Skip to content

Commit 62c0df0

Browse files
authored
Merge pull request #134182 from kummanish/certchange
Certchange
2 parents c570b8a + 10112d4 commit 62c0df0

11 files changed

+65
-31
lines changed

articles/mariadb/concepts-certificate-rotation.md

Lines changed: 14 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,10 @@ ms.date: 09/02/2020
1010

1111
# Understanding the changes in the Root CA change for Azure Database for MariaDB
1212

13-
Azure Database for MariaDB will be changing the root certificate for the client application/driver enabled with SSL, use to [connect to the database server](concepts-connectivity-architecture.md). The root certificate currently available is set to expire October 26, 2020 (10/26/2020) as part of standard maintenance and security best practices. This article gives you more details about the upcoming changes, the resources that will be affected, and the steps needed to ensure that your application maintains connectivity to your database server.
13+
Azure Database for MariaDB will be changing the root certificate for the client application/driver enabled with SSL, use to [connect to the database server](concepts-connectivity-architecture.md). The root certificate currently available is set to expire February 15, 2021 (02/15/2021) as part of standard maintenance and security best practices. This article gives you more details about the upcoming changes, the resources that will be affected, and the steps needed to ensure that your application maintains connectivity to your database server.
14+
15+
>[!NOTE]
16+
> Based on the feedback from customers we have extended the root certificate deprecation for our existing Baltimore Root CA from October 26th, 2020 till February 15, 2021. We hope this extension provide sufficient lead time for our users to implement the client changes if they are impacted.
1417
1518
## What update is going to happen?
1619

@@ -19,12 +22,12 @@ In some cases, applications use a local certificate file generated from a truste
1922
As per the industry’s compliance requirements, CA vendors began revoking CA certificates for non-compliant CAs, requiring servers to use certificates issued by compliant CAs, and signed by CA certificates from those compliant CAs. Since Azure Database for MariaDB currently uses one of these non-compliant certificates, which client applications use to validate their SSL connections, we need to ensure that appropriate actions are taken (described below) to minimize the potential impact to your MariaDB servers.
2023

2124

22-
The new certificate will be used starting October 26, 2020 (10/26/2020).If you use either CA validation or full validation of the server certificate when connecting from a MySQL client (sslmode=verify-ca or sslmode=verify-full), you need to update your application configuration before October 26, 2020 (10/26/2020).
25+
The new certificate will be used starting February 15, 2021 (02/15/2021).If you use either CA validation or full validation of the server certificate when connecting from a MySQL client (sslmode=verify-ca or sslmode=verify-full), you need to update your application configuration before February 15, 2021 (02/15/2021).
2326

2427
## How do I know if my database is going to be affected?
2528

2629
All applications that use SSL/TLS and verify the root certificate needs to update the root certificate. You can identify whether your connections verify the root certificate by reviewing your connection string.
27-
- If your connection string includes `sslmode=verify-ca` or `sslmode=verify-full`, you need to update the certificate.
30+
- If your connection string includes `sslmode=verify-ca` or `sslmode=verify-identity`, you need to update the certificate.
2831
- If your connection string includes `sslmode=disable`, `sslmode=allow`, `sslmode=prefer`, or `sslmode=require`, you do not need to update certificates.
2932
- If your connection string does not specify sslmode, you do not need to update certificates.
3033

