You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/mariadb/concepts-certificate-rotation.md
+15-26Lines changed: 15 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,29 +10,24 @@ ms.date: 06/24/2022
10
10
11
11
# Understanding the changes in the Root CA change for Azure Database for MariaDB
12
12
13
-
Azure Database for MariaDB successfully completed the root certificate change on **February 15, 2021 (02/15/2021)**as part of standard maintenance and security best practices. This article gives you more details about the changes, the resources affected, and the steps needed to ensure that your application maintains connectivity to your database server.
13
+
Azure database for MariaDB as part of standard maintenance and security best practices will complete the root certificate change starting March 2023. This article gives you more details about the changes, the resources affected, and the steps needed to ensure that your application maintains connectivity to your database server.
14
14
15
15
> [!NOTE]
16
16
> This article contains references to the term *slave*, a term that Microsoft no longer uses. When the term is removed from the software, we'll remove it from this article.
17
17
>
18
18
19
19
## Why root certificate update is required?
20
20
21
-
Azure database for MariaDB users can only use the predefined certificate to connect to an Azure Database for MariaDB server, which is located [here](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem). However, [Certificate Authority (CA) Browser forum](https://cabforum.org/) recently published reports of multiple certificates issued by CA vendors to be non-compliant.
21
+
Azure Database for MariaDB users can only use the predefined certificate to connect to their MariaDB server, which is located [here](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem). However, [Certificate Authority (CA) Browser forum](https://cabforum.org/) recently published reports of multiple certificates issued by CA vendors to be non-compliant.
22
22
23
23
As per the industry's compliance requirements, CA vendors began revoking CA certificates for non-compliant CAs, requiring servers to use certificates issued by compliant CAs, and signed by CA certificates from those compliant CAs. Since Azure Database for MariaDB used one of these non-compliant certificates, we needed to rotate the certificate to the compliant version to minimize the potential threat to your MySQL servers.
24
24
25
-
The new certificate is rolled out and in effect starting February 15, 2021 (02/15/2021).
26
-
27
-
## What change was performed on February 15, 2021 (02/15/2021)?
28
-
29
-
On February 15, 2021, the [BaltimoreCyberTrustRoot root certificate](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) was replaced with a **compliant version** of the same [BaltimoreCyberTrustRoot root certificate](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) to ensure existing customers do not need to change anything and there is no impact to their connections to the server. During this change, the [BaltimoreCyberTrustRoot root certificate](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) was **not replaced** with [DigiCertGlobalRootG2](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt.pem) and that change is deferred to allow more time for customers to make the change.
30
25
31
26
## Do I need to make any changes on my client to maintain connectivity?
32
27
33
-
There is no change required on client side. if you followed our previous recommendation below, you will still be able to continue to connect as long as **BaltimoreCyberTrustRoot certificate is not removed** from the combined CA certificate. **We recommend to not remove the BaltimoreCyberTrustRoot from your combined CA certificate until further notice to maintain connectivity.**
28
+
If you followed steps mentioned under [Create a combined CA certificate](#create-a-combined-ca-certificate)below, you can continue to connect as long as **BaltimoreCyberTrustRoot certificate is not removed** from the combined CA certificate. **To maintain connectivity, we recommend that you retain the BaltimoreCyberTrustRoot in your combined CA certificate until further notice.**
34
29
35
-
### Previous recommendation
30
+
### Create a combined CA certificate
36
31
37
32
- Download **BaltimoreCyberTrustRoot** & **DigiCertGlobalRootG2** CA from links below:
38
33
@@ -76,11 +71,9 @@ There is no change required on client side. if you followed our previous recomme
76
71
- Replace the original root CA pem file with the combined root CA file and restart your application/client.
77
72
- In future, after the new certificate deployed on the server side, you can change your CA pem file to DigiCertGlobalRootG2.crt.pem.
78
73
79
-
## Why was BaltimoreCyberTrustRoot certificate not replaced to DigiCertGlobalRootG2 during this change on February 15, 2021?
80
-
81
-
We evaluated the customer readiness for this change and realized many customers were looking for additional lead time to manage this change. In the interest of providing more lead time to customers for readiness, we have decided to defer the certificate change to DigiCertGlobalRootG2 for at least a year providing sufficient lead time to the customers and end users.
74
+
#### If I'm not using SSL/TLS, do I still need to update the root CA?
82
75
83
-
Our recommendations to users is, use the aforementioned steps to create a combined certificate and connect to your server but do not remove BaltimoreCyberTrustRoot certificate until we send a communication to remove it.
76
+
No actions are required if you aren't using SSL/TLS.
