DigiCert® ONE version: 1.6392.5 | CA Services: 1.630.0
This functionality now mirrors the UI.
DigiCert ONE managers now get additional information about an escrow key when using the GET /hsm/partition API endpoint.
‘Enabled’ is now the common term for active registered partitions, and status boxes all render the same.
The link now goes to the proper edit page
A bug had blocked changing default partitions, this is now fixed.
The partition designated as the default escrow partition is always available to all users.
DigiCert® ONE version: 1.6392.4 | CA Services: 1.622.0
Roots and ICAs now may be “Disabled” - which suspends any issuance, signing or CRLs and OCSP Responses or other use of the certificate until and unless it is reenabled. Disabled CA certificates show “Disabled” status in the Root or ICA table, and do not appear in dropdown menus.
To disable or reenable a CA, select the option from the 3 dot button on that certificate’s detail page.
ICAs now may be “Revoked”—this option is selected from the 3 dot button on that certificate's details page.
Revoking is a two-person effort, one admin requests the revocation, supplies the appropriate reason code and any details, and selects an approver. The approver will receive an email with the revocation request and a link. They then can approve or deny the request.
Only private trust CAs revoked with the reason “On Hold” can later be un-revoked. Otherwise the revoke is permanent.
Nota
To prevent the system from signing OCSP, CRL or using the revoked CA, the CA will also be disabled as part of the process.
CA services now supports the full range of qualified statements for use in end-entity certificates
[On-premises only] Additionally, end-entity templates, following ETSI requirements, exist to support issuance of Qualified Natural Persons and Qualified Legal Persons certificates. OCSP utilizes ArchiveCutoff
(with the date set to the parent CA’s notBefore
date), and CRLs are full-and-complete. The ExpiredCertsOnCRL
extension options (see below) is also an option.
CA revocation results in all child certificates, subordinate CA and End-entities, to be revoked; after which a final CRL is published and then the CA is revoked. As noted above revoking a CA is a request and approval process.
Nota
These templates follow ETSI guidelines, but are only Qualified-compliant subject to the on-premises customer passing ETSI audit to function as a QTSP.
[On-premises only] Private and Qualified trust certificate CRLs now may optionally use the CRL extension ExpiredCertonCRL
, that retains the status of certificates for selected durations after they expire. Both Partition scope CRLS and full-and-complete CRLs support this extension. In this first release, the option must be selected during CA creation, from the CRL settings by selecting the checkbox “Include revoked certificates in this CA's CRL even after they expire”
Nota
Use of this extension may result in very large CRLs and impact performance.
DigiCert® ONE version: 1.6392.1 | CA Manager: 1.617.0
Starting November 1, 2023, at 18:00 MDT (November 2, 2023, at 00:00 UTC), we will require all DigiCert ONE accounts to use two-factor authentication (2FA).
You will use both your credentials and a one-time password to access your account. When you log in to your DigiCert ONE account on November 1, you will be prompted to set up two-factor authentication. If you have already enabled two-factor authentication in Account Manager before this date, no further action is necessary.
How to enable two-factor authentication in Account Manager.
Nota
If you use single sign-on (SSO) to access your DigiCert ONE account, the new two-factor authentication requirement does not affect you. However, the requirement will activate if you modify your SSO settings.
Partition detail page now includes the ability to adjust the security level setting, providing more direct access for editing these configurations.
After updating the AIA using a .P7C file, the audit log will now correctly display the associated filename.
UI has been corrected to remove the option to disable an already disabled master escrow key, eliminating the previous redundancy.
The HSM section currently shows the Remote Proxy menu due to ongoing development. It is not intended for general use at this stage. Expect further updates for its full integration.
DigiCert® ONE version: 1.6201.3 | CA Manager: 1.613.0
CA services now allows multiple HSM partitions to provide key escrow services—though you should designate one as a fallback/default. Additional improvements have been made to facilitate key escrow activities and information
HSM partitions designated for escrow also should indicate their level of relative security so that escrow requests from managers can ensure the right HSM is used for escrow needs.
The security levels run from 1 to 3, from lowest to the highest at 3.
1 indicates low security (for example SoftHSM) and 3 (for FIPS-certified HSMs; though not necessarily enabled, such as Luna 7 HSMs).
