DIGICERT 2022 MAINTENANCE SCHEDULE
To make it easier to plan your certificate-related tasks, we scheduled our 2022 maintenance windows in advance. See DigiCert 2022 scheduled maintenance—this page is updated with all current maintenance schedule information.
With customers worldwide, we understand there is not a "best time" for everyone. However, after reviewing the data on customer usage, we selected times that would impact the fewest amount of our customers.
About our maintenance schedule
If you need more information regarding these maintenance windows, contact your account manager or DigiCert support team.
CertCentral Services API: Improved Order info API response
Update: To give API consumers more time to evaluate the impact of the Order info API response changes on their integrations, we are postponing this update until May 31, 2022. We originally planned to release the changes described below on April 25, 2022.
On May 31, 2022, DigiCert will make the following improvements to the Order info API. These changes remove unused values and update the data structure of the order details object to be more consistent for orders in different states across product types.
For more information and response examples for public TLS, code signing, document signing, and Class 1 S/MIME certificates, see the reference documentation for the Order info endpoint.
If you have questions or need help with these changes, contact your account representative or DigiCert Support.
Need to test your API integration?
To help CertCentral Services API consumers evaluate the impact of these changes, DigiCert is providing a beta server for API consumers to test their integrations prior to the May 31, 2022 release. To learn more, see our knowledge base article: DigiCert CertCentral Services API beta server.
General enhancements
The following changes apply to orders for various certificate types irrespective of order status.
Removed parameters:
public_id
(string)public_id
parameter. DigiCert no longer supports the Express Install workflow that required a public_id
value.certificate.ca_cert_id
(string)ca_cert_id
parameter. The value of this parameter is an internal ID for the issuing ICA certificate and cannot be used externally. The API already excludes the ca_cert_id
parameter from the order details for other product types.ca_cert
object instead.verified_contacts
(array of objects)verified_contacts
array. The API already excludes the verified_contacts
array from the order details for other product types.certificate.dns_names
(array of strings)dns_names
array.dns_names
array with an empty string: [" "]
certificate.organization_units
(array of strings)organization_units
array.organization_units
array with an empty string: [" "]
certificate.cert_validity
cert_validity
object, the API will only return a key/value pair for the unit used to set the certificate validity period when the order was created. For example, if the validity period of the certificate is for 1 year, the cert_validity
object will return a years
parameter with a value of 1.cert_validity
object sometimes returned values for both days
and years
.Added parameters:
order_validity
(object)order_validity
object.order_validity
object returns the days
, years
, or custom_expiration_date
for the order validity period. The API already includes an order_validity
object in the order details for public SSL/TLS products.payment_profile
(object)payment_profile
object. The API already includes a payment_profile
object in the order details for other product types.server_licenses
For DV certificate orders, the API will start returning the server_licenses
parameter. The API already includes the server_licenses
parameter in the order details for other product types.Unapproved order requests
The following changes apply only to certificate order requests that are pending approval or that have been rejected. These changes bring the data structure of the response closer to what the API returns after the request is approved and the order is submitted to DigiCert for validation and issuance.
To manage unapproved and rejected requests, we recommend using the Request endpoints (/request
) instead of retrieving the order details. We designed the /request
endpoints to manage pending and rejected certificate order requests, and these endpoints remain unchanged.
Note: For quicker certificate issuance, we recommend using a workflow that skips or omits the request approval step for new certificate orders. If your API workflow already skips or omits the approval step, you can safely ignore the changes below. Learn more about removing the approval step:
Added parameters:
disable_ct
(boolean)allow_duplicates
(boolean)cs_provisioning_method
(string)Removed parameters:
server_licenses
(integer)server_licenses
parameter. The API will continue including the server_licenses
parameter in order details for approved order requests.Improved organization
object
To provide a consistent data structure in the order details for unapproved and approved order requests, the API will return a modified organization
object on unapproved order requests for some product types.
The API will stop returning the following unexpected properties on unapproved order requests for all product types:
organization.status
(string)organization.is_hidden
(boolean)organization.organization_contact
(object)organization.technical_contact
(object)organization.contacts
(array of objects)The API will start returning the following expected properties, if existing, on unapproved order requests for all product types:
organization.name
(string)organization.display_name
(string)organization.assumed_name
(string)organization.city
(string)organization.country
(string)To get organization details not included in the Order info response, use the Organization info API endpoint.
CertCentral: Update organization and technical contacts from the organization's details page
We are happy to announce you can now manage your organization and technical contacts from your organization's details page. This new feature allows you to replace incorrect contacts anytime.
Note: Before, you could only view the existing organization and technical contacts when visiting the organization's details page. The only way to replace an organization or technical contact was when requesting a TLS certificate.
The next time you visit an organization's details page, you can update the organization contact and technical contact for the organization. After editing a contact, you will see the new contact information the next time you order a certificate that includes organization and technical contacts.
Items to note when replacing contacts:
See for yourself
Learn more:
CertCentral Services API: Update organization and technical contacts
To help you manage the organization and technical contacts for your organizations in your API integrations, we added the following endpoints to the CertCentral Services API:
Upcoming Schedule Maintenance
Update: There is no planned downtime during maintenance on May 7, MDT (May 8, UTC).
DigiCert will perform scheduled maintenance on May 7, 2022, between 22:00 – 24:00 MDT (May 8, 2022, between 04:00 – 06:00 UTC). Although we have redundancies to protect your services, some DigiCert services may be unavailable during this time.
What can I do?
Plan accordingly:
Services will be restored as soon as we complete the maintenance.
CertCentral Services API: Domain locking API endpoints
DigiCert is happy to announce our domain locking feature is now available in the CertCentral Services API.
Note: Before you can use the domain locking endpoints, you must first enable domain locking for your CertCentral account. See Domain locking – Enable domain locking for your account.
