Skip to main content

Device Trust Manager

Release notesRSS

Recente releases

August 20, 2025

Enhancements

Certificate field enhancements

Added support for embedding the organization name in issued certificate fields.

All certificate fields are included in the certificate object and are searchable, making it easier to filter and track certificates.

Batch MAC key generation (server-side)

Added support for server-side key generation of batch MAC keys.

This enhancement enables secure device provisioning at scale.

Reporting and exports

Support the ability to export certificates and generate periodic exports.

Certificate renewals

Added support to renew Individual certificates directly.

UI translations

Japanese language support is now available in the user interface.

July 25, 2025

Enhancements

Enhanced Dashboard

DigiCert® Device Trust Manager now provides visibility into essential licensing details under Dashboard > Plans and licenses. This enhancement provides users with a clear and consolidated view of all supported licensing models of Device Trust Manager.

This enhancement improves transparency and empowers Solution Administrators with self-service access to entitlement details, making license management more efficient and intuitive within Device Trust Manager.

July 16, 2025

Included in this release:

New

Support for DigiCert gateway

DigiCert​​®​​ gateway acts as a trusted intermediary between internal devices and DigiCert® Device Trust Manager, performing the following functions:

  • Accepts incoming certificate requests over supported protocols.

  • Authenticates and forwards requests to DigiCert cloud services.

  • Relays issued certificates or error responses back to the requesting device.

This new feature provides a secure, protocol-aware proxy service that doesn’t require any client changes on the device. Devices interact with the DigiCert gateway using standard certificate management protocols.

Support for CA connectors

CA connectors allow you to issue certificates from external CA services while still using Device Trust Manager as your central platform for certificate requests and management.

Device Trust Manager now supports CA connectors, enabling seamless integration with external certificate authorities. This release includes built-in support for DigiCert CertCentral® and EJBCA, allowing Device Trust Manager to issue and manage certificates through these external services without custom development.

This new feature expands compatibility and makes it easier to align with the existing PKI ecosystems.

Enhancements

Added support for Cloud platform policy on the dashboard

The Device Trust Manager dashboard has been enhanced to provide greater visibility into the cloud platform policy and device onboarding activity. In the Cloud platform policies tab of the Dashboard, you can now view a summary of devices that have been successfully onboarded, a breakdown of device status (In progress, Completed, Failed), and a list of recently assigned cloud platform policies.

These enhancements offer valuable insights to help you monitor device onboarding and ensure successful policy application.

Added support for message chunking of large deployments

Device Trust Manager now supports message chunking for large deployments, enabling the reliable delivery of artifacts up to 256 MB by automatically splitting them into smaller, encrypted chunks. These chunks are then reassembled by the TrustEdge agent, with built-in support for retries, failure, timeout handling, and detailed logging and monitoring of the entire process.

This enhancement ensures secure and efficient delivery of large updates, improving the scalability and robustness of software updates and deployment.

Added support for assigning cloud platform policies while creating a device group

Device Trust Manager now supports assigning a Cloud platform policy directly when creating a Device group.

This enhancement enables Solution Administrators to streamline onboarding by selecting the applicable cloud platform policies alongside certificate management policies.

Included Cloud platform policy details in the device details page

You can now view detailed information about the Cloud platform policy applied to a device directly within the Device Details page. This includes visibility into the assigned cloud platform policy and the MQTT broker associated with it.

This enhancement improves operational clarity and helps you verify device-to-cloud assignments at a glance.

Automated process to support index management for Elasticsearch

Added an automated process to roll over Elasticsearch for indices and partition data by time or size.

This enhancement improves long-term performance, scalability, and maintainability of telemetry and audit logs.

Improvements to the UI

Made improvements to the Device Trust Manager UI for a more consistent and user-friendly experience across workflows, including visual refinements and standardized layouts.

These simplify navigation and improve user experience.

Added support for full CMC revocation and rekey

Implemented full support for Certificate Management over CMS (CMC) operations, including revocation and rekey.

