筛选方式: discovery x 清除
new

Discovery: Account setting for discovered certificate renewal notifications

In Discovery, we added a new account setting, Turn on discovered certificate renewal notifications, enabling you to receive renewal notifications for your expiring "discovered" SSL/TLS certificates. These renewal notifications include the option to renew your SSL/TLS certificate with us. When renewing a "discovered" SSL/TLS certificate in CertCentral, we'll replace it with an equivalent DigiCert certificate.

By default, renewal notices for discovered certificates are turned off for a CertCentral account*. To start receiving renewal notices for your expiring discovered certificates, go to Settings > Preferences. In the Certificate Renewal Settings section, check Turn on discovered certificate renewal notifications.

*Note: With the roll out of this new setting, you may need to turn Discovery renewal notifications back on for your account.

To learn more, see Discovery renewal notices.

十二月 10, 2019

new

Discovery Cloud-scan service

We've added a new feature to Discovery—Cloud-scan service—that uses a cloud-based sensor to find your public facing SSL/TLS certificates regardless of issuing Certificate Authority (CA).

Discovery Cloud-scan is a free cloud service so there is nothing to install or manage. You can start scanning immediately to find your public SSL/TLS certificates. There is no limit to the number of cloud-based scans you can run.

Cloud-scan runs every 24 hours and use the most recently saved scan configuration. Cloud-scan provides detailed information about the certificates found and the endpoints where those certificates are installed.

Note: This is the open beta for the Cloud-scan service.

To get started, in the left main menu, go to Discovery > Manage Discovery. On the Manage scans page, click Single cloud scan. To learn more, see Discovery Cloud-scan service.

十一月 21, 2019

new

Discovery: Renewal notifications for non-DigiCert SSL/TLS certificates

In Discovery, we added renewal notifications for non-DigiCert certificates, making it easier to manage all your SSL/TLS certificates in one place—CertCentral. Now, when Discovery finds non-DigiCert certificates, we'll send renewal notifications for these certificates regardless of issuing Certificate Authority (CA).

Note: When renewing a non-DigiCert SSL/TLS certificate in CertCentral, we'll replace it with the equivalent DigiCert certificate. For example, we'll replace a non-DigiCert single-domain SSL certificate with a DigiCert single-domain SSL certificate.

Who receives these renewal notifications?

By default, Discovery sends renewal notifications for non-DigiCert SSL/TLS certificates to the primary CertCentral administrator—the individual who created the account and receives all account notifications.

We also send renewal notifications to any additional email addresses assigned to receive account notifications. See Set up account email notifications and Certificate renewal notifications.

When are these renewal notifications sent?

Discovery uses your CertCentral renewal notification settings to determine when to send renewal notifications for non-DigiCert certificates. By default CertCentral sends renewal notifications 90, 60, 30, 7, and 3 days before a certificate expires and 7 days after a certificate expires.

To customize your renewal notifications schedule, see Certificate renewal notifications.

new

Discovery: Customize non-DigiCert SSL/TLS certificate renewal notification process

In Discovery, on the Certificates page, we added three new certificate renewal actions to the Actions column dropdown for non-DigiCert certificates: Disable renewal notices, Enable renewal notices, and Renewal notifications. Renewal notifications allows you to add email addresses to receive renewal notifications for a certificate.

On the Certificates page, you can now update your non-DigiCert certificate renewal process to fit your certificate needs. (In the left main menu, go to Discovery > View Results.)

Note: By default, Discovery sends renewal notifications for all discovered non-DigiCert SSL/TLS certificates.

To customize renewal notifications for non-DigiCert SSL/TLS certificates, see Discovery renewal notices.

十一月 8, 2019

new

We are happy to announce a new addition to the DigiCert Developers portal—Discovery API. We just published our first set of Discovery API endpoints. More will follow as we continue to build out the Discovery API documentation.

Why use it?

  • Access Discovery features without signing into your CertCentral account.
  • Customize the Discovery experience to meet the needs of your organization.
  • Integrate with your existing tools.

Sample of endpoints you can start using now:

Tips and Tricks

  • Discovery API uses this base URL: https://daas.digicert.com/apicontroller/v1/
  • Discovery API requires admin or manager level permissions.
new

In Discovery, we added a new feature—Add root and intermediate CAs—that lets you upload public and private root and intermediate CAs. Use this feature to get more accurate security ratings for certificates chained to them.

