Skip to content

Commit 28c28a7

Browse files
authored
formatting-fix-remove-endpoints
1 parent 2deb36e commit 28c28a7

File tree

1 file changed

+9
-8
lines changed

1 file changed

+9
-8
lines changed

articles/security/fundamentals/azure-CA-details.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -181,16 +181,13 @@ AIA:
181181
- `www.microsoft.com`
182182

183183
CRL:
184-
- `crl.microsoft.com`
185184
- `crl3.digicert.com`
186185
- `crl4.digicert.com`
187186
- `crl.digicert.cn`
188187
- `cdp.geotrust.com`
189-
- `mscrl.microsoft.com`
190188
- `www.microsoft.com`
191189

192190
OCSP:
193-
- `ocsp.msocsp.com`
194191
- `ocsp.digicert.com`
195192
- `ocsp.digicert.cn`
196193
- `oneocsp.microsoft.com`
@@ -216,9 +213,11 @@ To determine if the **Microsoft ECC Root Certificate Authority 2017** and **Micr
216213

217214
1. Open a terminal window on your system.
218215
1. Run the following command:
216+
219217
```bash
220218
keytool -list -keystore $JAVA_HOME/jre/lib/security/cacerts
221219
```
220+
222221
- `$JAVA_HOME` refers to the path to the Java home directory.
223222
- If you're unsure of the path, you can find it by running the following command:
224223
@@ -238,24 +237,26 @@ To determine if the **Microsoft ECC Root Certificate Authority 2017** and **Micr
238237
...
239238
```
240239
241-
242240
1. To add a root certificate to the trusted root certificate store in Java, you can use the `keytool` utility. The following example adds the **Microsoft RSA Root Certificate Authority 2017** root certificate:
241+
243242
```bash
244243
keytool -import -file microsoft-ecc-root-ca.crt -alias microsoft-rsa-root-ca -keystore $JAVA_HOME/jre/lib/security/cacerts
245244
keytool -import -file microsoft-rsa-root-ca.crt -alias microsoft-rsa-root-ca -keystore $JAVA_HOME/jre/lib/security/cacerts
246245
```
246+
247247
> [!NOTE]
248248
> In this example, `microsoft-ecc-root-ca.crt` and `microsoft-rsa-root-ca.crt` are the names of the files that contain the **Microsoft ECC Root Certificate Authority 2017** and **Microsoft RSA Root Certificate Authority 2017** root certificates, respectively.
249249
250250
## Past changes
251251
252252
The CA/Browser Forum updated the Baseline Requirements to require all publicly trusted Public Key Infrastructures (PKIs) to end usage of the SHA-1 hash algorithms for Online Certificate Standard Protocol (OCSP) on May 31, 2022. Microsoft updated all remaining OCSP Responders that used the SHA-1 hash algorithm to use the SHA-256 hash algorithm. View the [Sunset for SHA-1 OCSP signing article](../fundamentals/ocsp-sha-1-sunset.md) for additional information.
253253
254-
Microsoft updated Azure services to use TLS certificates from a different set of Root Certificate Authorities (CAs) on February 15, 2021, to comply with changes set forth by the CA/Browser Forum Baseline Requirements. Some services finalized these updates in 2022. View the [Azure TLS certificate changes article](../fundamentals/tls-certificate-changes.md) for additional information.
254+
Microsoft updated Azure services to use TLS certificates from a different set of Root Certificate Authorities (CAs) on February 15, 2021, to comply with changes set forth by the CA/Browser Forum Baseline Requirements. Some services finalized these updates in 2022. View the [Azure TLS certificate changes article](../fundamentals/tls-certificate-changes.md) for additional information.
255255
256256
### Article change log
257257
258-
- October 8, 2024: Removed the following CAs.
258+
- October 8, 2024: Removed the following CAs and CDP endpoints: crl.microsoft.com, mscrl.microsoft.com, and ocsp.msocsp.com.
259+
259260
| Certificate Authority | Serial Number<br>Thumbprint |
260261
|---- |---- |
261262
|[Baltimore CyberTrust Root](https://cacerts.digicert.com/BaltimoreCyberTrustRoot.crt) | 0x20000b9<br>D4DE20D05E66FC53FE1A50882C78DB2852CAE474 |
@@ -284,8 +285,8 @@ Microsoft updated Azure services to use TLS certificates from a different set of
284285
|[Microsoft Azure TLS Issuing CA 06](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2006.cer)| 0x02e79171fb8021e93fe2d983834c50c0<br>30E01761AB97E59A06B41EF20AF6F2DE7EF4F7B0|
285286
|[Microsoft Azure TLS Issuing CA 06](https://crt.sh/?d=2616330106)|0x3300000020a2f1491a37fbd31f000000000020<br>8F1FD57F27C828D7BE29743B4D02CD7E6E5F43E6|
286287
287-
- July 17, 2023: Added 16 new subordinate Certificate Authorities
288-
- February 7, 2023: Added eight new subordinate Certificate Authorities
288+
- July 17, 2023: Added 16 new subordinate Certificate Authorities.
289+
- February 7, 2023: Added eight new subordinate Certificate Authorities.
289290
290291
## Next steps
291292

0 commit comments

Comments
 (0)