New API endpoints
Updated API endpoints
We updated the response for the Domain info and List domains endpoints to include the following parameters with domain lock details:
domain_locking_status
(string)account_token
(string)To learn more, see:
Upcoming Schedule Maintenance
DigiCert will perform scheduled maintenance on April 2, 2022, between 22:00 – 24:00 MDT (April 3, 2022, between 04:00 – 06:00 UTC). During this time, some services may be down for up to two hours.
Note: Maintenance will be one hour earlier for those who don't observe daylight savings.
Infrastructure-related maintenance downtime
We will start this infrastructure-related maintenance at 22:00 MDT (04:00 UTC). Then the services listed below may be down for up to two hours.
CertCentral® TLS certificate issuance:
CIS and CertCentral® SCEP:
Direct Cert Portal new domain and organization validation:
QuoVadis® TrustLink® certificate issuance:
PKI Platform 8 new domain and organization validation:
What can I do?
Plan accordingly:
Services will be restored as soon as we complete the maintenance.
CertCentral: DNS CNAME DCV method now available for DV certificate orders
In CertCentral and the CertCentral Services API, you can now use the DNS CNAME domain control validation (DCV) method to validate the domains on your DV certificate order.
Note: Before, you could only use the DNS CNAME DCV method to validate the domains on OV and EV certificate orders and when prevalidating domains.
To use the DNS CNAME DCV method on your DV certificate order:
Note: The AuthKey process for generating request tokens for immediate DV certificate issuance does not support the DNS CNAME DCV method. However, you can use the File Auth (http‑token) and DNS TXT (dns‑txt‑token) DCV methods. To learn more, visit DV certificate immediate issuance.
To learn more about using the DNS CNAME DCV method:
CertCentral Services API: Improved List domains endpoint response
To make it easier to find information about the domain control validation (DCV) status for domains in your CertCentral account, we added these response parameters to domain objects in the List domains API response:
dcv_approval_datetime
: Completion date and time of the most recent DCV check for the domain.last_submitted_datetime
: Date and time the domain was last submitted for validation.For more information, see the reference documentation for the List domains endpoint.
Upcoming Schedule Maintenance
DigiCert will perform scheduled maintenance on March 5, 2022, between 22:00 – 24:00 MST (March 6, 2022, between 05:00 – 07:00 UTC). During this time, some services may be down for up to two hours.
Infrastructure-related maintenance downtime
We will start this infrastructure-related maintenance at 22:00 MST (05:00 UTC). Then the services listed below may be down for up to two hours.
CertCentral™ TLS certificate issuance:
CIS and CertCentral™ SCEP:
Direct Cert Portal new domain and organization validation:
QuoVadis™ TrustLink™ certificate issuance:
PKI Platform 8 new domain and organization validation:
What can I do?
Plan accordingly:
Services will be restored as soon as we complete the maintenance.
CertCentral: Improved verified contact EV TLS certificate request approval process
In CertCentral and the CertCentral Services API, we updated the EV TLS certificate request process to only send the EV TLS request approval emails to the verified contacts you include on the certificate request.
Note: Before, when you requested an EV TLS certificate, we sent the EV order approval email to all the verified contacts for the organization.
Add verified contacts to an EV TLS certificate request:
organization.contacts
array of the JSON request. For verified contacts, the value of the contact_type
field is ev_approver
.To learn more about EV TLS certificate requests:
Upcoming Scheduled Maintenance
DigiCert will perform scheduled maintenance on February 12, 2022, between 22:00 – 24:00 MST (February 13, 2022, between 05:00 – 07:00 UTC). Although we have redundancies to protect your services, some DigiCert services may be unavailable during this time.
What can I do?
Plan accordingly:
Services will be restored as soon as we complete the maintenance.
Expanding Range of IP Addresses Used for DigiCert Services
As part of our scheduled maintenance on February 12, 2022, 22:00 – 24:00 MST (February 13, 2022, 05:00 - 07:00 UTC), DigiCert is expanding the range of IP addresses we use for our services. These additional IP addresses are part of our efforts to increase service uptime and reduce the need for service downtime during scheduled maintenance.
What do I need to do?
If your company uses allowlists*, update them to include the block of IP addresses listed below by February 12, 2022, to keep your DigiCert services and API integrations running as expected.
*Note: Allowlists are lists for firewalls that only allow specified IP addresses to perform certain tasks or connect to your system.
New range of IP addresses
Add this range of IP addresses to your allowlist: 216.168.240.0/20
Note: We are not replacing or removing any IP addresses. We are only expanding the range of IP Addresses we use to deliver our services.
Affected services:
For easy reference, see our knowledgebase article, Expanding Range of IP Addresses for DigiCert Services. If you have questions, please contact your account manager or DigiCert Support.
CertCentral Services API: Domain info enhancement
We updated the Domain info API response to include the expiration_date
parameter for the DCV token associated with the domain. Now, when you call the Domain info API and set the value of the include_dcv
query parameter to true, the dcv_token
object in the response includes the expiration_date
of the DCV token for the domain.
Improved Domains page, Validation status filter—Completed / Validated
On the Domains page, in the Validation status dropdown, we updated the Completed / Validated filter to make it easier to find domains with completed and active domain control validation (DCV).
Note: Before, when you searched for domains with Completed / Validated DCV, we returned all domains with completed DCV even if the domain validation had expired.
Now, when you search for domains with Completed / Validated DCV, we only return domains with completed and active DCV in your search results. To find domains with expired DCV, use the Expired filter in the Validation status dropdown.
Find domains with completed and active DCV
CertCentral Services API: List domains enhancement
For the List domains API, we updated the filters[validation]=completed
filter to make it easier to find domains validated for OV or EV certificate issuance.
