

Custom Common Name for OCSP responder certificates

The OCSP responder certificate workflow now lets you specify a custom Common Name (CN) when generating an OCSP responder CSR. Previously, the responder CN was automatically derived from the issuing CA’s CN, which often led to confusion—especially when the CA name was exactly 64 characters and produced identical responder names. This enhancement enables clearer identification and more reliable management of OCSP responder certificates.

December 8, 2025

DigiCert® ONE version: 1.11494.1 | DigiCert Private CA: 1.943.0

Enhancements

On-Prem Digicert Private CA - End-entity certificate inventory

DigiCert® Private CA has introduced End-Entity (EE) Certificate Inventory for it On-Prem variant, giving users a centralized, scalable, and intuitive way to manage issued certificates.

  • Centralized EE Certificate Inventory: Provides a scalable and intuitive way to manage issued certificates.

  • New Inventory section: Replaces the previous EE Search workflow and improves navigation.

  • Modern grid-based certificate list: Offers enhanced sorting, filtering, and optional columns for a flexible view.

  • Detailed certificate metadata view: Displays all key information for easier review and management.

  • Optimized for large datasets: Ensures performance and usability at scale.

On-Prem Digicert Private CA - Intermediate CA revocation via UI

DigiCert Private CA now enables administrators to revoke intermediate CA certificates directly through the On-Prem CA user interface. Administrators can initiate revocation by selecting a reason (for example, key compromise, cessation of operation) and completing a dual-admin approval process. The UI clearly displays the CA being revoked along with the effective date. Once revoked, the system automatically updates the revocation status in both the UI and API responses and logs the action for audit purposes, ensuring secure and compliant lifecycle management.

OCSP certificate CSR key size update

The OCSP certificate generation process has been enhanced by relaxing key size validation for CSRs. This enhancement allows users to create new OCSP requests even when the responder key is larger than the signing CA key, ensuring smoother certificate renewals and better compatibility with legacy Root CAs.

Enhancement to LDAP support for CRLDPs

LDAP support for CRLDPs has been enhanced to improve compatibility and reliability. URLs are now properly encoded to handle spaces, commas, and backslashes, and Private CA correctly includes the ;binary suffix where required. These changes align with legacy behavior and ensure consistent operation across older systems.

Fixes

Profile update – Template IDs replaced with friendly names

The profile list page has been updated to improve clarity around template identification. Previously, TemplateIDs were displayed in hexadecimal, which could be confusing for users. Going forward, TemplateIDs are mapped to descriptive, user-friendly names, making it easier to understand and identify profiles at a glance.

On-Prem Private CA email notifications fix

Resolved an issue with email notifications in On-Prem Private CA. The expiring certificate email template has been corrected to align with the intended design. Additionally, the system now correctly sends notifications according to all configured frequency settings for End-Entity certificates, ensuring users receive timely alerts for upcoming expirations.

Support for BMPString in custom extensions

Resolved an issue with end-entity certificate creation where only UTF8String was supported for custom extensions. Private CA now supports BMPString in addition to UTF8String, providing greater flexibility when defining custom certificate fields.

November 20, 2025

DigiCert® ONE version: 1.11351.12 | DigiCert Private CA: 1.937.0

Enhancements

Enhanced profile logic and user experience

This release introduces enhancements to profile logic to provide a more consistent and secure user experience. These improvements ensure that profile behavior now dynamically adapts based on:

  • Feature flags – Profile capabilities automatically enable or disable based on the associated feature flag.

  • Permission sets – Users are shown only the actions and options allowed by their assigned roles and permissions.

These updates streamline the profile experience, reduce configuration errors, and ensure that users see only the features intended for their role and environment.

Fixes

Serial number normalization issue affecting OCSP validation

Resolved an issue that caused OCSP validation to fail when certificates were imported with improperly formatted serial numbers. Previously, some imported serials included leading zeros, which were stored without trimming. During OCSP validation, the ASN.1 decoder correctly normalized these values, resulting in mismatches and unauthorized responses. The import process has now been updated to properly trim and normalize serial numbers before they are added to the database, ensuring accurate OCSP lookups and consistent validation behavior.

November 12, 2025

DigiCert® ONE version: 1.11351.7 | DigiCert Private CA: 1.932.0

Enhancements

Extended support for Subject DN attributes and extensions

Added support for additional Subject DN attributes and certificate extensions from incoming EST and SCEP requests.

Fixes

Improved stability in SCEP, EST, and CMP enrollment

Fixed an issue that caused errors when certificates were issued directly from a root CA during protocol-based enrollment.

November 5, 2025

DigiCert® ONE version: 1.11351.1 | CA Manager: 1.927.0

New

Native protocol support for SCEP, EST, and CMP

This release adds native support for SCEP, EST, and CMPv2 in DigiCert Private CA, enabling automated certificate enrollment and lifecycle operations for devices and infrastructure systems. CMPv2 now fully supports certificate enrollment, renewal, and revocation. EST and SCEP support enrollment and renewal, with revocation available via API or UI. Protocol support is built directly into the Private CA stack, ensuring seamless interoperability with existing CA hierarchies, HSMs, and certificate policies. This allows organizations to deploy and automate certificate workflows across diverse enterprise, network, and IoT environments without additional components or configuration overhead.

For more information, see Enrollment protocols.

Enhancements

Private CA - Support for LDAP-CRLDPs

This release includes support for LDAP-based CRL Distribution Points (CRLDPs) for private certificates, allowing organizations to reference externally hosted CRLs using LDAP URIs. This enhancement ensures standards-compliant LDAP CRL locations, simplifies entry by automatically handling LDAP URI formatting, and adds LDAP as a selectable scheme specifically for CRL URLs.

Fixes

Improved CRL import validation logic

Issue

When importing a valid CRL blob, the operation could fail with the following misleading error message, even though the CRL was correctly signed by the issuing CA:

CRL is signed by another CA

Fix

CRL import validation logic in DigiCert Private CA has been updated, and users will no longer encounter this incorrect error message during CRL import.