@@ -78,6 +81,9 @@ If you are using the Azure Database for MariaDB issued certificate as documented
7881
* Invalid certificate/revoked certificate
7982
* Connection timed out
8083
84+
> [!NOTE]
85+
> Please do not drop or alter **Baltimore certificate** until the cert change is made. We will send a communication once the change is done, after which it is safe for them to drop the Baltimore certificate.
86+
8187
## Frequently asked questions
8288
8389
### 1. If I am not using SSL/TLS, do I still need to update the root CA?
@@ -86,8 +92,8 @@ No actions required if you are not using SSL/TLS.
8692
### 2. If I am using SSL/TLS, do I need to restart my database server to update the root CA?
8793
No, you do not need to restart the database server to start using the new certificate. Certificate update is a client-side change and the incoming client connections need to use the new certificate to ensure that they can connect to the database server.
8894
89-
### 3. What will happen if I do not update the root certificate before October 26, 2020 (10/26/2020)?
90-
If you do not update the root certificate before October 26, 2020, your applications that connect via SSL/TLS and does verification for the root certificate will be unable to communicate to the MariaDB database server and application will experience connectivity issues to your MariaDB database server.
95+
### 3. What will happen if I do not update the root certificate before February 15, 2021 (02/15/2021)?
96+
If you do not update the root certificate before February 15, 2021 (02/15/2021), your applications that connect via SSL/TLS and does verification for the root certificate will be unable to communicate to the MariaDB database server and application will experience connectivity issues to your MariaDB database server.
9197
9298
### 4. What is the impact if using App Service with Azure Database for MariaDB?
9399
For Azure app services, connecting to Azure Database for MariaDB, we can have two possible scenarios and it depends on how on you are using SSL with your application.
@@ -105,11 +111,11 @@ For connector using Self-hosted Integration Runtime where you explicitly include
105111
### 7. Do I need to plan a database server maintenance downtime for this change?
106112
No. Since the change here is only on the client side to connect to the database server, there is no maintenance downtime needed for the database server for this change.
107113
108-
### 8. What if I cannot get a scheduled downtime for this change before October 26, 2020 (10/26/2020)?
114+
### 8. What if I cannot get a scheduled downtime for this change before February 15, 2021 (02/15/2021)?
109115
Since the clients used for connecting to the server needs to be updating the certificate information as described in the fix section [here](./concepts-certificate-rotation.md#what-do-i-need-to-do-to-maintain-connectivity), we do not need to a downtime for the server in this case.
110116
111-
### 9. If I create a new server after October 26, 2020, will I be impacted?
112-
For servers created after October 26, 2020 (10/26/2020), you can use the newly issued certificate for your applications to connect using SSL.
117+
### 9. If I create a new server after February 15, 2021 (02/15/2021), will I be impacted?
118+
For servers created after February 15, 2021 (02/15/2021), you can use the newly issued certificate for your applications to connect using SSL.
113119
114120
### 10. How often does Microsoft update their certificates or what is the expiry policy?
115121
These certificates used by Azure Database for MariaDB are provided by trusted Certificate Authorities (CA). So the support of these certificates on Azure Database for MariaDB is tied to the support of these certificates by CA. However, as in this case, there can be unforeseen bugs in these predefined certificates, which need to be fixed at the earliest.

articles/mariadb/concepts-ssl-connection-security.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,11 @@ ms.date: 07/09/2020
1111
# SSL/TLS connectivity in Azure Database for MariaDB
1212
Azure Database for MariaDB supports connecting your database server to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections between your database server and your client applications helps protect against "man in the middle" attacks by encrypting the data stream between the server and your application.
1313

14+
>[!NOTE]
15+
> Based on the feedback from customers we have extended the root certificate deprecation for our existing Baltimore Root CA till February 15, 2021 (02/15/2021).
16+
1417
> [!IMPORTANT]
15-
> SSL root certificate is set to expire starting October 26th, 2020 (10/26/2020). Please update your application to use the [new certificate](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt.pem). To learn more , see [planned certificate updates](concepts-certificate-rotation.md)
18+
> SSL root certificate is set to expire starting February 15, 2021 (02/15/2021). Please update your application to use the [new certificate](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt.pem). To learn more , see [planned certificate updates](concepts-certificate-rotation.md)
1619
1720
## Default settings
1821
By default, the database service should be configured to require SSL connections when connecting to MariaDB. We recommend to avoid disabling the SSL option whenever possible.