Before, this filter returned all domains with completed DCV checks, even if the domain validation had expired. Now, the filter only returns domains with an active OV or EV domain validation status
Upcoming Scheduled Maintenance
DigiCert will perform scheduled maintenance on January 8, 2022, between 22:00 – 24:00 MST (January 9, 2022, between 05:00 – 07:00 UTC). Although we have redundancies to protect your service, some DigiCert services may be unavailable during this time.
What can I do?
Plan accordingly:
Services will be restored as soon as we complete the maintenance.
Para facilitar o planejamento das tarefas relacionadas ao certificado, agendamos a nossa janela de manutenção de 2021 com antecedência. Veja Manutenção agendada da DigiCert 2021 - esta página é mantida atualizada com todas as informações de agendamento de manutenções.
Com clientes de todo o mundo, entendemos que não há um melhor momento para todos. Contudo, após revisar os dados sobre uso de clientes, selecionamos horas que afetariam a menor quantidade dos nossos clientes.
Sobre a nossa agenda de manutenção
Se você precisar de mais informações sobre essas janelas de manutenção, entre em contato com o gerente da sua conta ou com a equipe de suporte DigiCert. Para obter atualizações ao vivo, assine a página Status da DigiCert.
CertCentral Report Library now available
We are happy to announce the CertCentral Report Library is now available for CertCentral Enterprise and CertCentral Partner.* The Report Library is a powerful reporting tool that allows you to download more than 1000 records at a time. Use the Report Library to build, schedule, organize, and export reports to share and reuse.
The Report Library includes six customizable reports: Orders, Organizations, Balance history, Audit log, Domains, and Fully qualified domain names (FQDN). When building reports, you control the details and information that appear in the report, configure the columns and column order, schedule how often you want the report to run (once, weekly, or monthly), and choose the report format (CSV, JSON, or Excel). In addition, you receive notices when the report is ready for download in your account.
To build your first report:
To learn more about building reports:
*Note: Don't see the Report Library in your account? Contact your account manager or our support team for help.
CertCentral Report Library API also available
We're pleased to announce the release of the CertCentral Report Library API! This new API service makes it possible to leverage key features of the Report Library in your CertCentral API integrations, including building reports and downloading report results*.
See our Report Library API documentation to learn more about including the Report Library in your API integrations.
*Note: To use the CertCentral Report Library API, Report Library must be enabled for your CertCentral account. For help activating the Report Library, contact your account manager or our support team.
Bugfix: Unique organization name check did not include assumed name
We updated our unique organization name check to include the assumed name (doing business as name) when creating an organization.
Before, in CertCentral and the CertCentral Services API, when you tried to create an organization with the same name as an existing organization, we returned an error and would not let you create the organization, even if the assumed name (DBA) was different.
Now, when you create an organization, we include the assumed name in the unique organization check. Therefore, you can create organizations with the same name, as long as each organization has a unique assumed name.
For example:
Creating organizations
In CertCentral and the CertCentral Services API, you can create an organization to submit for prevalidation or when you order a TLS/SSL certificate. This change applies to both processes.
CertCentral: DigiCert now issues client certificates from the DigiCert Assured ID Client CA G2 intermediate CA certificate
To remain compliant with industry standards, DigiCert had to replace the intermediate CA (ICA) certificate used to issue CertCentral client certificates.
CertCentral client certificate profiles that used the DigiCert SHA2 Assured ID CA intermediate CA certificate now use the DigiCert Assured ID Client CA G2 intermediate CA certificate. This change also changes the root certificate from DigiCert Assured ID Root CA to DigiCert Assured ID Root G2.
Old ICA and root certificates
New ICA and root certificates
For more information, see DigiCert ICA Update. To download a copy of the new intermediate CA certificate, see DigiCert Trusted Root Authority Certificates.
Do you still need your client certificate to chain to the DigiCert Assured ID Root CA certificate? Contact your account representative or DigiCert Support.
Upcoming Scheduled Maintenance
DigiCert will perform scheduled maintenance on December 4, 2021, between 22:00 – 24:00 MST (December 5, 2021, between 05:00 – 07:00 UTC). Although we have redundancies to protect your service, some DigiCert services may be unavailable during this time.
What can I do?
Plan accordingly:
Services will be restored as soon as we complete the maintenance.
Industry changes to file-based DCV (HTTP Practical Demonstration, file auth, file, HTTP token, and HTTP auth)
To comply with new industry standards for the file-based domain control validation (DCV) method, you can only use the file-based DCV to demonstrate control over fully qualified domain names (FQDNs), exactly as named.
To learn more about the industry change, see Domain validation policy changes in 2021.
How does this affect me?
As of November 16, 2021, you must use one of the other supported DCV methods, such as Email, DNS TXT, and CNAME, to:
To learn more about the supported DCV method for DV, OV, and EV certificate requests:
CertCentral: Pending certificate requests and domain prevalidation using file-based DCV
Pending certificate request
If you have a pending certificate request with incomplete file-based DCV checks, you may need to switch DCV methods* or use the file-based DCV method to demonstrate control over every fully qualified domain name, exactly as named, on the request.
*Note: For certificate requests with incomplete file-based DCV checks for wildcard domains, you must use a different DCV method.
To learn more about the supported DCV methods for DV, OV, and EV certificate requests:
Domain prevalidation
If you plan to use the file-based DCV method to prevalidate an entire domain or entire subdomain, you must use a different DCV method.
To learn more about the supported DCV methods for domain prevalidation, see Supported domain control validation (DCV) methods for domain prevalidation.
CertCentral Services API
If you use the CertCentral Services API to order certificates or submit domains for prevalidation using file-based DCV (http-token), this change may affect your API integrations. To learn more, visit File-based domain control validation (http-token).
Upcoming Schedule Maintenance
DigiCert will perform scheduled maintenance on November 6, 2021, between 22:00 – 24:00 MDT (November 7, 2021, between 04:00 – 06:00 UTC).