84
77
85
78
## What if we removed the BaltimoreCyberTrustRoot certificate?
86
79
@@ -127,21 +120,17 @@ For connector using Self-hosted Integration Runtime where you explicitly include
127
120
128
121
No. Since the change here's only on the client side to connect to the database server, there's no maintenance downtime needed for the database server for this change.
129
122
130
-
### 8. If I create a new server after February 15, 2021 (02/15/2021), will I be impacted?
131
-
132
-
For servers created after February 15, 2021 (02/15/2021), you will continue to use the [BaltimoreCyberTrustRoot](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) for your applications to connect using SSL.
133
-
134
-
### 9. How often does Microsoft update their certificates or what is the expiry policy?
123
+
### 8. How often does Microsoft update their certificates or what is the expiry policy?
135
124
136
-
These certificates used by Azure Database for MariaDB are provided by trusted Certificate Authorities (CA). So the support of these certificates is tied to the support of these certificates by CA. The [BaltimoreCyberTrustRoot](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) certificate is scheduled to expire in 2025 so Microsoft will need to perform a certificate change before the expiry. Also in case if there are unforeseen bugs in these predefined certificates, Microsoft will need to make the certificate rotation at the earliest similar to the change performed on February 15, 2021 to ensure the service is secure and compliant at all times.
125
+
These certificates used by Azure Database for MariaDB are provided by trusted Certificate Authorities (CA). So the support of these certificates is tied to the support of these certificates by CA. The [BaltimoreCyberTrustRoot](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) certificate is scheduled to expire in 2025 so Microsoft will need to perform a certificate change before the expiry.
137
126
138
-
### 10. If I'm using read replicas, do I need to perform this update only on source server or the read replicas?
127
+
### 9. If I'm using read replicas, do I need to perform this update only on source server or the read replicas?
139
128
140
129
Since this update is a client-side change, if the client used to read data from the replica server, you'll need to apply the changes for those clients as well.
141
130
142
-
### 11. If I'm using Data-in replication, do I need to perform any action?
131
+
### 10. If I'm using Data-in replication, do I need to perform any action?
143
132
144
-
- If the data-replication is from a virtual machine (on-prem or Azure virtual machine) to Azure Database for MySQL, you need to check if SSL is being used to create the replica. Run **SHOW SLAVE STATUS** and check the following setting.
133
+
- If the data-replication is from a virtual machine (on-premises or Azure virtual machine) to Azure Database for MySQL, you need to check if SSL is being used to create the replica. Run **SHOW SLAVE STATUS** and check the following setting.
145
134
146
135
```azurecli-interactive
147
136
Master_SSL_Allowed : Yes
@@ -154,7 +143,7 @@ Since this update is a client-side change, if the client used to read data from
154
143
155
144
If you're using [Data-in replication](concepts-data-in-replication.md) to connect to Azure Database for MySQL, there are two things to consider:
156
145
157
-
- If the data-replication is from a virtual machine (on-prem or Azure virtual machine) to Azure Database for MySQL, you need to check if SSL is being used to create the replica. Run **SHOW SLAVE STATUS** and check the following setting.
146
+
- If the data-replication is from a virtual machine (on-premises or Azure virtual machine) to Azure Database for MySQL, you need to check if SSL is being used to create the replica. Run **SHOW SLAVE STATUS** and check the following setting.
158
147
159
148
```azurecli-interactive
160
149
Master_SSL_Allowed : Yes
@@ -169,14 +158,14 @@ If you're using [Data-in replication](concepts-data-in-replication.md) to connec
169
158
170
159
- If the data-replication is between two Azure Database for MySQL, then you'll need to reset the replica by executing **CALL mysql.az_replication_change_master** and provide the new dual root certificate as last parameter [master_ssl_ca](howto-data-in-replication.md#link-the-source-and-replica-servers-to-start-data-in-replication).
171
160
172
-
### 12. Do we have server-side query to verify if SSL is being used?
161
+
### 11. Do we have server-side query to verify if SSL is being used?
173
162
174
163
To verify if you're using SSL connection to connect to the server refer [SSL verification](howto-configure-ssl.md#verify-the-ssl-connection).
175
164
176
-
### 13. Is there an action needed if I already have the DigiCertGlobalRootG2 in my certificate file?
165
+
### 12. Is there an action needed if I already have the DigiCertGlobalRootG2 in my certificate file?
177
166
178
167
No. There's no action needed if your certificate file already has the **DigiCertGlobalRootG2**.
179
168
180
-
### 14. What if I have further questions?
169
+
### 13. What if I have further questions?
181
170
182
171
If you have questions, get answers from community experts in [Microsoft Q&A](mailto:[email protected]). If you have a support plan and you need technical help, [contact us](mailto:[email protected]).
0 commit comments