articles/mariadb/howto-configure-privatelink-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ az network private-endpoint create \
9191
--resource-group myResourceGroup \
9292
--vnet-name myVirtualNetwork \
9393
--subnet mySubnet \
94-
--private-connection-resource-id $(az resource show -g myResourcegroup -n mydemoserver --resource-type "Microsoft.DBforMariaDB/servers" --query "id") \
94+
--private-connection-resource-id $(az resource show -g myResourcegroup -n mydemoserver --resource-type "Microsoft.DBforMariaDB/servers" --query "id" -o tsv) \
9595
--group-id mariadbServer \
9696
--connection-name myConnection
9797
```

articles/mysql/concepts-certificate-rotation.md

Lines changed: 14 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,20 +10,23 @@ ms.date: 09/02/2020
1010

1111
# Understanding the changes in the Root CA change for Azure Database for MySQL
1212

13-
Azure Database for MySQL will be changing the root certificate for the client application/driver enabled with SSL, used to [connect to the database server](concepts-connectivity-architecture.md). The root certificate currently available is set to expire October 26, 2020 (10/26/2020) as part of standard maintenance and security best practices. This article gives you more details about the upcoming changes, the resources that will be affected, and the steps needed to ensure that your application maintains connectivity to your database server.
13+
Azure Database for MySQL will be changing the root certificate for the client application/driver enabled with SSL, used to [connect to the database server](concepts-connectivity-architecture.md). The root certificate currently available is set to expire February 15, 2021 (02/15/2021) as part of standard maintenance and security best practices. This article gives you more details about the upcoming changes, the resources that will be affected, and the steps needed to ensure that your application maintains connectivity to your database server.
14+
15+
>[!NOTE]
16+
> Based on the feedback from customers we have extended the root certificate deprecation for our existing Baltimore Root CA from October 26th, 2020 till February 15, 2021. We hope this extension provide sufficient lead time for our users to implement the client changes if they are impacted.
1417
1518
## What update is going to happen?
1619

1720
In some cases, applications use a local certificate file generated from a trusted Certificate Authority (CA) certificate file to connect securely. Currently customers can only use the predefined certificate to connect to an Azure Database for MySQL server, which is located [here](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem). However, [Certificate Authority (CA) Browser forum](https://cabforum.org/) recently published reports of multiple certificates issued by CA vendors to be non-compliant.
1821

1922
As per the industry’s compliance requirements, CA vendors began revoking CA certificates for non-compliant CAs, requiring servers to use certificates issued by compliant CAs, and signed by CA certificates from those compliant CAs. Since Azure Database for MySQL currently uses one of these non-compliant certificates, which client applications use to validate their SSL connections, we need to ensure that appropriate actions are taken (described below) to minimize the potential impact to your MySQL servers.
2023

21-
The new certificate will be used starting October 26, 2020 (10/26/2020).If you use either CA validation or full validation of the server certificate when connecting from a MySQL client (sslmode=verify-ca or sslmode=verify-full), you need to update your application configuration before October 26, 2020 (10/26/2020).
24+
The new certificate will be used starting February 15, 2021 (02/15/2021).If you use either CA validation or full validation of the server certificate when connecting from a MySQL client (sslmode=verify-ca or sslmode=verify-full), you need to update your application configuration before February 15, 2021 (03/15/2021).
2225

2326
## How do I know if my database is going to be affected?
2427

2528
All applications that use SSL/TLS and verify the root certificate needs to update the root certificate. You can identify whether your connections verify the root certificate by reviewing your connection string.
26-
- If your connection string includes `sslmode=verify-ca` or `sslmode=verify-full`, you need to update the certificate.
29+
- If your connection string includes `sslmode=verify-ca` or `sslmode=verify-identity`, you need to update the certificate.
2730
- If your connection string includes `sslmode=disable`, `sslmode=allow`, `sslmode=prefer`, or `sslmode=require`, you do not need to update certificates.
2831
- If using Java connectors and your connection string includes useSSL=false or requireSSL=false, you do not need to update certificates.
2932
- If your connection string does not specify sslmode, you do not need to update certificates.
@@ -79,6 +82,9 @@ If you are using the Azure Database for MySQL issued certificate as documented h
7982
* Invalid certificate/revoked certificate
8083
* Connection timed out
8184
85+
> [!NOTE]
86+
> Please do not drop or alter **Baltimore certificate** until the cert change is made. We will send a communication once the change is done, after which it is safe for them to drop the Baltimore certificate.
87+
8288
## Frequently asked questions
8389
8490
### 1. If I am not using SSL/TLS, do I still need to update the root CA?
@@ -87,8 +93,8 @@ No actions required if you are not using SSL/TLS.
8793
### 2. If I am using SSL/TLS, do I need to restart my database server to update the root CA?
8894
No, you do not need to restart the database server to start using the new certificate. This root certificate is a client-side change and the incoming client connections need to use the new certificate to ensure that they can connect to the database server.
8995
90-
### 3. What will happen if I do not update the root certificate before October 26, 2020 (10/26/2020)?
91-