CertCentral infrastructure-related maintenance downtime
We will start this infrastructure-related maintenance between 22:00 and 22:10 MDT (04:00 and 04:10 UTC). Then, for approximately 30 minutes, the following services will be down:
DV certificate issuance for CertCentral, ACME, and ACME agent automation
CIS and SCEP
QuoVadis TrustLink certificate issuance
This maintenance only affects DV certificate issuance, CIS, SCEP, and TrustLink certificate issuance. It does not affect any other DigiCert platforms or services .
PKI Platform 8 maintenance
We will start the PKI Platform 8 maintenance at 22:00 MDT (04:00 UTC). Then, for approximately 30 minutes, the PKI Platform 8 will experience service delays and performance degradation that affect:
Additionally:
The PKI Platform 8 maintenance only affects PKI Platform 8. It does not affect any other DigiCert platforms or services.
Plan accordingly:
Services will be restored as soon as we complete the maintenance.
Upcoming Schedule Maintenance
On October 2, 2021, between 22:00 – 24:00 MDT (October 3, 2021, between 04:00 – 06:00 UTC), DigiCert will perform scheduled maintenance.
CertCentral, CIS, SCEP, Direct Cert Portal, and DigiCert ONE maintenance
DigiCert will perform scheduled maintenance. Although we have redundancies to protect your service, some DigiCert services may be unavailable during this time.
What can I do?
Plan accordingly:
Services will be restored as soon as we complete the maintenance.
PKI Platform 8 maintenance and downtime:
DigiCert will perform scheduled maintenance on PKI Platform 8. During this time, the PKI Platform 8 and its corresponding APIs will be down for approximately 20 minutes.
We will start the PKI Platform 8 maintenance at 22:00 MDT (04:00 UTC).
Then, for approximately 20 minutes:
The PKI Platform 8 maintenance only affects PKI Platform 8. It does not affect any other DigiCert platforms or services.
What can I do?
Plan accordingly:
Services will be restored as soon as we complete the maintenance.
Upcoming Schedule Maintenance
On September 11, 2021, between 22:00 – 24:00 MDT (September 12, 2021, between 04:00 – 06:00 UTC), DigiCert will perform scheduled maintenance.
CertCentral, CIS, SCEP, Direct Cert Portal, and DigiCert ONE maintenance
DigiCert will perform scheduled maintenance. Although we have redundancies to protect your service, some DigiCert services may be unavailable during this time.
What can I do?
Plan accordingly:
Services will be restored as soon as we complete the maintenance.
PKI Platform 8 maintenance and downtime:
DigiCert will perform scheduled maintenance on PKI Platform 8. During this time, the PKI Platform 8 and its corresponding APIs will be down for approximately 60 minutes.
We will start the PKI Platform 8 maintenance at 22:00 MDT (04:00 UTC).
Then, for approximately 60 minutes:
The PKI Platform 8 maintenance only affects PKI Platform 8. It does not affect any other DigiCert platforms or services.
What can I do?
Plan accordingly:
Services will be restored as soon as we complete our maintenance.
CertCentral Services API: Get orders by alternative order ID
We created a new endpoint to make it easier to get certificate order details using alternative order IDs: Get orders by alternative order ID. This endpoint returns the order ID, certificate ID, and order status of certificate orders with the alternative_order_id
you provide in the URL path.
Verified Mark Certificates available now.
Verified Mark Certificates (VMCs) are a new type of certificate that allow companies to place a certified brand logo next to the “sender” field in customer inboxes—visible before the message is opened—acting as confirmation of your domain’s DMARC status and your organization’s authenticated identity. Learn more about VMC certificates.
To disable or change availability of VMC in your account, visit the Product Settings page.
Note: If you do not see VMCs in your account, it may be because we are not offering the product to all account types yet. It is also possible that the product is available, but one of your CertCentral account’s administrators turned the product off in Product Settings.
CertCentral Services API: Verified Mark Certificate enhancements
To help you manage your Verified Mark Certificate (VMC) orders in your API integrations, we’ve made the following updates to the CertCentral Services API.
New endpoints:
Updated endpoints:
To learn more about managing VMC certificates from your API integrations, visit Verified Mark Certificate workflow.
Upcoming schedule maintenance
On July 10, 2021, between 22:00 – 24:00 MDT (July 11, 2021, between 04:00 – 06:00 UTC), DigiCert will perform scheduled maintenance.
During maintenance, for approximately 60 minutes, the services specified below under Service downtime will be down. Due to the scope of the maintenance, the services specified below under Service interruptions may experience brief interruptions during a 10-minute window.
Service downtime
From 22:00 – 23:00 MDT (04:00 – 05:00 UTC), while we perform database-related maintenance, the following services will be down for up to 60 minutes:
API Note: Affected APIs will return “cannot connect” errors. Certificate-related API requests that return a “cannot connect” error message during this window will need to be placed again after services are restored.
Service interruptions
During a 10-minute window, while we perform infrastructure maintenance, the following DigiCert service may experience brief service interruptions:
Services not affected
These services are not affected by the maintenance activities:
What can I do?
Plan accordingly:
Services will be restored as soon as the maintenance is completed.
Upcoming scheduled maintenance
On June 5, 2021, between 22:00 – 24:00 MDT (June 6, 2021, between 04:00 – 06:00 UTC), DigiCert will perform scheduled maintenance. Although we have redundancies to protect your service, some DigiCert services may be unavailable during this time.
What can I do?
Plan accordingly:
Services will be restored as soon as we complete the maintenance.
CertCentral Services API: Improved domains array in OV/EV order response
To make it easier to see how the Services API groups the domains on your OV/EV TLS certificate orders for validation, we added a new response parameter to the endpoints for submitting certificate order requests: domains[].dns_name
.*
The dns_name
parameter returns the common name or SAN of the domain on the order. To prove you control this domain, you must have an active validation for the domain associated with the domains[].name
and domains[].id
key/value pairs.