October 22, 2025

DigiCert® ONE version: 1.11134.9 | CA Manager: 1.923.0

Enhancements

Update to SDN field length support

This update enhances the maximum supported length for the Subject Distinguished Name (SDN) fields: unstructuredName and unstructuredAddress. The limit has been expanded from 40 to 255 characters.

October 15, 2025

DigiCert® ONE version: 1.11134.5 | CA Manager: 1.921.0

Enhancements

Enhanced user access management

This release includes improvements in user access management, aimed at enhancing control across key CA operations.

October 8, 2025

DigiCert® ONE version: 1.11134.3 | CA Manager: 1.917.0

Enhancements

On-Prem Private CA email notification support

This release introduces support for email notifications in the On-Prem Private CA to improve visibility and enable proactive management of critical events. The system now sends alerts for certificate expirations, revocations, and upcoming license expiries, helping administrators and end users take timely action to maintain CA service integrity. Integration logic has also been enhanced to prevent duplicate alerts when the On-Prem Private CA is connected to external tools like DigiCert​​®​​ Trust Lifecycle Manager, ensuring a streamlined and coordinated notification experience.

Fixes

Create CRL UI workflow fix

This update addresses an issue in the Create CRL workflow where a CRL could be unintentionally uploaded after a warning message appeared, even without user confirmation. This behavior resulted in incorrect CRL configurations being stored and blocked subsequent uploads. The fix ensures CRLs are only created or uploaded after explicit user action, preventing unintended uploads and maintaining configuration accuracy.

Swagger documentation Fix

This update resolves a Swagger schema validation error that occurred when accessing the DC1/CA Manager API documentation. The affected definitions have been corrected, restoring full access to the Swagger UI and ensuring accurate API documentation rendering.

October 1 , 2025

DigiCert® ONE version: 1.11134.1 | CA Manager: 1.913.0

Fixes

Multi-account access display fix

This update fixes an issue that prevented users linked to multiple accounts from viewing OCSP Responder and AIA (Authority Information Access) details on the CA details page. The issue occurred due to incorrect handling of the account context during API calls, which blocked the related CA data from appearing. With this release, users who have access to multiple accounts can now properly view all associated OCSP and AIA information for their assigned accounts.

OCSP responder authorization fix

This update resolves an issue where OCSP responders using externally issued responder certificates returned an Unauthorized (6) error to OCSP clients. The issue was caused by incorrect validation of externally signed responder certificates.

September 25, 2025

DigiCert® ONE version: 1.10937.16 | CA Manager: 1.911.0

Enhancements

Usage breakdown in Private CA

Customers on the new licensing model can now view a detailed breakdown of license usage directly in DigiCert® Private CA. Instead of only seeing a single total on Account > Licenses page, you can now see how Roots, ICAs, and different types of End-Entity (EE) certificates (including PQC) contribute to your overall usage. For each type, Private CA displays both the number of certificates issued and the units consumed, making it easier to understand and reconcile your license usage.

Updates to CA creation and import options

Improved display of Create and Import options in DigiCert Private CA based on user permissions. The Create button now appears when you have the appropriate CA creation permissions, while the Import button appears if you have either CA creation or key-linking permissions. These updates ensure that users only see the options relevant to their permissions, making the experience simpler and more consistent.

Fixes

Fixed preview issue on Safari

When using Safari, clicking Preview while generating a Root or Intermediate CA could mistakenly create a real certificate instead of just showing a preview of the certificate. This has now been fixed, and Safari users will see the correct preview behavior.

September 17, 2025

DigiCert® ONE version: 1.10937.9 | CA Manager: 1.904.0

Enhancements

Add Microsoft roots to our public trusted roots

Added Microsoft test roots as public trusted roots of DigiCert® Private CA to support workflows for Microsoft Project.

September 10, 2025

DigiCert® ONE version: 1.10937.3 | CA Manager: 1.900.0

Enhancements

Private End-Entity (EE) certificates support custom OIDs

DigiCert® Private CA now supports adding custom OIDs in the Subject Distinguished Name (DN) of EE certificates. Certificate requestors can supply values for these custom OIDs when requesting a certificate.

Key points

  • Custom OIDs and their encoding types (for example, UTF8String, PrintableString, and IA5String) can be defined in the certificate template.

  • Requestors can provide values for these OIDs via CSR, fixed values, or user input.

  • This feature applies to Private EE Certificates only.

Fixes

Certificate issuance failure for long DNS SAN names

Issue

Certificate requests containing long DNS names in the Subject Alternative Name (SAN) field failed with the following error message:

{"status":"invalid_domain_name_underscore"}

While similar certificates had been issued successfully in the past, validation logic incorrectly blocked DNS names longer than 63 characters, despite their being valid under RFC standards.

Fix

DNS name validation in DigiCert Private CA has been updated to comply with RFC requirements. Certificates can now include DNS SANs up to 255 characters in total length, with each label (part) allowed up to 63 characters.

September 3, 2025

DigiCert® ONE version: 1.10937.1 | CA Manager: 1.894.0

Enhancements

On-Prem Private CA custom templates list view update

The Accounts column has been hidden from the Custom Templates list view for On-Prem CA. This simplifies the interface by ensuring that only relevant information is shown to On-Prem Private CA users.

August 27, 2025

DigiCert® ONE version: 1.10789.9 | CA Manager: 1.892.0

Fixes

Support for Zimbabwe country code

Issue

The Private CA previously blocked the use of Zimbabwe’s country code, which prevented customers from issuing certificates with this value.

Fix

Updated the Private CA to allow Zimbabwe’s country code, enabling certificate issuance for entities in this region, subject to legal and compliance approvals.

August 20, 2025

DigiCert® ONE version: 1.10789.6 | CA Manager: 1.890.0

Fixes

Partition loading from Crypto4A HSM

Issue

In the Provider.loadPartition function, partition loading failed when the API Key name and Actor name did not match due to incorrect logic enforcing a name match.