If Discovery is unable to locate the root and intermediate CAs for a certificate, it down grades the certificate's security rating. By uploading a copy of the certificate's intermediate and root CAs, the next time Discovery runs a scan that includes that certificate, you'll get a more accurate rating.

Note: Supported certificate formats: .der and .cer

In CertCentral, in the left main menu, click Discovery > Manage Discovery. On the Manage scans page, in the More actions dropdown, click Manage root and intermediate CAs. See Add public and private root and intermediate CAs in our Discovery user guide.

new

In Discovery, we added a new Blacklist feature that lets you exclude specific IP addresses and FQDNs from your scan results. For example, you may want to blacklist a domain in your CDN network.

Note: When you blacklist an IP address or FQDN, its information is excluded from all future account Discovery scans. This feature does not remove information from existing scan results.

In CertCentral, the left main menu, click Discovery > Manage Discovery. On the Manage scans page, in the More actions dropdown, click Manage blacklist. See Blacklist IP addresses and FQDNs in our Discovery user guide.

enhancement

In Discovery, we updated the Certificates page, adding a new action—Replace certificate—to the Actions dropdown. Now, from the Certificates page, you can replace any certificate with a DigiCert certificate regardless of issuing CA.

(In the sidebar menu, click Discovery > View Results. On the Certificates page, locate the Actions dropdown for the certificate you want to replace. Click Actions > Replace certificate.)

enhancement

In Discovery, we updated the Certificates by rating widget on the Discovery dashboard, making it easier to see the security ratings for your public SSL/TLS certificates (in the sidebar menu, click Discovery > Discovery Dashboard).

As part of the update, we renamed the widget: Certificates analyzed by security rating. Then, we split the chart on the widget into two charts: Public and Others. Now, you can use the Public | Others toggle switch on the widget to select the chart you want to see.

The Certificates analyzed by security rating - Public chart displays the ratings for your public SSL/TLS certificates only. The Certificates analyzed by security rating - Other chart displays the rating for all your other SSL/TLS certificates (e.g., private SSL certificates).

enhancement

In Discovery, we updated the Endpoints and Server details pages making it easier to see the correlation between the IP address and the hostname/FQDN scan it resulted from.

Now, when you configure a scan for a hostname/FQDN, and the scan's endpoint results return IP addresses, we include the hostname/FQDN from the scan with the IP address.

Update note: The hostname update is available in the latest sensor version – 3.7.10. After the sensors updates are completed, rerun scans to see the hostname/IP address correlation on your scan results.

new

In the DigiCert Services API, we added two new endpoints for ordering your Secure Site Pro certificates: Order Secure Site Pro SSL and Order Secure Site Pro EV SSL.

  • POST https://www.digicert.com/services/v2/order/certificate/ssl_securesite_pro
  • POST https://www.digicert.com/services/v2/order/certificate/ssl_ev_securesite_pro

Benefits included with each Secure Site Pro certificate

Each Secure Site Pro certificate includes – at no extra cost – first access to premium feature such as the Post Quantum Cryptographic (PQC) toolkit.

Other benefits include:

  • Priority validation
  • Priority support
  • Two premium site seals
  • Malware check
  • Industry-leading warranties – protection for you and your customer!

To learn more about our Secure Site Pro certificates, see DigiCert Secure Site Pro.

To activate Secure Site Pro certificates for your CertCentral account, contact your account manager or our support team.

new

在 Discovery 中,我们在扫描设置中增加了扫描配置的密码套件选项,您可以查看在服务器上启用的密码套件。添加或编辑扫描时,当您选择选择扫描内容后,该选项位于设置部分。请参阅设置和运行扫描编辑扫描

扫描完成后,密码套件信息列于服务器详细信息页面的服务器详细信息部分。(在侧栏菜单中,单击 Discovery > 查看结果。在“证书”页面上,单击查看端点。在“端点”页面上,单击该端点的 IP 地址/FQDN 链接。然后,在“服务器详细信息”页面的“服务器详细信息”部分,单击密码视图链接。)

更新备注:新的扫描配置的密码套件选项在最新的传感器版本 3.7.7 中可用。传感器更新完成后,编辑扫描设置。,选择选择扫描内容,选中扫描配置的密码套件,然后重新运行扫描。

enhancement

在 Discovery 中,我们更新了严格传输安全 (STS) 安全标头的分级系统。现在,我们仅为 HTTP 200 请求检查 STS,而为 HTTP 301 请求忽略。当网站缺少严格传输安全 (STS) 安全标头或设置错误时,我们才会惩罚服务器。在这些情况下,我们将服务器分级为"存在风险"。