Example OV certificate order
JSON payload:
JSON response:
The Services API returns the domains[].dns_name
parameter in the JSON response for the following endpoints:
*Note: Only order requests for OV/EV TLS certificates return a domains
array.
Upcoming scheduled maintenance
On May 1, 2021, between 22:00 – 24:00 MDT (May 2, 2021, between 04:00 – 06:00 UTC), DigiCert will perform scheduled maintenance.
For up to 10 minutes total during the 2-hour window, we will be unable to issue certificates for the DigiCert platforms, their corresponding APIs, immediate certificate issuance, and those using the APIs for other automated tasks.
Affected services:
Services not affected
API note:
What can I do?
Plan accordingly:
Services will be restored as soon as we complete the maintenance.
CertCentral Services API: Domain validation status in Domain info response
To make it easier to get a comprehensive validation status for your domains, DigiCert is deprecating the status
parameter in the Domain info response. To ensure you are getting complete and accurate status information for each different validation type on your domains, you should use the validations
array when you call the Domain info endpoint from your API integrations instead.
Note: The Domain info endpoint will continue to return a status
parameter value.
Background
In the Domain info response, the status
parameter is designed to return a single string value. When DigiCert offered fewer products, a single value in the API was enough to represent the validation status for your domains.
Now, DigiCert offers certificate products that use many different types of validation. Different validation types have different requirements, and these requirements change as industry standards evolve. As DigiCert validates your domains for different types of certificate issuance, each type of validation that you request can be in a different state.
For example:
As a result, DigiCert can no longer use a single value to return comprehensive information about the validation status for a domain.
Instead of relying on a single value, use the Domain info endpoint to request a validations
array – a list of objects with status information for each type of validation on the domain. To get this data, include the query parameter include_validation=true
when you submit your request.
For example:
CertCentral Services API: Site seal enhancements
To help you manage your site seals in your API integrations, we’ve made the following updates to the CertCentral Services API:
Related topics:
CertCentral Services API: Revoke certificate by serial number
To make it easier to manage certificates from your API integrations, we updated the Revoke certificate endpoint path to accept the certificate ID or the serial number of the certificate to revoke. Previously, the Revoke certificate endpoint path only accepted the certificate ID.
Example Revoke certificate path using the certificate ID:
https://www.digicert.com/services/v2/certificate/{{certificate_id}}/revoke
Example Revoke certificate path using the certificate serial number:
https://www.digicert.com/services/v2/certificate/{{serial_number}}/revoke
Upcoming scheduled maintenance
On April 3, 2021, between 22:00 – 24:00 MDT (April 4, 2021, between 04:00 – 06:00 UTC), DigiCert will perform scheduled maintenance.
During maintenance, for up to 10 minutes, we will be unable to issue certificates for the DigiCert platforms, their corresponding APIs, immediate certificate issuance, and those using the APIs for other automated tasks.
Affected services
For approximately 10 minutes, DigiCert will be unable to issue certificates for these services and APIs:
Services not affected
These services are not affected by the maintenance activities:
API note:
What can I do?
Plan accordingly:
Services will be restored as soon as we complete the maintenance.
CertCentral: New purchase order and invoice system
We are happy to announce that we are using a new purchase order and invoice system in CertCentral. We've made several changes to make it easier for you to manage your purchase orders and invoices.
The next time you sign in to CertCentral, you will see two new menu options under Finances: Pay Invoice and Purchase Orders and Invoices. Additionally, we now send all invoice emails from our new invoice system.
Pay invoices page
When you open the Pay invoice page, all invoices are preselected by default. You can choose to pay them all or select those you want to pay.
Note: If you use divisions with separate funds, when you open the Pay invoice page, all invoices for the top-level division are selected by default. Use the For dropdown to view the unpaid invoices by division in your account.
Purchase orders and invoices page
On the new Purchase orders and invoices page, you can create a purchase order (PO). In the Purchaseorders table, you can view pending and rejected POs. After we approve a PO, it becomes an invoice and moves to the Invoices table.
Note: If you use divisions with separate funds, you see the Purchase order and invoice summary page. When you click a division name, it opens the Purchase order and invoices page, where you can view the POs and invoices for that division.
In the Invoices column of the Invoices table, you can see the invoice number and the PO from which we generated it. You can download a copy of the invoice or pay the invoice. When you click Pay invoice, we take you to the Pay invoice page to pay the invoice and make the funds available in your account.
Existing PO and Invoice migration
CertCentral Services API: View balance enhancements
To help you track financial data in your API integrations, we updated the View balance endpoint to return the following data:
unpaid_invoice_balance
negative_balance_limit
used_credit_from_other_containers
total_available_funds
Example response:
For more information, see the documentation for the View balance endpoint.
CertCentral Services API: Auto-reissue support for Multi-year Plans
We are happy to announce that the CertCentral Services API now supports automatic certificate reissue requests (auto-reissue) for Multi-year Plans. The auto-reissue feature makes it easier to maintain SSL/TLS coverage on your Multi-year Plans.
You can enable auto-reissue for individual orders in your CertCentral account. When auto-reissue is enabled, we automatically create and submit a certificate reissue request 30 days before the most recently issued certificate on the order expires.
Enable auto-reissue for a new order
To give you control over the auto-reissue setting for new Multi-year Plans, we added a new request parameter to the endpoints for ordering DV, OV, and EV TLS/SSL certificates: auto_reissue
.
By default, auto-reissue is disabled for all orders. To enable auto-reissue when you request a new Multi-year Plan, set the value of the auto_reissue
parameter to 1
in the body of your request.
Example request body:
Note: In new order requests, we ignore the auto_reissue
parameter if:
Update auto-reissue setting for existing orders
To give you control over the auto-reissue setting for existing Multi-year Plans, we added a new endpoint: Update auto-reissue settings. Use this endpoint to enable or disable the auto-reissue setting for an order.