Added support for API helpers

Added support for internal API helper utilities.

Fixes

Standardized the use of snake_case formatting for all field names across APIs

To ensure consistency and improve the developer experience, all field names across the Device Trust Manager APIs have been standardized to use snake_case formatting.

This change aligns with common API design best practices and ensures uniformity across all endpoints.

May 28, 2025

Included in this release:

New

Cloud platform policy for Azure Event Grid

Device Trust Manager now supports Cloud platform policy for automated integration with Azure Event Grid.

  • Azure Event Grid is a fully managed event routing service from Microsoft that enables event-driven architectures across services. It allows applications to react in near-real time to events originating from Azure services, custom applications, or IoT devices using open protocols like MQTT.

  • Through the Cloud platform policy, devices enrolled in Device Trust Manager can be automatically registered and routed to the appropriate Azure Event Grid endpoint. Once onboarded, devices can send and receive MQTT messages using secure, certificate-based authentication.

  • When assigned to a device group, the Cloud platform policy ensures that devices are provisioned with operational X.509 certificates for secure authentication with the MQTT Broker on Azure Event Grid.

Enhancements

Full CMC support for EST

Added full Certificate Management over CMS (CMC) to the EST protocol. A new checkbox has been introduced under the EST section of the Certificate management policy wizard.

  • When you select this checkbox, you are prompted to choose an Intermediate CA (ICA) to act as the signer.

  • When enabled, full CMC support is activated for the associated certificate management policy.

This enhancement supports advanced workflows and improved compliance with client-specific PKI requirements.

May 14, 2025

Enhancements

Batch Report for both successful and failed records
  • New batch report option: When creating batch certificate requests, you can now download a report that includes both successful and failed records.

  • How to enable: Select the Include batch report in download checkbox under the Certificate download format section.

  • Label update: The field Batch results log format has been renamed to Batch report format for better clarity.

EST Endpoint TLS certificate response

The endpoint GET /.well-known/est/{enrollment-profile-id}/cacerts now returns TLS certificates specific to the current environment.

Opmerking

If a self-signed TLS certificate is in use, the TLS chain is not included in the response.

Increased report download limits

The maximum number of lines in a downloadable report has increased from 50,000 to 500,000, allowing for significantly larger data exports.

Template and algorithm support updates for PQC
  • Unsupported algorithms: FNDSA (Falcon) and composite algorithms are currently not supported in certificate templates.

  • Existing templates using these algorithms can still be opened and edited, but saving will trigger an unsupported algorithm error message. To save changes, unsupported algorithms must be removed.

  • MLDSA OID update: Object identifiers (OIDs) for MLDSA have been updated to the latest version to ensure successful certificate issuance.

Standardization of MAC address format

MAC addresses generated during batch MAC key creation are now written in uppercase to improve consistency and readability.

April 23, 2025

Enhancements

Enhanced X.509 certificate generation with new DN attributes

The certificate generation process now includes support for two additional subject distinguished name (DN) attributes - Organization Identifier and the User Identifier.

These attributes can now be configured and included as part of the certificate template.

Organization Identifier:

  • OID2.5.4.97

    Description: Represents the organization identifier, often used in compliance and regulatory contexts.

User Identifier:

  • OID0.9.2342.19200300.100.1.1

    Description: Represents a unique identifier for the user, commonly used in directory-based systems.

April 16, 2025

Enhancements

SCEP GetCACert endpoint enhancement
  • The GetCACert endpoint now supports returning the full certificate chain, including the Root CA.

  • This improves client compatibility and trust path validation.

  • This behavior is optional and only applies when explicitly enabled in the enrollment profile configuration.

Passcode length validation update
  • The previously fixed 20-character limit on passcodes has been removed.

  • Passcodes can now be up to 64 characters in length, based on your custom validation or policy.