Fix

The logic has been updated to correctly load partitions regardless of API Key and Actor name alignment, ensuring consistent partition access as supported by Crypto4A HSM.

August 13, 2025

DigiCert® ONE version: 1.10789.5 | CA Manager: 1.889.0

Fixes

Incorrect signature algorithm list for PQC ICA creation

Issue

When creating an Intermediate CA (ICA) with a PQC CSR (SLH-DSA or ML-DSA) using the Provide a CSR signed by your own CA option, the system previously populated the Allowed signature algorithms field with all available algorithms.

Fix

This has been fixed so that, for PQC ICAs, the Allowed signature algorithms field now contains only the single algorithm that matches the ICA key size, ensuring correct configuration.

August 6, 2025

DigiCert® ONE version: 1.10789.1 | CA Manager: 1.887.0

Enhancements

Automatic partitioning CRL for CAs

This release adds improved scalability for CRL management by allowing automatic generation of sequenced CRL partitions for an Issuing Certificate Authority. New partitions are created based on user-defined thresholds, such as the number of issued certificates or the estimated size of the CRL file.

Improved audit log visibility

This release enhances traceability and operational visibility in CA Manager by adding previously missing actions. It closes existing gaps, enabling users to monitor and validate activities more effectively for compliance and audit needs.

Fixes

Fix for incorrect issuer serial number in re-certified ICA

This release addresses an issue where, after re-certifying the issuing root of an Intermediate CA (ICA) and subsequently re-certifying the ICA itself, the re-certified ICA incorrectly retained the issuer serial number from the original root certificate. With this fix, the re-certified ICA now correctly reflects the serial number of the updated (re-certified) root, ensuring accurate certificate chaining and improved trust path integrity.

August 5, 2025

DigiCert® ONE version: 1.10498.17 | CA Manager: 1.884.0

Fixes

Ed25519 CRL generation fix post Luna client upgrade

Issue

Following the upgrade to Luna client version 10.9, CRL generation for Ed25519 keys started failing. This was due to a change in the key type identifier—Ed25519 now uses key type value 64 instead of the previous identifier (CKK_EC_EDWARDS).

Fix

Code has been updated to recognize and use key type 64 for Ed25519, restoring CRL generation functionality.

July 30, 2025

DigiCert® ONE version: 1.10498.15 | CA Manager: 1.883.0

Enhancements

With this release, the on-premise DigiCert® Private CA introduces the following enhancements:

License limit enforcement

The on-premise DigiCert® Private CA now enforces license limits for the creation of Root and Intermediate CAs (ICAs), aligning with the enforcement model used in DigiCert DC1/CA Manager. License limits are embedded in the license payload and are validated during installation, updates, and CA creation. If a user attempts to create a CA beyond the licensed limit, the system blocks the operation and displays a clear, actionable error message.

Hardware Security Modules (HSM) support

The on-premise DigiCert® Private CA now extends HSM support to include:

  • Crypto4A HSMs

    The on-premise DigiCert® Private CA now supports Crypto4A HSMs for Post-Quantum Cryptography (PQC) algorithms, allowing users to configure and use Crypto4A devices for secure storage of PQC keys.

  • Thales LunaClient 10.8

    The on-premise DigiCert® Private CA now supports Thales LunaClient 10.8, this update enables secure cryptographic operations using Thales’ latest portable HSM, ensuring compatibility across key management, device discovery, authentication, and PKI workflows such as certificate issuance and signing.

Certificate preview

A new certificate preview feature has been added to allow users to verify certificate content prior to signing. This preview certificate is returned for display, enabling users to review the final output before executing a real signing operation. The same preview capability remains available after signing as well.

July 24, 2025

DigiCert® ONE version: 1.10498.11 | CA Manager: 1.882.0

Enhancements

On-Prem Private CA - Support for OCSP and CRL Services Post License Expiry

With this release, On-Prem Private CA now allows OCSP responses to be served and the latest published CRL to remain accessible even after the license expires, enhancing the reliability of certificate validation. This implementation aligns On-Prem CA functionality with CA Manager, ensuring that validation services continue to operate for already issued certificates.

This implementation aligns On-Prem CA functionality with CA Manager, ensuring that validation services continue to operate for certificates that have already been issued.

Automatic revocation of prior CAs on renewed CA revocation

The system now enforces automatic revocation of all prior CAs when a renewed (recertified) Private CA is revoked to strengthen certificate lifecycle consistency. This ensures that the entire CA chain is properly invalidated, reducing the risk of trust misconfiguration or misuse of older CA certificates.

July 16, 2025

DigiCert® ONE version: 1.10498.7 | CA Manager: 1.877.0

New

Delegated OCSP Responder (On-Prem Customers Only)

This release introduces support for delegated OCSP responders to enhance flexibility in signing OCSP responses, particularly in environments where root and intermediate certificate authorities (ICA) are offline or where key protection requirements mandate delegation.

Note

This feature requires a license. Please contact your account representative for access.

Key enhancements
  • Delegated OCSP responders for offline CAs

    Support for delegated responders issued by offline root or intermediate CAs. These responders can sign OCSP responses on behalf of an entire CA hierarchy without requiring the CA key to be online.

  • Coverage across CA hierarchies

    A single delegated responder can now cover multiple intermediate CAs and their issued certificates under a root CA, simplifying responder management and reducing operational overhead.

  • Online and offline deployment support

    • Online Mode: Create and activate delegated responders directly through the UI for online CAs.

    • Offline Mode: Generate a CSR for offline signing and upload the signed responder for activation.

  • Enhanced UI and API

    New UI options in the CA’s OCSP section for managing delegated responders.

Fixes

Recertification support for PQC roots

Resolved an issue that prevented recertification of CAs created using MLDSA and SLHDSA root templates. Users can now successfully recertify root and intermediate CAs based on these Post-Quantum algorithms using the Recertify option on the CA details page.