If you do not update the root certificate before October 26, 2020, your applications that connect via SSL/TLS and does verification for the root certificate will be unable to communicate to the MySQL database server and application will experience connectivity issues to your MySQL database server.
96+
### 3. What will happen if I do not update the root certificate before February 15, 2021 (02/15/2021)?
97+
If you do not update the root certificate before February 15, 2021 (02/15/2021), your applications that connect via SSL/TLS and does verification for the root certificate will be unable to communicate to the MySQL database server and application will experience connectivity issues to your MySQL database server.
9298
9399
### 4. What is the impact if using App Service with Azure Database for MySQL?
94100
For Azure app services, connecting to Azure Database for MySQL, we can have two possible scenarios and it depends on how on you are using SSL with your application.
@@ -106,11 +112,11 @@ For connector using Self-hosted Integration Runtime where you explicitly include
106112
### 7. Do I need to plan a database server maintenance downtime for this change?
107113
No. Since the change here is only on the client side to connect to the database server, there is no maintenance downtime needed for the database server for this change.
108114
109-
### 8. What if I cannot get a scheduled downtime for this change before October 26, 2020 (10/26/2020)?
115+
### 8. What if I cannot get a scheduled downtime for this change before February 15, 2021 (02/15/2021)?
110116
Since the clients used for connecting to the server needs to be updating the certificate information as described in the fix section [here](./concepts-certificate-rotation.md#what-do-i-need-to-do-to-maintain-connectivity), we do not need to a downtime for the server in this case.
111117
112-
### 9. If I create a new server after October 26, 2020, will I be impacted?
113-
For servers created after October 26, 2020 (10/26/2020), you can use the newly issued certificate for your applications to connect using SSL.
118+
### 9. If I create a new server after February 15, 2021 (02/15/2021), will I be impacted?
119+
For servers created after February 15, 2021 (02/15/2021), you can use the newly issued certificate for your applications to connect using SSL.
114120
115121
### 10. How often does Microsoft update their certificates or what is the expiry policy?
116122
These certificates used by Azure Database for MySQL are provided by trusted Certificate Authorities (CA). So the support of these certificates on Azure Database for MySQL is tied to the support of these certificates by CA. However, as in this case, there can be unforeseen bugs in these predefined certificates, which need to be fixed at the earliest.

articles/mysql/concepts-infrastructure-double-encryption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Azure Database for MySQL uses storage [encryption of data at-rest](concepts-secu
1515
Infrastructure double encryption adds a second layer of encryption using service-managed keys. It uses FIPS 140-2 validated cryptographic module, but with a different encryption algorithm. This provides an additional layer of protection for your data at rest. The key used in Infrastructure double encryption is also managed by the Azure Database for MySQL service. Infrastructure double encryption is not enabled by default since the additional layer of encryption can have a performance impact.
1616

1717
> [!NOTE]
18-
> This feature is available in all Azure regions where Azure Database for MySQL supports "General Purpose" and "Memory Optimized" pricing tiers.
18+
> This feature is only supported for "General Purpose" and "Memory Optimized" pricing tiers in Azure Database for PostgreSQL.
1919
2020
Infrastructure Layer encryption has the benefit of being implemented at the layer closest to the storage device or network wires. Azure Database for MySQL implements the two layers of encryption using service-managed keys. Although still technically in the service layer, it is very close to hardware that stores the data at rest. You can still optionally enable data encryption at rest using [customer managed key](concepts-data-encryption-mysql.md) for the provisioned MySQL server.
2121

articles/mysql/concepts-ssl-connection-security.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,11 @@ Azure Database for MySQL supports connecting your database server to client appl
1515
> [!NOTE]
1616
> Updating the `require_secure_transport` server parameter value does not affect the MySQL service's behavior. Use the SSL and TLS enforcement features outlined in this article to secure connections to your database.
1717
18+
>[!NOTE]
19+
> Based on the feedback from customers we have extended the root certificate deprecation for our existing Baltimore Root CA till February 15, 2021 (02/15/2021).
20+
1821
> [!IMPORTANT]
19-
> SSL root certificate is set to expire starting October 26th, 2020 (10/26/2020). Please update your application to use the [new certificate](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt.pem). To learn more , see [planned certificate updates](concepts-certificate-rotation.md)
22+
> SSL root certificate is set to expire starting February 15, 2021 (02/15/2021). Please update your application to use the [new certificate](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt.pem). To learn more , see [planned certificate updates](concepts-certificate-rotation.md)
2023
2124
## SSL Default settings
2225

articles/mysql/howto-configure-privatelink-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ az network private-endpoint create \
8787
--resource-group myResourceGroup \
8888
--vnet-name myVirtualNetwork \
8989
--subnet mySubnet \
90-
--private-connection-resource-id $(az resource show -g myResourcegroup -n mydemoserver --resource-type "Microsoft.DBforMySQL/servers" --query "id") \
90+
--private-connection-resource-id $(az resource show -g myResourcegroup -n mydemoserver --resource-type "Microsoft.DBforMySQL/servers" --query "id" -o tsv) \
9191
--group-id mysqlServer \
9292
--connection-name myConnection
9393
```

0 commit comments

Comments
 (0)