Get auto-reissue setting for an existing order
To help you track the auto-reissue setting for existing certificate orders, we added a new response parameter to the Order info endpoint: auto_reissue
. The auto_reissue
parameter returns the current auto-reissue setting for the order.
ICA certificate chain selection for public DV flex certificates
We are happy to announce that select public DV certificates now support Intermediate CA certificate chain selection:
You can add a feature to your CertCentral account that enables you to control which DigiCert ICA certificate chain issues the end-entity certificate when you order these public DV products.
This feature allows you to:
Configure ICA certificate chain selection
To enable ICA selection for your account:
For more information and step-by-step instructions, see the Configure the ICA certificate chain feature for your public TLS certificates.
DigiCert Services API: DV certificate support for ICA certificate chain selection
In the DigiCert Services API, we made the following updates to support ICA selection in your DV certificate order requests:
Pass in the issuing ICA certificate's ID as the value for the ca_cert_id parameter in your order request's body.
Example DV certificate request:
For more information about using ICA selection in your API integrations, see DV certificate lifecycle – Optional ICA selection.
Upcoming scheduled maintenance
On March 6, 2021, between 22:00 – 24:00 MST (March 7, 2021, between 05:00 – 07:00 UTC), DigiCert will perform scheduled maintenance.
Although we have redundancies in place to protect your service, some DigiCert services may be unavailable during this time.
What can you do?
Please plan accordingly.
Services will be restored as soon as the maintenance is completed.
CertCentral Services API: Novos terminais de subconta
Para facilitar o gerenciamento de suas subcontas, adicionamos dois novos pontos de extremidade à API CertCentral Services: Listar domínios de subconta e Organizações de subconta da lista.
CertCentral Services API: Criação de terminal de subconta aprimorada
Para dar a você mais controle sobre suas subcontas, adicionamos dois novos parâmetros de solicitação ao terminal Criar subconta: child_name
e max_allowed_multi_year_plan_length
.
child_name
- Use este parâmetro para definir um nome de exibição personalizado para a subconta.max_allowed_multi_year_plan_length
- Use este parâmetro para personalizar a duração máxima dos pedidos do Plano plurianual para a subconta.Exemplo de solicitação JSON:
Depois de criar uma subconta, use o terminal Informações da subconta para visualizar o nome de "exibição" de uma subconta e a duração permitida do pedido do Plano Plurianual.
Próxima manutenção programada
Em 6 de fevereiro de 2021 entre 22:00 - 24:00 MST (7 de fevereiro de 2021 entre 05:00 - 07:00 UTC), O DigiCert fará a manutenção crítica.
Durante a manutenção, os serviços listados abaixo ficarão inativos por aproximadamente 60 minutos. No entanto, devido ao escopo de trabalho que está acontecendo, pode haver interrupções de serviço adicionais durante a janela de manutenção de duas horas.
Você não conseguirá fazer login nessas plataformas e acessar esses serviços e APIs:
A DigiCert não poderá emitir certificados para estes serviços e APIs:
Esses serviços não serão afetados pelas atividades de manutenção:
Nota API:
O que eu posso fazer?
Planeje de acordo:
Os serviços serão restaurados assim que a manutenção for concluída.
CertCentral Services API: Terminal de e-mails de domínio aprimorado
Para facilitar a localização dos endereços de e-mail DNS TXT que recebem e-mails de validação da DigiCert para validação de controle de domínio baseada em e-mail (DCV), adicionamos um novo parâmetro de resposta ao terminal de E-mails de domínio: dns_txt_emails
.
O parâmetro dns_txt_emails
retorna uma lista de endereços de e-mail encontrados no registro TXT do DNS do domínio. Esses são os endereços de e-mail que encontramos no registro TXT do DNS no subdomínio _validation-contactemail
do domínio que está sendo validado.
Exemplo de resposta com novo parâmetro:
Para saber mais sobre o novo e-mail compatível com o método de DCV de contato TXT de DNS:
Para obter informações sobre como validar os domínios em pedidos de certificados DV:
Para obter informações sobre como validar os domínios em pedidos de certificados OV/EV:
CertCentral Services API: Novos detalhes do pedido de unidade e cancelamento de terminais do pedido de unidade
Temos o prazer de anunciar que adicionamos dois novos endpoints à API CertCentral Services: Detalhes do pedido da unidade e Cancelar pedido da unidade.
Esses pontos de extremidade permitem obter informações sobre um pedido de unidade e cancelar um pedido de unidade.
Cancelando pedidos de unidades:
Se você gerencia uma subconta que usa unidades como forma de pagamento, agora pode usar a API de serviços para realizar as seguintes tarefas:
CertCentral Services API: Lista de produtos, limites de produtos e terminais de informações de produtos aprimorados
Para facilitar a localização dos períodos de validade do pedido disponíveis para os produtos de certificado digital em sua conta, adicionamos novos parâmetros de resposta à lista de produtos, limites do produto e endpoints de informações do produto.
Esses novos parâmetros de resposta permitem que você visualize os limites de validade do pedido padrão e personalizados para cada produto em sua conta.
O parâmetro allowed_order_validity_years
retorna uma lista dos períodos de validade do pedido com suporte para cada produto em sua conta.
Terminal de limites do produto
O parâmetro allowed_order_lifetimes
retorna uma lista de limites de validade de pedido personalizados para usuários com diferentes divisões e atribuições de função de usuário em sua conta.