Incorrect ICA Count Display in Root CA List

Resolved an issue where the Number of ICAs column in the Root CA list incorrectly displayed 0 for all Root CAs, despite each having associated Intermediate CAs. The correct ICA count now loads immediately without requiring the user to click into each Root CA.

July 9, 2025

DigiCert® ONE version: 1.10498.4 | CA Manager: 1.869.0

New

On-premise DigiCert® Private CA extends support for Linux

With this release, the on-premise DigiCert® Private CA now supports Linux operating systems with 64-bit binaries on AMD64 architecture, in addition to traditional Kubernetes-based deployments. This offers greater flexibility for customers standardizing on Linux-based infrastructure. The core features and deployment models remain the same.

Enhancements

Support underscore in hostname in SAN dnsServe

When issuing private trust certificates, DigiCert® Private CA now supports Subject Alternative Name (SAN) entries of type dNSName that begin with an underscore (_).

July 3, 2025

DigiCert® ONE version: 1.10498.3 | DigiCert Private CA: 1.866.0

Fixes

DigiCert Private CA - Custom template loading issue

Fixed an issue where the custom template editor failed to load in air-gapped on-premises environments due to external resource dependencies. All required files (for example, Monaco Editor) are now bundled locally, ensuring full offline functionality.

July 2, 2025

DigiCert® ONE version: 1.10498.1 | CA Manager: 1.864.0

Enhancements

Support for KeyEncipherment/DataEncipherment in ECC certificates

DigiCert Private CA now allows you to issue Elliptical Curve Cryptography (ECC) certificates with the KeyEncipherment and DataEncipherment key usages (KUs), enabling compatibility with third-party tools require the key usages.

  • We added a new skip_key_usage_validation flag to the Certificate templates set to false by default (default: false).

  • CA Manager supports these key usages on ECC certificates without enforcing traditional validation rules.

  • Supported via the DigiCert Private CA API and configurable at the Certificate template level.

Example configuration

To include the key_encipherment and data_encipherment KUs for ECC certificates in a private CA setup, in the key_usage section of the Certificate template, set skip_validation to true.

Important

By default, skip_validation is set to false and must be explicitly configured for this change.

"key_usage": {
  "critical": true,
  "skip_validation": true,
  "required_usages": {
    "ECC": [
      "digital_signature",
      "non_repudiation",
      "key_encipherment",
      "data_encipherment"
  }
}
Restrict certificate revocation list (CRL) signature algorithm for offline CAs

The "signature algorithm" selection for template-based CRL creation under offline root or intermediate certificate authorities (CAs) is now restricted to match the issuer’s key algorithm to ensure cryptographic consistency. This change prevents misconfiguration by disallowing incompatible combinations, such as using a different ML-DSA variant than the CA’s key for CRL signing.

Multi-use AATL Signing ICA profile update for compliance alignment

We updated the Multi-use AATL Signing ICA profile in Ceremony Manager to align with the latest specifications effective after May 1, 2025. Key changes include the following:

  • Requiring at least one EKU to be selected

  • Removing emailProtection and clientAuth extended key usages (EKUs) to prevent unintended use in S/MIME or TLS BR contexts

  • Retaining the anyPolicy certificate policy

  • Renaming the profile to “Multi-use Signing.”

These updates ensure the profile adheres to revised compliance and usage requirements across AATL, Microsoft, and general signing use cases.

Improved audit logging for CRL scope changes

The audit log now captures CRL scope changes by recording both the previous and updated scope values (for example, “Partition” to “Complete”). This enhancement improves traceability and accountability, ensuring that any scope changes impacting certificate revocation visibility can be accurately audited and attributed.

Fixes

Custom template
  • Custom template display issue

    Fixed a user interface (UI) display bug where the certificate type for unmanaged intermediate CAs (unmanaged_ca) was incorrectly shown as common.certificateTypes.unmanaged_ca in the custom templates table.

  • Template defaults not honored for intermediate CA certificates

    Resolved an issue where default_algorithm and default_duration values defined in intermediate CA Certificate templates were not correctly applied during issuance. These values are now consistently honored for both root and intermediate CA certificate creation flows.

ICA CSR missing organization name for offline signing

Fixed an issue where the Organization Name field was not populated in the database when generating an Intermediate CA certificate CSR (certificate signing request) for offline signing. This bug caused sorting and display inconsistencies after the signed certificate was imported back. The Organization Name field is now correctly stored during CSR creation, ensuring consistent behavior across offline ICA workflows.

June 25, 2025

DigiCert® ONE version: 1.10272.6 | DigiCert Private CA: 1.858.0

New

DigiCert Private CA: Crypto4A integration with PQC (ML-DSA) support

This release introduces support for Crypto4A hardware security modules (HSMs) within DigiCert® Private CA, enabling hardware-backed Post-Quantum Cryptography (PQC) starting with the finalized ML-DSA algorithm. The integration ensures production readiness for PQC use cases while maintaining a path for future algorithm expansion. It also adds certificate revocation list (CRL) support for PQC certificates issued via Crypto4A, reinforcing our commitment to secure, standards-compliant certificate lifecycle management.

Feature highlights:

  • Crypto4A is now a supported HSM vendor in CA Manager (Private PKI).

  • Full ML-DSA support: key generation, signing, and certificate issuance via Crypto4A HSMs.

  • CRLs can now be generated for ML-DSA-based certificates.

June 18, 2025

DigiCert® ONE version: 1.10272.3 | CA Manager: 1.855.0

Enhancements

Enhanced CA display with organisation name

With this release, we updated the CA Manager user interface (UI) to provide better visibility and management of Certificate Authorities by displaying the organization name derived from the CA certificate subject.

Enhancement features:

  • CA List page

    We added a new column to display the organization name from the CA certificate subject.

    Note: Sorting and filtering for the organization name will only be available for new accounts provisioned after this update.