April 10, 2025

New

Support for Trust Bundles for managing device trust stores

Device Trust Manager now supports Trust Bundles, a new feature for managing and distributing collections of trusted certificates, including Root CAs, Issuing CAs, and required intermediate certificates. This new capability allows users to easily create, edit, download, disable, and delete trust bundles and securely share them via a DigiCert-hosted link. With Trust Bundles, populating and updating device trust stores across fleets becomes more simplified.

Support for registered values for certificate subject validation

Device Trust Manager now supports registered values, enabling stricter validation rules for certificate subject fields during issuance. When integrated into a certificate management policy, registered values can define allow lists or apply regular expressions for complex validation criteria. If a certificate request violates these conditions, issuance is automatically blocked. Additionally, Registered Values containers can be created, edited, disabled, or deleted, offering flexible policy enforcement.

Backdating certificate start dates

A new option in certificate templates and profiles enables certificates to be issued with a start date in the past. When enabled in the template and configured in the certificate profile, this option allows users to define how far back the certificate's validity period should commence. This functionality is particularly useful for aligning certificates with device activation times or resolving time synchronization issues during provisioning.

Post-Quantum Cryptography Support for SLH-DSA and FN-DSA

Device Trust Manager now includes support for Post-Quantum Cryptography (PQC) algorithms SLH-DSA (SPHINCS+) and FN-DSA (FALCON). These algorithms enable the issuance and validation of PQC-ready certificates, helping organizations proactively prepare for a quantum-resistant future.

New Certificate Request List and Details page

Device Trust Manager now provides visibility into certificate requests with a dedicated List and Details page. Users can view and filter requests based on certificate values, policy, status, type, and date. Each request provides essential metadata, including the requester, timestamp, and the complete request payload with the CSR. This feature empowers administrators with deeper insights and enhanced traceability for certificate issuance activities.

March 17, 2025

Enhancements

Tooltips for certificate management

Descriptions now appear when hovering over certificate requests on the certificate management page.

Fixes

Refresh functionality enhancement for Device Logs

The Refresh functionality has been enhanced to update the Device Logs and summary page, as well as Device Status, Operational Status, and Connection Status.

Device Group ID displayed when registering a single device

When registering a single device through a v2/certificate API call, the Device Group ID is displayed so that CPS can track the device group for which the certificate was issued.

Certificate policy with only TRUST_EGDE as the enrollment method is not allowed

If a certificate management policy contains only TRUST_EDGE as an enrollment method, the API rejects the request with a validation error.

February 6, 2025

New

Single certificate request with license tier selection

You can now request a single certificate with a choice between two licensing tiers.

  • Essential plan: Provides basic certificate issuance features.

  • Advanced plan: Offers enhanced features such as device record association, management via the DigiCert TrustEdge agent, and support for OTA updates.

Batch certificate request with license tier selection

You can now request certificates in bulk with a choice between two licensing tiers.

  • Essential plan: Delivers basic functionality for bulk issuance.

  • Advanced plan: Provides additional capabilities like device record association, management via the DigiCert TrustEdge agent, and OTA updates.

Logging for software updates

New logging capabilities enable you to monitor software update progress and troubleshoot issues during device deployments. This feature provides real-time visibility into the update process.

Custom inventory attributes

You can now define custom inventory attributes beyond the default set. This addition allows for a more tailored and flexible inventory management experience.

Enhancements

Authentication policy assignment in groups

You can now assign an authentication policy to both device groups and certificate management policies. This update secures device registration and certificate management by ensuring the correct authentication is enforced.

EST CA certs endpoint response handling

The EST CA Certs endpoint now accurately processes requests that include both the Certificate Management Policy ID and Device Group ID.

Matter standard certificate template

A new system template has been added to support Matter-compliant certificate issuance. The Matter Standard Certificate Template can be assigned to an account by an account manager.

EST 401 response with supported authentication types

The EST enrollment and re-enrollment endpoints now return a detailed 401 Unauthorized response when credentials are missing. The response now lists supported authentication methods. For example, Basic and Client Authentication.

Configuration descriptions with hover tooltips and info panel

Configuration helper texts have been revamped to improve accessibility and clarity.

