Skip to content

Commit 6067273

Browse files
Merge pull request #303688 from shlipsey3/managed-tls-changes-073125
managed-tls-changes-073125
2 parents 1ca7b75 + 8a8ecdb commit 6067273

File tree

3 files changed

+48
-8
lines changed

3 files changed

+48
-8
lines changed

articles/security/fundamentals/TOC.yml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -153,10 +153,8 @@
153153
href: azure-ca-details.md
154154
- name: Certificate Pinning
155155
href: certificate-pinning.md
156-
- name: Sunset for SHA-1 OCSP signing
157-
href: ocsp-sha-1-sunset.md
158-
- name: TLS certificate changes
159-
href: tls-certificate-changes.md
156+
- name: Managed TLS changes
157+
href: managed-tls-changes.md
160158
- name: Disk encryption
161159
items:
162160
- name: Best practices

articles/security/fundamentals/azure-CA-details.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ services: security
55
ms.service: security
66
ms.subservice: security-fundamentals
77
ms.custom: devx-track-extended-java
8-
ms.topic: conceptual
9-
ms.date: 03/31/2025
8+
ms.topic: concept-article
9+
ms.date: 07/31/2025
1010
ms.author: sarahlipsey
1111
author: shlipsey3
12-
manager: femila
12+
manager: pmwongera
1313
ms.reviewer: quentinb
1414
---
1515
# Azure Certificate Authority details
@@ -249,7 +249,7 @@ To determine if the **Microsoft ECC Root Certificate Authority 2017** and **Micr
249249
250250
The CA/Browser Forum updated the Baseline Requirements to require all publicly trusted Public Key Infrastructures (PKIs) to end usage of the SHA-1 hash algorithms for Online Certificate Standard Protocol (OCSP) on May 31, 2022. Microsoft updated all remaining OCSP Responders that used the SHA-1 hash algorithm to use the SHA-256 hash algorithm.
251251
252-
Microsoft updated Azure services to use TLS certificates from a different set of Root Certificate Authorities (CAs) on February 15, 2021, to comply with changes set forth by the CA/Browser Forum Baseline Requirements. Some services finalized these updates in 2022.
252+
Microsoft updated Azure services to use TLS certificates from a different set of Root Certificate Authorities (CAs) on February 15, 2021, to comply with changes set forth by the CA/Browser Forum Baseline Requirements. Some services finalized these updates in 2022. For the latest information regarding managed TLS and Azure, see [Managed TLS changes](managed-tls-changes.md).
253253
254254
### Article change log
255255
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
title: Changes to the Managed TLS Feature
3+
description: Learn about changes to the Azure managed TLS solution and domain control validation process.
4+
services: security
5+
ms.service: security
6+
ms.subservice: security-fundamentals
7+
ms.topic: concept-article
8+
ms.date: 07/31/2025
9+
10+
ms.author: sarahlipsey
11+
author: shlipsey3
12+
manager: pmwongera
13+
ms.reviewer: quentinb
14+
---
15+
16+
# Changes to the managed TLS feature
17+
18+
Azure offers a comprehensive managed TLS solution integrated with services such as Azure Front Door (AFD) and CDN Classic, Azure Front Door Standard/Premium SKU, Azure API Management, Azure App Service, Azure Container Apps, and Azure Static Web Apps. This capability includes managed TLS server certificates for customer vanity domains, provided by DigiCert.
19+
20+
DigiCert is transitioning to a new open-source software (OSS) domain control validation (DCV) platform designed to enhance transparency and accountability in domain validation processes. DigiCert will no longer support the legacy CNAME Delegation DCV workflow for domain control validation in the specified Azure services.
21+
22+
Consequently, these Azure services will be introducing an enhanced domain control validation process, aiming to significantly expedite domain validation and address key vulnerabilities in the user experience.
23+
24+
This change does not impact the standard CNAME DCV process for DigiCert customers, where validation uses a random value in the CNAME record. Only a unique method previously exclusive to Microsoft is being retired.
25+
26+
## Frequently asked questions
27+
28+
**Q: What is domain control validation?**
29+
30+
A: Domain Control Validation (DCV) is a critical process used to verify that an entity requesting a TLS/SSL certificate has legitimate control over the domain(s) listed in the certificate.
31+
32+
**Q: Is support for vanity domains being retired?**
33+
34+
A: No. The feature is very much supported and in fact is receiving several key updates that improve the overall user experience.
35+
36+
> [!NOTE]
37+
> AFD classic and CDN Classic SKUs, which are on the path to deprecation, are retiring support for adding new vanity domains. For more information, see [Azure Front Door (classic) and Azure CDN from Microsoft Classic SKU ending CNAME based domain validation and new domain/profile creations by August 15, 2025](https://azure.microsoft.com/updates?id=498522). Customers are recommended to use managed certificates with AFD Standard and Premium SKUs for new vanity domains.
38+
39+
**Q: Is DigiCert retiring CNAME domain control validation?**
40+
41+
A: No. Only this specific CNAME validation method unique to Azure services is being retired. The CNAME DCV method used by DigiCert customers, such as the one described for DigiCert [OV/EV certificates](https://docs.digicert.com/en/certcentral/manage-certificates/supported-dcv-methods-for-validating-the-domains-on-ov-ev-tls-ssl-certificate-orders/use-the-dns-cname-validation-method-to-verify-domain-control.html) and [DV certificates](https://docs.digicert.com/en/certcentral/manage-certificates/dv-certificate-enrollment/domain-control-validation--dcv--methods/use-the-dns-cname-dcv-method.html) is not impacted. Only Azure is impacted by this change.
42+

0 commit comments

Comments
 (0)