  • CA Hierarchy page

    The organization name is now displayed alongside each CA in the CA hierarchy view for improved clarity and traceability.

SubjectDN order support for Unmanaged CAs

CA Manager now supports SubjectDN order configuration for Unmanaged CAs.

Enhancement features:

  • Users can define and preserve the exact Subject Distinguished Name (SubjectDN) order when issuing Unmanaged CAs.

  • Ensures consistent and standards-aligned certificate issuance across all CA types.

Why this SubjectDN change matters

Certain industry specifications and protocols require SubjectDN attributes to be encoded in a specific order. This update ensures compliance in such scenarios, reducing the risk of interoperability issues with consuming systems.

AKI extension support for Root and ICA certificates

CA Manager now supports configurable Authority Key Identifier (AKI) extensions for Root and Intermediate CA (ICA) certificates.

Enhancement features:

  • AKI behavior can be controlled

    • You can control AKI behavior using the configuration below.

    • The "include" flag accepts only "yes" or "no"; any other value will be ignored.

    "aki_extension": {
        "authority_name_serial_number": true,
        "include": "yes",
        "allow_include_override": true
    }
  • Root CA behavior

    • AKI is optional and must be explicitly enabled with "include": "yes".

    • When enabled, Root CA will include its own SKI as the AKI.

  • ICA CA behavior

    • "authority_name_serial_number": "true" can be used to include issuer DN and serial number.

    • If "include": "yes" is set without specifying fields, the default is to include the issuer’s SKI.

    • Recertifying the ICA may invalidate downstream AKIs if "authority_name_serial_number" was used.

June 11, 2025

DigiCert® ONE version: 1.10272.2 | CA Manager: 1.851.0

New

On-premise DigiCert® Private CA: Kubernetes deployment with embedded MariaDB support

With this release, we introduce support for deploying on-premise DigiCert® Private CA in Kubernetes using a Helm chart that includes MariaDB as a managed dependency, enabling streamlined, self-contained deployment without requiring external database configuration, reducing complexity, and improving portability.

Key features:

  • MariaDB packaged as a Helm dependency with configurable persistence, resource limits, and initialization.

  • Manifests for Pods, Services, ConfigMaps, Secrets, and PersistentVolumeClaims.

  • CA connects to MariaDB using credentials stored in Kubernetes Secrets.

  • Database schema automatically created and migrated on the first run

Enhancements

Support for template-defined key usages

We resolved a limitation preventing custom Key Usages from being used when issuing Root or Intermediate CA certificates. Previously, certificate templates could not override default Key Usage values, restricting flexibility in configuring CA roles.

Enhancement features:

  • Certificate templates can now fully control the Key Usages set in issued CA certificates.

  • Default Key Usages are no longer enforced when template-defined values are provided.

  • Supports stricter compliance and custom trust models.

June 4, 2025

DigiCert® ONE version: 1.10272.1 | CA Manager: 1.847.0

Enhancements

Post Quantum Cryptography (PQC) Enhancement

This release improves validation and error handling for CAs using post-quantum algorithms. The release includes enhanced messaging, better handling of unsupported configurations, and safeguards to prevent invalid setup during CA creation.

May 28, 2025

DigiCert® ONE version: 1.10046.8 | CA Manager: 1.846.0

New

Custom certificate templates in Private CA

DigiCert Private CA now supports custom JSON-based certificate templates, enabling users to define, manage, and reuse certificate policies/configurations for Root, Intermediate CA (ICA), and End Entity certificates.

Custom template features:

  • Create, edit, and reuse templates for Root, Intermediate CA, and end entity certificate

  • Choose key algorithms, signature options, and validity periods

  • Configure X.509 fields like Key Usage, EKU, SANs, and policy OIDs

  • Import/export templates for easy reuse across environments

  • Role-based access controls and full audit logging are included

CA Recertification

In this release, we introduce Recertification for Certificate Authorities (ICAs or Roots), enabling seamless continuation of certificate issuance as CAs approach expiration. With Recertification, also referred to as Renewal in prior versions, we standardized the naming, using "recertify/recertification" across the system.

Recertification features:

  • Allows you to recertify expiring CAs using the same SubjectDN and the original public key.

  • The recertified CA becomes active for issuance.

  • The new CA inherits the following:

    • Subject DN (including Common Name)

    • Key types and Issuance settings

    • Original public key

  • The original CA is disabled and retained for visibility/auditing.

Post recertification features:

  • Signing and viewing operations on the old CA ID redirect to the new CA.

  • The old CA remains valid, but we remove it from the new issuance process.

  • CRLs/OCSP responsibilities migrate to the new CA.

Limitations:

  • Public and Qualified Trust CAs are excluded.

Enhancements

ML-DSA CRL Support

Certificate Revocation List (CRL) now supports ML-DSA (Multi-Lattice Digital Signature Algorithm) certificates, enabling standards-compliant revocation handling for post-quantum certificates. You can now add ML-DSA certificates to CRLs, which are correctly signed using an approved ML-DSA algorithm and fully comply with RFC 5280, including proper DER encoding and structure. The crlDistributionPoints extension is also correctly populated in all ML-DSA certificates, ensuring compatibility with standard revocation-checking mechanisms.

Offline end-entity issuance for DigiCert TSA

Ceremony Manager (CM) now supports offline issuance of new End-Entity (EE) certificates specifically for the DigiCert Timestamping service, in compliance with the latest Baseline Requirements (BRS) mandating that the issuer private key be stored offline. Ceremony Manager includes a new EE profile named Timestamp Unit (TSU), enabling the creation of offline EE requests without relying on templates.

Additional enhancement features:

  • A new option for offline requests

  • Supports secure, compliant issuance workflows for timestamping certificates with the required timestamp EKU on the issuing ICA

May 14, 2025

DigiCert® ONE version: 1.10046.3 | CA Manager: 1.839.0

New

On-premise DigiCert® Private CA: New Certificate listing endpoint

We added a new certificate listing endpoint for DigiCert® Private CA, designed to simplify and automate certificate management through enhanced filtering and scheduling capabilities.