Terminal de informações do produto
allowed_order_validity_years
retorna uma lista dos períodos de validade do pedido que estão disponíveis quando você solicita o produto de certificado.custom_order_expiration_date_allowed
retorna um valor booleano que descreve se você pode definir uma data de expiração de pedido personalizado ao solicitar o produto de certificado.CertCentral Services API: Terminal de informações de pedido de subconta aprimorado
Para facilitar a localização de informações sobre os períodos de validade para pedidos de subconta, adicionamos novos parâmetros de resposta ao terminal de Informações de pedido de subconta. Esses novos parâmetros de resposta permitem que você veja a data de início do pedido, a data de término do pedido e se o pedido é um plano plurianual.
is_multi_year_plan
retorna "1"
se o pedido for um plano plurianual.order_valid_from
retorna a data de início do período de validade do pedido.order_valid_till
retorna a data final do período de validade do pedido.Resposta de exemplo com novos parâmetros
Próxima manutenção programada
Em 9 de janeiro de 2021 entre 22:00 - 24:00 MST (10 de janeiro de 2021 entre 05:00 - 07:00 UTC), DigiCert fará a manutenção programada.
Embora tenhamos redundâncias para proteger o seu serviço, alguns serviços da DigiCert podem estar indisponíveis durante este tempo.
O que você pode fazer?
Planeje de acordo.
Os serviços serão restaurados assim que a manutenção for concluída.
CertCentral Services API: Atualizar as configurações de notificação de renovação
Adicionamos um novo endpoint ao contrato de API CertCentral Services: Atualizar as configurações de notificação de renovação. Use este terminal para habilitar ou desabilitar notificações de renovação para um pedido de certificado.
Para obter mais informações, visite o tópico de referência para este endpoint na documentação da API de serviços:
Personalize a vida útil do seu plano plurianual da DigiCert
Temos o prazer de anunciar que agora você pode configurar uma vida útil personalizada para seu Plano Plurianual (MyP) ao solicitar um certificado TLS no CertCentral. Nos formulários de solicitação de certificado TLS, use a nova opção Validade de pedido personalizado para personalizar a duração do seu pedido de certificado TLS.
Observação: A validade máxima do certificado TLS é de 397 dias de acordo com as práticas recomendadas do setor. Consulte Certificados SSL/TLS públicos de fim de 2 anos.
As durações dos pedidos do plano plurianual personalizado podem ser definidas em dias ou por data de vencimento. A duração máxima do pedido é de 2190 dias (6 anos). A duração mínima do pedido é de 7 dias.
Observação: Os pedidos personalizados começam no dia em que emitimos o certificado do pedido. O preço do pedido é rateado para corresponder ao certificado selecionado e ao comprimento do pedido personalizado.
Para personalizar sua cobertura MyP
Configurações de produto atualizadas para certificados TLS públicos
Para fornecer mais controle sobre o processo de pedido de seu certificado, atualizamos as configurações do produto para certificados TLS públicos. Agora, você pode determinar os comprimentos permitidos de pedido do Plano Plurianual que os usuários podem selecionar ao solicitar um certificado TLS público.
Na página de configurações do produto do certificado TLS, use a opção Períodos de validade permitidos para determinar quais comprimentos de pedido MyP aparecem em um formulário de solicitação de certificado TLS: 1 ano, 2 anos, 3 anos, 4 anos, 5 anos e 6 anos. Observe que as alterações feitas nas configurações do produto se aplicam às solicitações feitas por meio do CertCentral e da API de serviços.
Observação: Anteriormente, a opção Períodos de validade permitidos era usada para determinar a vida útil máxima do certificado que um usuário poderia selecionar ao solicitar um certificado TLS público. No entanto, com a mudança da indústria para o certificado de 1 ano, essa opção não é mais necessária para comprimentos de certificado. Consulte Certificados SSL/TLS públicos de fim de 2 anos.
Para configurar os comprimentos de pedido MyP permitidos para um certificado TLS
Na próxima vez que um usuário solicitar um certificado OV de Site Seguro, ele verá apenas as durações do período de validade que você selecionou no formulário de solicitação.
Observação: A definição de limites para comprimentos de pedidos de planos plurianuais remove a opção de validade personalizada de seus formulários de solicitação de certificado TLS.
Página de domínios da CertCentral: Relatório de domínios.csv aprimorado
Na página Domínios, aprimoramos o relatório CSV para facilitar o rastreamento das datas de expiração de validação de domínio OV e EV e para visualizar o método de validação de controle de domínio (DCV) usado anteriormente.
Na próxima vez que você baixar o arquivo CSV, você verá três novas colunas no relatório:
Para fazer download do relatório dominios.csv
Ao abrir o dominios.csv, você deverá ver as novas colunas e informações em seu relatório.
Página de pedidos do CertCentral: Tempo de carregamento aprimorado
No CertCentral, atualizamos a página Pedidos para melhorar os tempos de carregamento para quem gerencia grandes volumes de pedidos de certificados. Na próxima vez que você visitar a página Pedidos, ela abrirá muito mais rápido (no menu principal à esquerda, vá para Certificados > Pedidos).
Para melhorar o tempo de carregamento, mudamos a forma como filtramos seus pedidos de certificado na visualização da página inicial. Anteriormente, filtrávamos a página para mostrar apenas pedidos de certificados Ativos. No entanto, isso era problemático para aqueles com altos volumes de pedidos de certificados. Quanto mais pedidos você tiver em sua conta, mais tempo a página Pedidos demorará para abrir.
Agora, quando você visita a página, nós retornamos todos os seus certificados, não filtrados, em ordem decrescente com os pedidos de certificados criados mais recentemente aparecendo primeiro na lista. Para ver apenas seus certificados ativos, na lista suspensa Status, selecione Ativo e clique em Ir.
CertCentral Services API: Comprar unidades para subcontas e visualizar pedidos de unidades
Na API CertCentral Services, adicionamos novos pontos de extremidade para comprar unidades e visualizar pedidos de unidades. Agora, se você gerencia subcontas que usam unidades como método de pagamento para solicitações de certificado, pode usar a API de serviços para comprar mais unidades para uma subconta e obter informações sobre seu histórico de pedidos de unidades.
