Skip to content

Commit 680a996

Browse files
Merge pull request #230078 from code-sidd/mariadb_notification
Mariadb CA root changes
2 parents 70ac058 + 8f9af4d commit 680a996

File tree

1 file changed

+15
-26
lines changed

1 file changed

+15
-26
lines changed

articles/mariadb/concepts-certificate-rotation.md

Lines changed: 15 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -10,29 +10,24 @@ ms.date: 06/24/2022
1010

1111
# Understanding the changes in the Root CA change for Azure Database for MariaDB
1212

13-
Azure Database for MariaDB successfully completed the root certificate change on **February 15, 2021 (02/15/2021)** as part of standard maintenance and security best practices. This article gives you more details about the changes, the resources affected, and the steps needed to ensure that your application maintains connectivity to your database server.
13+
Azure database for MariaDB as part of standard maintenance and security best practices will complete the root certificate change starting March 2023. This article gives you more details about the changes, the resources affected, and the steps needed to ensure that your application maintains connectivity to your database server.
1414

1515
> [!NOTE]
1616
> This article contains references to the term *slave*, a term that Microsoft no longer uses. When the term is removed from the software, we'll remove it from this article.
1717
>
1818
1919
## Why root certificate update is required?
2020

21-
Azure database for MariaDB users can only use the predefined certificate to connect to an Azure Database for MariaDB server, which is located [here](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem). However, [Certificate Authority (CA) Browser forum](https://cabforum.org/) recently published reports of multiple certificates issued by CA vendors to be non-compliant.
21+
Azure Database for MariaDB users can only use the predefined certificate to connect to their MariaDB server, which is located [here](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem). However, [Certificate Authority (CA) Browser forum](https://cabforum.org/) recently published reports of multiple certificates issued by CA vendors to be non-compliant.
2222

2323
As per the industry's compliance requirements, CA vendors began revoking CA certificates for non-compliant CAs, requiring servers to use certificates issued by compliant CAs, and signed by CA certificates from those compliant CAs. Since Azure Database for MariaDB used one of these non-compliant certificates, we needed to rotate the certificate to the compliant version to minimize the potential threat to your MySQL servers.
2424

25-
The new certificate is rolled out and in effect starting February 15, 2021 (02/15/2021).
26-
27-
## What change was performed on February 15, 2021 (02/15/2021)?
28-
29-
On February 15, 2021, the [BaltimoreCyberTrustRoot root certificate](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) was replaced with a **compliant version** of the same [BaltimoreCyberTrustRoot root certificate](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) to ensure existing customers do not need to change anything and there is no impact to their connections to the server. During this change, the [BaltimoreCyberTrustRoot root certificate](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) was **not replaced** with [DigiCertGlobalRootG2](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt.pem) and that change is deferred to allow more time for customers to make the change.
3025

3126
## Do I need to make any changes on my client to maintain connectivity?
3227

33-
There is no change required on client side. if you followed our previous recommendation below, you will still be able to continue to connect as long as **BaltimoreCyberTrustRoot certificate is not removed** from the combined CA certificate. **We recommend to not remove the BaltimoreCyberTrustRoot from your combined CA certificate until further notice to maintain connectivity.**
28+
If you followed steps mentioned under [Create a combined CA certificate](#create-a-combined-ca-certificate) below, you can continue to connect as long as **BaltimoreCyberTrustRoot certificate is not removed** from the combined CA certificate. **To maintain connectivity, we recommend that you retain the BaltimoreCyberTrustRoot in your combined CA certificate until further notice.**
3429

35-
### Previous recommendation
30+
### Create a combined CA certificate
3631

3732
- Download **BaltimoreCyberTrustRoot** & **DigiCertGlobalRootG2** CA from links below:
3833