Certificate listing endpoint features:

  • Advanced filtering options

    Easily sort and list certificates based on status, including:

    • All valid certificates (with full CA chain)

    • Expired certificates from the past 7 to 120 days

    • Revoked but not yet expired certificates

  • Custom import scheduling

    Allows you to set flexible date and time filters to control how frequently certificates are imported, enabling better alignment with your organization’s certificate lifecycle and compliance policies.

This update empowers seamless, policy-driven discovery and management through DigiCert ONE Trust Lifecycle Manager for on-premise DigiCert® Private CA environments.

Enhancements

Post-Quantum Cryptography (PQC) updates in DigiCert® Private CA

As part of our ongoing commitment to evolving cryptographic standards, we're introducing the following updates related to Post-Quantum Cryptography:

  • ML-DSA (final NIST version) now available

    The finalized version of the Module-Lattice-Based Digital Signature Algorithm (ML-DSA) selected by the National Institute of Standards and Technology (NIST) is now supported and available for use with SoftHSM.

  • Composite and Falcon (FN-DSA) algorithms are hidden

    The Composite and Falcon FN-DSA (Fast-Fourier transform over NTRU-Lattice-Based Digital Signature Algorithm) algorithms will no longer appear in the DigiCert® Private CA user interface. These algorithms remain in the Initial Public Draft (IPD) stage and have not been finalized by NIST. As a result, we are hiding them from general use to avoid premature adoption.

  • PQC Labs for experimental algorithms

    All draft or experimental PQC algorithms—including those not yet standardized—will be explored and made accessible exclusively through PQC Labs, our dedicated environment for testing emerging cryptographic technologies.

These changes are part of our proactive approach to ensuring secure, standards-aligned cryptographic practices across all DigiCert CA platforms.

May 7, 2025

DigiCert® ONE version: 1.10046.1 | CA Manager: 1.837.0

Enhancements

DigiCert Private CA license enforcement update

With this release, we added license expiry enforcement to the DigiCert Private CA system by validating the end_date specified in the license. Once the license expires, the application will restrict access, automatically shut down, and block any restart attempts. To maintain consistent behavior across time zones, license validation is based on Coordinated Universal Time (UTC). Any attempts to tamper with the license content will cause it to be rejected. This update ensures the system can only be accessed and operated with valid, time-limited licenses.

April 30, 2025

DigiCert® ONE version: 1.9735.9 | CA Manager: 1.835.0

New

Client-owned HSM key discovery and management

CA Manager now supports clients who bring their own Hardware Security Modules (HSMs) for dedicated key management. This release enables clients to continue using keys previously managed by other Certificate Authorities—such as for code signing—without rekeying or migration delays.

Key capabilities:

  • Key discovery API

    Enables client managers (such as Software Trust Manager) to generate a detailed report of all keys stored on connected Luna HSM partitions, allowing clients to identify available keys even when no prior metadata is available.

  • Key registration API

    Allows clients to provide identifying information for specific keys, when available, and configure their intended usage (for example, code signing and escrow signing) through client management tools.

Current restrictions:

  • Support is limited to Thales Luna HSMs.

  • Supported key types: RSA, ECDSA, and EdDSA only.

April 23, 2025

DigiCert® ONE version: 1.9735.5 | CA Manager: 1.831.0

New

Swagger API Documentation for on-premise DigiCert® Private CA,

The Swagger API documentation is now integrated into the on-premise DigiCert® Private CA, improving visibility, usability, and developer experience.

Key Updates:

  • Frontend Integration

    Swagger UI is now integrated and available for viewing directly from the on-premise DigiCert® Private CA, making it easy for users to explore the API endpoints.

  • Validated API Documentation

    API documentation has been parsed and validated for correctness to ensure consistency and accuracy in the sprec.

  • Dockerfile Support

    The updated Dockerfile includes all required configurations to serve Swagger UI as part of the deployment.

Enhancements

UI Enhancements to Ceremony Creation Workflows

We've made several user interface (UI) improvements to streamline the ceremony creation experience, especially for externally hosted ICAs. These changes improve usability and reduce visual clutter in the workflow:

  • Updated field label: “Enter your CSR, if using one” is now “Provide your CSR” for clarity.

  • Key Type and Key Size fields are now hidden when you provide a CSR, as these field values are parsed from the CSR.

  • Resolved date/icon overlap issue.

  • General CSS refinements for a cleaner layout.

April 16, 2025

DigiCert® ONE version: 1.9735.3 | CA Manager: 1.827.0

Enhancements

DigiCert Private CA displays the organization name for the Root and Intermediate CA certificates

In DigiCert Private CA, when visiting the Root Certificate Authorities and Intermediate Certificate Authorities pages, you can now view the certificates Organization Name (O=) from the Subject Distinguished Name (SubjectDN). Before the update, you had to go to the Root or Intermediate CA certificate's details page to find this information.

April 9, 2025

DigiCert® ONE version: 1.9735.2 | CA Manager: 1.825.0

Fixes

OCSP Responders Not Fetched on CA Details Navigation

We fixed an issue where navigating between related CA instances (for example, from an intermediate certificate authority (ICA) certificate to its parent Root CA or from a Root CA to a child ICA certificate) from the details page did not trigger a fetch request for Online Certificate Status Protocol (OCSP) responders. As a result, the details page incorrectly displayed OCSP responders from a previously opened CA instance.

Now, when opening a different CA instance, the application correctly sends a request to fetch the associated OCSP responders and displays the correct responders for the selected CA, if available.

April 2, 2025

DigiCert® ONE version: 1.9735.1 | CA Manager: 1.824.0

Enhancements

Common UI Upgrade for Digicert On-Prem CA

The Digicert On-Prem CA has been upgraded to utilize the latest Common UI version 9 and ANTD version 5, incorporating breaking changes that required updates across the application.