Para obter mais informações, consulte a documentação de referência para os novos endpoints:
CertCentral Services API: Atualizações de documentação
Temos o prazer de anunciar as seguintes atualizações na documentação da API CertCentral Services:
emergency_emails
à documentação do terminal Atualizar e-mails de conta. Use este parâmetro para atualizar os endereços de e-mail que recebem notificações de emergência da DigiCert.Exemplo Atualizar e-mails da conta corpo da solicitação:
validation_type
, allowed_ca_certs
, e parâmetros de resposta default_intermediate
para a documentação do terminal de Informações do produto.validation_type
para obter o tipo de validação para um determinado produto.allowed_ca_certs
para obter informações sobre os certificados ICA que você pode selecionar ao fazer o pedido de um determinado produto. *default_intermediate
para obter o ID do ICA padrão para um determinado produto. *Exemplo Informações do produto dados de resposta:
* Observação: O terminal Informações do produto retorna apenas os parâmetros allowed_ca_certs
e default_intermediates
para produtos que suportam a seleção ICA. Para certificados SSL públicos que suportam a seleção ICA (certificados OV e EV flex), esses parâmetros são retornados apenas se a seleção ICA estiver habilitada para a conta. Além disso, o parâmetro default_intermediates
só é retornado se um administrador personalizou uma configuração de produto para uma divisão ou função de usuário na conta. Para obter mais informações, consulte a opção de cadeia de certificados ICA para certificados OV e EV flex públicos.
CertCentral Services API: Adicionados tokens DCV para novos domínios aos dados de resposta para pedidos de certificados OV e EV
Atualizamos os endpoints para solicitar certificados públicos OV e EV SSL para retornar os tokens de solicitação de validação de controle de domínio (DCV) para novos domínios no pedido.
Agora, quando você solicita um certificado OV ou EV, não precisa mais emitir solicitações separadas para obter os tokens de solicitação DCV para os novos domínios no pedido. Em vez disso, você pode obter os tokens diretamente dos dados de resposta para a solicitação de pedido.
Dados de resposta de exemplo:
Observação: O objeto dcv_token
não é retornado para domínios que serão validados no escopo de outro domínio do pedido, para domínios já existentes em sua conta ou para subdomínios de domínios existentes.
Esta atualização se aplica aos seguintes endpoints:
Seleção de cadeia de certificados ICA para certificados OV e EV flex públicos
Temos o prazer de anunciar que os certificados públicos OV e EV com recursos flexíveis agora oferecem suporte à seleção de cadeia de certificados CA intermediários.
Você pode adicionar uma opção à sua conta CertCentral que permite controlar qual cadeia de certificados DigiCert ICA emite seus certificados OV e EV "flex" públicos.
Esta opção permite que você:
Configurar a seleção da cadeia de certificados ICA
Para habilitar a seleção ICA para sua conta, entre em contato com seu gerente de conta ou nossa Equipe de suporte. Em seguida, em sua conta do CertCentral, na página Configurações do produto (no menu principal à esquerda, vá para Configurações > Configurações do produto), configure os intermediários padrão e permitidos para cada tipo de certificado flexível OV e EV.
Para obter mais informações e instruções passo a passo, consulte a Opção de cadeia de certificados ICA para certificados OV e EV flex públicos.
Suporte de API DigiCert Services para seleção de cadeia de certificados ICA
Na API DigiCert Services, fizemos as seguintes atualizações para oferecer suporte à seleção ICA em suas integrações de API:
ca_cert_id
no corpo da sua solicitação de pedidoExemplo de solicitação de certificado flexível:
Para obter mais informações sobre como usar a seleção ICA em suas integrações de API, consulte Ciclo de vida do certificado OV/EV - (Opcional) Seleção ICA.
Planos plurianuais DigiCert® disponíveis para todos os certificados SSL/TLS públicos da DigiCert
Temos o prazer de anunciar que os Planos Plurianuais agora estão disponíveis para todos os certificados SSL/TLS públicos no CertCentral. Esses planos permitem que você pague um único preço com desconto por até seis anos de cobertura de certificado SSL/TLS.
Observação: Os contratos Enterprise License Agreement (ELA) suportam apenas Planos Plurianuais de 1 e 2 anos. Os Contratos de taxa fixa não oferecem suporte a planos plurianuais. Se você tiver um contrato de taxa fixa, entre em contato com o gerente da sua conta para encontrar uma solução que funcione com o seu contrato.
Com Planos Plurianuais, você escolhe o certificado SSL/TLS, a duração da cobertura desejada (até seis anos) e a validade do certificado. Até que o plano expire, você emite novamente seu certificado sem nenhum custo cada vez que ele atinge o final de seu período de validade. Para obter mais informações, consulte Planos plurianuais.
API de serviços da DigiCert muda para oferecer suporte a planos plurianuais
Em nossa API de serviços, atualizamos nossos terminais de certificados SSL/TLS públicos para oferecer suporte ao pedido de um certificado com um plano plurianual.
Para cada terminal para solicitar um certificado SSL/TLS público, adicionamos novos parâmetros de solicitação opcionais*. Além disso, atualizamos esses pontos de extremidade para que o período de validade do seu pedido não corresponda mais ao período de validade do seu certificado.
*Nota: As solicitações devem incluir um valor para o objeto order_validity ou para um dos parâmetros de validade do pedido de nível superior: validity_years, validity_days, ou custom_expiration_date. Os valores fornecidos no objeto order_validity substituem os parâmetros de validade de nível superior.
Essas mudanças não devem afetar suas integrações atuais. No entanto, para maximizar sua cobertura SSL/TLS, você pode querer começar a comprar seus certificados SSL/TLS públicos com um plano plurianual. Para integrações de API, consulte Plano plurianual de pedido.
Exemplo de solicitação de certificado com novos parâmetros