2 indicates somewhere in between, and would be decided by the customer for their dedicated or on-premises HSMs. All DigiCert attached Lunas are set to 3.
Managers may call CA services to obtain information about an escrow key—such as it’s expiry and the security level of the partition that houses it.
When creating escrow keys, an expiry date may be set so that they are deleted to clear room.
Manager now may delete unused escrow keys directly.
DigiCert® ONE version: 1.6201.2 | CA Manager: 1.609.0
Pre-work to support qualified trust certificate issuance by on-premises QTSPs, ensures CRLs created for such certificates be full and complete.
Corrected a problem where updating a request also set that date as the created date. The created date is now preserved.
DigiCert® ONE version: 1.6201.1 | CA Manager: 1.606.0
You can now reject or delete offline requests, which returns any allocated keypair to the public pool.
DigiCert ONE version: 1.6074.9 | DigiCert® CA Manager 1.600.0
Corrected an issue where the LEI certificate extension could not be set to “Optional”.
Corrected an error in the API that allowed a revoked cert to have it’s revocation date moved forward. Now only backdating is allowed for public certificates.
DigiCert® ONE version: 1.6074.7 | CA Manager: 1.600.0
End-entity certificates may now be issued containing Qualified statements. Additional backend work has been prepared to allow issuance of ETSI-compliant certificates and lifecycle management to come in future releases.
DigiCert® ONE version: 1.6074.4 | CA Manager: 1.596.0
Updated user experience to improve accessibility.
Fixed bugs that were affecting HSM connectivity.
DigiCert® ONE version: 1.5428.8 | CA Manager: 1.573.0
DigiCert ONE managers, such as Trust Lifecycle Manager and IOT Trust Manager, now support custom certificate extensions using JSON-based ASN.1 templating. This removes additional steps for certain workflows.
Revocation is enabled for GlobalPlatform certificates through IOT Trust Manager.
Fixed an issued where creating a CA with pathLen configured resulted in error.
Fixed an issue where no partitions showed as available after a DPoD had been initialized.
The list of the actions available to filter is now shows all actions, instead of a random subset of all actions.
Fixed an issue where, when editing the responder generation settings if Auto-generate OCSP responder certificates was deselected, the other elements remained modifiable. Those options are no longer modifiable when Auto-generate OCSP responder certificates is deselected.
DigiCert® version: 1.5118.6 | CA Manager: 1.555.1
OCSP (Online Certificate Status Protocol) domains now can be registered as HTTPS. Such domains will display with “(HTTPs)” suffixes from the dropdown menu. Domains still must be unique, so HTTP and HTTPS versions cannot both exist. At this time, only OCSP supports HTTPs.
When reviewing offline requests for ceremony, included EKUs from the selected template are now displayed below the Policy Extension OIDs (Object Identifiers).
If an active CRL (Certificate Revocation List) with a long file path was displayed, it would overflow to page details. Now it will indicate truncation and can be viewed in full on mouseover.
DigiCert® version: 1.4957.3 | CA Manager: 1.526.0
The read-view of the CRLDP settings now reflects the updated setting.
The logs for Hardware Security Module (HSM) partitions are now in common language.
Corrected issue with the API that prevented the display of a list of available admins from the assignment list.
Date picker no longer overlaps icon.
DigiCert® version: 1.4957.1 | CA Manager: 1.526.0
DigiCert® version: 1.4083.6 | CA Manager: 1.522.0
Added Renew option to upload the original certificate for recertification when creating an offline request.
Fixed a bug that caused errors when a CRL was changed from full and complete to a "lesser" scope. The interface now does not allow changes that will break the CRL and provides information alerting the requestor.
Breadcrumbs have been moved below the header.
A more useful error is returned when a user tries to create an identical escrowed key.
DigiCert® version: 1.4803.0 | CA Services: 1.516.0
SAN dnsName now supports up to 255 characters/octets.
The country code is now optional within private SANs.
Including the IssuerAtlernativeName is no longer dependent on the SAN extension having a DirectoryName.
Various different minor accessibility improvements were added.
Updated icons and names to reflect current branding for DigiCert ONE® services.
CA Manager now allows importing OCSP responders in p12 format.