Default Signature Algorithm for OCSP Responder Generation

A default signature algorithm is now pre-selected in the "Signature Algorithm" field across all OCSP responder generation paths.

Changes to note

  • Ensures a predefined default algorithm is set to improve usability.

  • Applied consistently across all OCSP responder creation workflows.

RAS Enhancements
Asynchronous Audit Logging

The AddAuditLog method within the Audit Service has been updated to execute its operations asynchronously.

  • The method now performs its operations within a new goroutine.

  • It immediately returns after spawning the goroutine, improving system responsiveness.

  • The core business logic remains unchanged, ensuring no impact on existing audit log processing.

This enhancement reduces potential delays in request processing by offloading audit logging to a separate execution thread, leading to improved application performance and responsiveness.

OCSP Gen Service - App Lock for Deletion Loop

The OCSP Gen service now ensures that the deletion loop runs under an application lock to prevent multiple pods from attempting to delete the same records simultaneously.

  • Introduced an application-level lock around the deletion loop.

  • Prevents race conditions where multiple pods could try to delete the same OCSP records.

  • Ensures a more stable and reliable OCSP response generation process.

This enhancement improves consistency and stability in OCSP response generation by preventing unintended data conflicts in multi-pod deployments.

Fixes

Incorrect Success Message When Importing Offline ICA

Issue

After successfully importing an offline Intermediate CA (ICA) with the "Revocation Checking Only" option, the application incorrectly displayed the success message: "Root CA imported” instead of the correct message: "Intermediate CA imported".

Fix

The success message now correctly reflects the imported CA type, ensuring clarity and preventing confusion.

March 26, 2025

DigiCert® ONE version:  1.9525.6 | CA Manager: 1.820.0

Enhancements

Enhanced Partition Monitoring via CA Manager GUI (Internal Use Only)

Summary

To improve operational visibility and prevent unexpected outages caused by full HSM partitions, we've added a new partition monitoring feature to the CA Manager GUI.

Enhancement details

To proactively monitor partition usage, the CA Manager GUI now includes a new capability for SafeNet HSMs:

  • Select a Partition: PKI OPS users can choose a specific partition from the CA Manager interface.

  • Query Partition Status: A new button labeled "Query Partition" issues the Par show command in the background.

  • Display Results: The partition's current status and usage details are displayed directly in the UI.

This enhancement helps prevent downtime by enabling early detection of storage issues and allows the PKI OPS team to manage partition capacity more effectively.

TLS Certificate Profile Updates for Chrome and Mozilla Root Policy Compliance

Background

Both Chrome and Mozilla now mandate that Certificate Authorities issue publicly trusted TLS certificates from intermediates that are purpose-restricted to Server Authentication only. To support this policy shift, we've made the following adjustments to our default certificate profiles.

Summary

To align with updated root store policies from Chrome and Mozilla, we have updated default TLS certificate profiles to ensure compliance with the new requirement: TLS certificates must chain to a TLS-only hierarchy. These changes take effect for certificates issued starting March 15, 2025.

March 19, 2025

DigiCert® ONE version: 1.9525.5 | CA Manager: 1.816.0

New

External OCSP - Support CSR based flow to sign OCSP Responder

You can now issue external delegated OCSP responder certificates for use on external systems. These certificates are hosted outside DigiCert ONE, with clients responsible for routing and responding to OCSP requests.

  • The responder certificate’s CN follows the format {ICA common name} - External OCSP - {timestamp}, inheriting organization and country from the ICA.

  • A CSR is retained if it includes a DNS SAN; other SAN fields are ignored.

We added user interface (UI) and API support, including a new request form, CSR upload option, and enhanced API documentation.

March 12, 2025

DigiCert® ONE version: 1.9525.4 | CA Manager: 1.814.0

Enhancements

Database performance metrics into New Relic

New Relic metrics in the sandbox environment now include SQL statements and connection types for better observability and performance analysis. The New Relic wrapped database driver is now conditionally loaded only when New Relic is specifically configured, preventing unnecessary dependencies and potential overhead.

Fixes

Correct Encoding of registeredID SAN as OID

Issue: The registeredID Subject Alternative Name (SAN) was encoded incorrectly as an ASCII string by CA Manager instead of a DER-encoded OBJECT IDENTIFIER (OID).

Fix: The encoding logic has been corrected to properly encode registeredID SANs as DER-encoded OIDs, ensuring compliance with RFC 5280 and interoperability with standards-compliant clients and applications.

March 5, 2025

DigiCert® ONE version: 1.9525.1 | CA Manager: 1.810.0

Enhancements

Post-quantum cryptography (PQC) algorithm support for the escrow key recovery endpoint
  • We added support for recovering escrowed PQC client keys via POST /certificate-authority/api/v1/escrow/client-key/{id}/recover.

  • Previously, only RSA, ECDSA, and Ed25519 were supported for escrow key recovery. With this update, you can now successfully recover PQC algorithms.

  • This enhancement ensures full escrow lifecycle support for PQC algorithms, enabling seamless certificate issuance and key recovery.

February 26, 2025

DigiCert® ONE version: 1.9391.4 | CA Manager: 1.808.0

Enhancements

Enforce "Allowed Uses" Restriction on HSM Partition Assignment via API

Previously, when assigning a hardware security module (HSM) partition to a "Selected Account" via the frontend (FE), users were required to select at least one "Allowed Use" (New CA Keys, New OCSP Responder Keys, or Key Escrow). However, this restriction was not enforced when registering or editing a partition via the backend (BE) API.

Change

We aligned the backend behavior with the frontend by enforcing the "Allowed Uses" restriction when assigning an HSM partition to a "Selected Account" via the API. This change ensures consistent validation across both interfaces and prevents misconfigurations.

Impact

Now, API users must specify at least one "Allowed Use" when assigning an HSM partition to a "Selected Account."