以前,我们为 HTTP 301 请求检查 STS,并且当它缺少严格传输安全 (STS) 安全标头时惩罚服务器。在这些情况下,我们将服务器分级为"不安全"。

要查看安全标头结果,请前往该端点的“服务器详细信息”页面。在侧栏菜单中,单击 Discovery > 查看结果。在“证书”页面上,单击查看端点。在“端点”页面上,单击该端点的 IP 地址/FQDN 链接。

更新备注:更新的 STS 分级系统在最新的传感器版本 3.7.7 中可用。在传感器更新完成后,请重新运行扫描以查看更新的 STS 分级。

enhancement

我们改进了与 CertCentral 集成的 SAML 单一登录 (SSO) 的用户邀请工作流,您可以在发送帐户用户邀请之前指定被邀请者作为仅 SSO 用户。现在,在邀请新用户弹窗中,使用仅 SAML 单一登录 (SSO) 选项限制被邀请者为仅 SAML SSO。

注意:此选项为这些用户禁用所有其他身份验证方式。而且,仅当您为 CertCentral 帐户启用 SAML 时,此选项才显示。

(在侧栏菜单中,单击帐户 > 用户邀请。在“用户邀请”页面上,单击邀请新用户。请参阅 SAML SSO:邀请用户加入帐户。)

简化的注册表

我们还简化了仅 SSO 用户注册表,删除了密码和安全问题要求。现在,仅 SSO 被邀请者需仅添加他们的个人信息。

new

我们添加了发现的即将到期的证书,您可以更容易地从帐户中的 CertCentral 仪表板中看到 Discovery 证书扫描结果,证书颁发机构,和按等级分析证书小工具。

每个小工具都包含一个交互式图表,您可以通过钻取以轻松找到有关即将到期的证书的更多信息(例如,哪些证书将在 8 至 15 天内到期)、每个证书颁发机构(例如,DigiCert)颁发的证书以及各安全性等级(例如,不安全)的证书。

有关 Discovery 的更多信息

Discovery 使用传感器扫描您的网络。扫描在您的 CertCentral 帐户内集中配置和管理。

new

在 DigiCert 服务 API 中,我们更新了订单信息端点,您可以查看请求证书的方式。对于通过服务 API 或 ACME 目录 URL 请求的证书,我们返回新的响应参数:api_key. 该参数包括密钥名称以及密钥类型:API 或 ACME。

注意:对于通过其他方式(例如,CertCentral 帐户、来宾请求 URL 等)请求的订单,在响应中忽略 api_key 参数。

现在,在查看订单详细信息时,对于通过 API 或 ACME 目录 URL 请求的订单,您将在响应中看到新的 api_key 参数:

GET https://dev.digicert.com/services-api/order/certificate/{order_id}

响应:

Order info endpoint response parameter

new

我们在“订单”页面新增了一个搜索筛选器 - 请求方式,您可以搜索通过特定 API 密钥或 ACME 目录 URL 请求的证书订单。

现在,在“订单”页面上,使用请求方式筛选器查找通过特定 API 密钥或 ACME 目录 URL 请求的有效、已到期、已吊销、被拒绝、等待补发、待处理和副本证书。

(在侧栏菜单中,单击证书 > 订单。在“订单”页面上,单击显示高级搜索。然后,在请求方式下拉列表中,选择 API 密钥或 ACME 目录 URL 名称或在框中键入其名称。)

new

我们的 CertCentral 组合中增加了一个新工具 - Discovery - 提供有关您整个 SSL/TLS 证书状况的实时分析。

为了快速找到您的所有内部和公开的 SSL/TLS 证书,无论证书颁发机构 (CA) 是什么,Discovery 能发现证书配置和实现中的问题,以及您的端点配置中与证书相关的漏洞或问题。

注意:Discovery 使用传感器扫描您的网络。传感器是您安装在战略性位置的小软件应用程序。每次扫描都关联一个传感器。

扫描在您的 CertCentral 帐户内集中配置和管理。扫描结果显示在 CertCentral 内的直观的交互式仪表板中。将扫描配置为按照设定的时间表运行一次或多次。