@@ -76,11 +71,9 @@ There is no change required on client side. if you followed our previous recomme
7671
- Replace the original root CA pem file with the combined root CA file and restart your application/client.
7772
- In future, after the new certificate deployed on the server side, you can change your CA pem file to DigiCertGlobalRootG2.crt.pem.
7873
79-
## Why was BaltimoreCyberTrustRoot certificate not replaced to DigiCertGlobalRootG2 during this change on February 15, 2021?
80-
81-
We evaluated the customer readiness for this change and realized many customers were looking for additional lead time to manage this change. In the interest of providing more lead time to customers for readiness, we have decided to defer the certificate change to DigiCertGlobalRootG2 for at least a year providing sufficient lead time to the customers and end users.
74+
#### If I'm not using SSL/TLS, do I still need to update the root CA?
8275
83-
Our recommendations to users is, use the aforementioned steps to create a combined certificate and connect to your server but do not remove BaltimoreCyberTrustRoot certificate until we send a communication to remove it.
76+
No actions are required if you aren't using SSL/TLS.
8477
8578
## What if we removed the BaltimoreCyberTrustRoot certificate?
8679
@@ -127,21 +120,17 @@ For connector using Self-hosted Integration Runtime where you explicitly include
127120
128121
No. Since the change here's only on the client side to connect to the database server, there's no maintenance downtime needed for the database server for this change.
129122
130-
### 8. If I create a new server after February 15, 2021 (02/15/2021), will I be impacted?
131-
132-
For servers created after February 15, 2021 (02/15/2021), you will continue to use the [BaltimoreCyberTrustRoot](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) for your applications to connect using SSL.
133-
134-
### 9. How often does Microsoft update their certificates or what is the expiry policy?
123+
### 8. How often does Microsoft update their certificates or what is the expiry policy?
135124
136-
These certificates used by Azure Database for MariaDB are provided by trusted Certificate Authorities (CA). So the support of these certificates is tied to the support of these certificates by CA. The [BaltimoreCyberTrustRoot](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) certificate is scheduled to expire in 2025 so Microsoft will need to perform a certificate change before the expiry. Also in case if there are unforeseen bugs in these predefined certificates, Microsoft will need to make the certificate rotation at the earliest similar to the change performed on February 15, 2021 to ensure the service is secure and compliant at all times.
125+
These certificates used by Azure Database for MariaDB are provided by trusted Certificate Authorities (CA). So the support of these certificates is tied to the support of these certificates by CA. The [BaltimoreCyberTrustRoot](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) certificate is scheduled to expire in 2025 so Microsoft will need to perform a certificate change before the expiry.
137126
138-
### 10. If I'm using read replicas, do I need to perform this update only on source server or the read replicas?
127+
### 9. If I'm using read replicas, do I need to perform this update only on source server or the read replicas?
139128
140129
Since this update is a client-side change, if the client used to read data from the replica server, you'll need to apply the changes for those clients as well.
141130
142-
### 11. If I'm using Data-in replication, do I need to perform any action?
131+
### 10. If I'm using Data-in replication, do I need to perform any action?
143132
144-
- If the data-replication is from a virtual machine (on-prem or Azure virtual machine) to Azure Database for MySQL, you need to check if SSL is being used to create the replica. Run **SHOW SLAVE STATUS** and check the following setting.
133+
- If the data-replication is from a virtual machine (on-premises or Azure virtual machine) to Azure Database for MySQL, you need to check if SSL is being used to create the replica. Run **SHOW SLAVE STATUS** and check the following setting.
145134
146135
```azurecli-interactive
147136
Master_SSL_Allowed : Yes
@@ -154,7 +143,7 @@ Since this update is a client-side change, if the client used to read data from
154143
155144
If you're using [Data-in replication](concepts-data-in-replication.md) to connect to Azure Database for MySQL, there are two things to consider:
156145
157-
- If the data-replication is from a virtual machine (on-prem or Azure virtual machine) to Azure Database for MySQL, you need to check if SSL is being used to create the replica. Run **SHOW SLAVE STATUS** and check the following setting.
146+
- If the data-replication is from a virtual machine (on-premises or Azure virtual machine) to Azure Database for MySQL, you need to check if SSL is being used to create the replica. Run **SHOW SLAVE STATUS** and check the following setting.
158147
159148
```azurecli-interactive
160149
Master_SSL_Allowed : Yes
@@ -169,14 +158,14 @@ If you're using [Data-in replication](concepts-data-in-replication.md) to connec
169158

170159
- If the data-replication is between two Azure Database for MySQL, then you'll need to reset the replica by executing **CALL mysql.az_replication_change_master** and provide the new dual root certificate as last parameter [master_ssl_ca](howto-data-in-replication.md#link-the-source-and-replica-servers-to-start-data-in-replication).
171160

172-
### 12. Do we have server-side query to verify if SSL is being used?
161+
### 11. Do we have server-side query to verify if SSL is being used?
173162

174163
To verify if you're using SSL connection to connect to the server refer [SSL verification](howto-configure-ssl.md#verify-the-ssl-connection).
175164

176-
### 13. Is there an action needed if I already have the DigiCertGlobalRootG2 in my certificate file?
165+
### 12. Is there an action needed if I already have the DigiCertGlobalRootG2 in my certificate file?
177166

178167
No. There's no action needed if your certificate file already has the **DigiCertGlobalRootG2**.
179168

180-
### 14. What if I have further questions?
169+
### 13. What if I have further questions?
181170

182171
If you have questions, get answers from community experts in [Microsoft Q&A](mailto:[email protected]). If you have a support plan and you need technical help, [contact us](mailto:[email protected]).

0 commit comments

Comments
 (0)