  • New CA Keys

  • New OCSP Responder Keys

  • Key Escrow

February 12, 2025

DigiCert® ONE version: 1.9391.0 | CA Manager: 1.807.0

New

Digicert On-Prem CA

The Digicert’s On-Prem CA will be a private Certificate Authority (CA) for secure and automated X.509 certificate management that provides full control over certificate issuance, lifecycle management, and security policies, ensuring compliance with enterprise security requirements.

Key features and enhancements
  • Standalone On-Prem CA architecture

    • Flexible deployment: Single-instance Root CA (offline) with support for multiple Intermediate CAs (ICAs).

    • Enterprise-grade security: Root CA remains air-gapped for enhanced security, while ICAs handle certificate issuance.

  • Platform support: Kubernetes

    • Containerized deployment for scalability, high availability, and portability.

    • Supports on-prem Kubernetes clusters for private PKI management.

  • Advanced certificate management

    • Customizable certificate templates to define policies for different use cases.

    • Automated certificate issuance through APIs and management console.

    • Certificate revocation list (CRL) and online certificate status protocol (OCSP) support for real-time validation.

  • Management interface (local management console - use interface)

    • User-friendly web-based management console for administration.

    • Supports certificate issuance, revocation, monitoring, and reporting.

  • Authentication and access control

    • Basic authentication for local access.

    • Token-based authentication for API access and automation.

  • Database backend: MariaDB

    • Reliable and scalable database to store certificate metadata.

    • Optimized for high-performance queries and secure data storage.

  • Hardware security module (HSM) support

    • SoftHSM for software-based key management.

    • SafeNet and DPod integration for hardware-based cryptographic key protection.

  • Protocols and API integrations

    • RESTful API for certificate issuance, renewal, and revocation.

  • Comprehensive logging and auditing

    • System logs for operational monitoring.

    • Audit logs for security, compliance, and forensic investigations.

Support underscores in SAN:dnsName

Underscores are now supported in the SAN:dnsName files for private certificates.

RSA based certs with non 65537 exponent

RSA public exponents will support keys for the range 216  < e < 2256 for private certificates.

OCSP responder with critical OCSP no-check

As part of our ongoing security and compliance measures, we are going to push this change blocking OCSP responders that include the OCSP No-Check extension (id-pkix-ocsp-nocheck as defined in RFC 6960, Section 4.2.2.2) when marked as a critical extension. The OCSP No-Checkextension is designed to exempt OCSP responder certificates from revocation checking. While this may be necessary for long-lived OCSP responders, marking this extension as critical enforces the revocation bypass, potentially introducing security risks. Specifically, a compromised responder with this extension marked as critical could remain trusted indefinitely, undermining certificate validation mechanisms.

Impact:

  • This update will prevent the import of OCSP responder certificates that have the OCSP No-Check extension marked as critical.

  • If you are currently using an OCSP responder with this extension marked as critical, the update will cause errors when validating responses. To resolve this, you will need to issue a new OCSP responder certificate with the OCSP No-Check extension set as non-critical.

Enhancements

CA object caching for improved performance

To enhance performance and efficiency, a new caching module has been introduced to reduce database and HSM calls during certificate issuance.

  • New cache module ensures consistent and reliable operation.

  • Critical CA data is cached when issuing certificates, reducing redundant lookups.

  • Immutable and thread-safe cache maintains integrity and concurrency.

  • Certificate issuance logic updated to leverage cached data.

  • Standardized cache interface for seamless integration.

Public key caching for escrowed keys

A performance analysis of signing functionality with an escrowed key revealed frequent HSM lookups for the public key, causing inefficiencies. To optimize performance, the public key will now be cached alongside the signing key.

Configurable polling interval and cache disable option

The update job polling cycle is now configurable, improving test automation and allowing users to disable caching if needed.

Fixes

Stop generation of OCSP responder for expiring CA

This release introduces an optimization to prevent the unnecessary generation of OCSP responder certificates when the OCSP responder’s valid_to is within 10 seconds of the CA certificate's valid_to.

Previous behavior

  • CSP responder certificates were being reissued every 10 minutes if: ocsp.ValidTo.UTC().Sub(time.Now().UTC()).Hours() <= reissueBoundary.Hours()

  • This led to excessive OCSP certificate generation, even when close to the CA's expiration.

New Behavior

  • The system now stops generating new OCSP responder certificates when: ocsp.ValidTo.After(caValidTo.Add(-10 * time.Second))

  • This prevents unnecessary reissuance and optimizes resource utilization.

January 29, 2025

DigiCert® ONE version: 1.9100.8 | CA Manager: 1.800.0

Fixes

Bug Fix

Set the criticality of the ocsp no check extension in the OCSP responder cert to false.

January 29, 2025

DigiCert® ONE version: 1.9100.7 | CA Manager: 1.799.0

Fixes

Show Authcode when adding a new remote proxy

The fix allows users to view and access the Authcode when adding a new proxy app. The Authcode is required to set up a connection between the CA manager and the remote proxy app.

January 22, 2025

DigiCert® ONE version: 1.9100.6 | CA Manager: 1.798.0

New

Support RSA/ECDSA/EdDSA keypair to CA Manager for Luna SA

Ability to import RSA, ECC, or EdDSA keypairs from a registered HSM partition into CA Manager keypair records for use in signing processes within Software Trust Manager workflows for LUNA Safenet systems.

January 15, 2025

DigiCert® ONE version: 1.9100.3 | CA Manager: 1.793.0

New

[On-premises clients only and requires additional licensing] Precert for CT log signing

Capability to create a pre-certificate for PUBLIC TLS that can be submitted to CT logs for signing, and subsequently retrieve the signed version for issuance.

Fixes

Fix to support “match_issuer” for RSAPSS algorithm in Certificate Template

January 8, 2025

DigiCert® ONE version: 1.9100.1 | CA Manager: 1.791.0

Fixes

PathLen modification flows

Minor fixes to PathLen modification flows during certifcate creation.