  • Hover tooltip: Descriptions now appear when hovering over a question mark icon next to configuration labels.

  • Info panel: For longer descriptions, an additional info (i) icon opens a right-side panel displaying the full text.

  • Documentation link: When available, a Learn More link directs you to the relevant documentation on docs.digicert.com.

The following pages and wizards have been updated with these changes: Register many devices wizard, Certificates list page, Request single device certificate, Request single certificate, Certificate management policy wizard.

Create division wizard

The division creation wizard now allows you to configure primary and secondary Rendezvous Zones during division creation. This improvement simplifies the setup process and enhances division configuration flexibility.

Authentication policy validation in certificate management policy wizard

The Certificate management policy wizard now enforces an Authentication policy selection during the initial configuration step.

  • When choosing EST, SCEP, or CMPv2 with the Essential plan, you must select an Authentication Policy. This validation step prevents progression until a policy is chosen to reduce configuration errors.

Editable authentication policy in certificate management policies

You can now update the assigned Authentication policy directly within the Certificate management policy details.

  • An edit icon has been added to allow removal or change of the current Authentication Policy. This change provides greater flexibility in managing certificate policies.

API and backend performance improvements

Added several improvements to API reference material, calls, and handling.

  • Refined error codes and messages for a more user-friendly experience.

  • Updated validation rules (for example, ensuring UUID formats) and filtering logic for data consistency.

  • Enhanced Swagger documentation and API helpers to ensure clarity and reliability in data processing.

Localization and internationalization updates
  • Updated both frontend and backend i18n property files.

  • Added additional translations to ensure consistent language support across the platform.

Check for certificate expiry during PAT p12 upload

The Rendezvous service now validates the signing certificate (p12 file) during PAT uploads.

  • Certificate validity verification: The service checks the certificate’s validity period before accepting the upload.

  • Improved security: Expired or not-yet-valid certificates are rejected, ensuring only valid credentials are used.

Fixes

Correct event ordering for connected/disconnected events

The ordering of Connected and Disconnected events has been corrected by updating the timestamp precision.

  • Millisecond precision: The Kafka message for the Connected event now includes millisecond details.

  • Accurate display: Events are shown in the proper sequence on the UI even when they occur within the same second.

MQTT-to-Kafka mapping for certificate renewal requests

The MQTT-to-Kafka transformer has been updated to correctly route certificate renewal messages:

  • Messages with mode: "certificate_policy_renew_request" are now forwarded to the devicetrust_certificatepolicyrenewrequest_v1 Kafka topic.

November 6, 2024

DigiCert® Device Trust Manager now available

We are excited to announce the launch of Device Trust Manager, a comprehensive solution for managing and securing IoT devices at scale.

Device Trust Manager is designed to streamline certificate management, provisioning, and device authentication, providing robust lifecycle management for connected devices.

Key highlights of Device Trust Manager
  • Comprehensive Device Management: Centralized interface for secure registration, monitoring, and management of IoT devices.

  • Automated Certificate Lifecycle: Automates the issuance, renewal, and revocation of device certificates, ensuring continuous trust and compliance.

  • Role-Based Access Control (RBAC): Assign roles such as Solution Administrator, Device Creator, and Artifact Manager to control permissions and enhance security.

  • Batch Device Registration: Support for registering multiple devices at once, simplifying onboarding processes.

  • Flexible Keypair Generation: Choose between DigiCert® ONE-generated keys or user-provided CSRs for seamless integration into various deployment models.

  • Secure Artifact Management: Develop and deploy software updates through structured artifact and release management.

  • Integration with DigiCert® ONE platform: Provides seamless interaction with other DigiCert​​®​​ services, enabling unified certificate management across devices and infrastructure.

With Device Trust Manager, organizations can build a secure IoT ecosystem by managing device identities and ensuring trusted connections throughout their lifecycles. To get started, see the Device Trust Manager Get Started guide for setup instructions and usage tips.

For additional details, visit our Device Trust Manager documentation.