Skip to content

Commit 6dc0901

Browse files
committed
Certicate chain update
1 parent e4c4258 commit 6dc0901

File tree

2 files changed

+12
-4
lines changed

2 files changed

+12
-4
lines changed

articles/virtual-machines/linux/instance-metadata-service.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: virtual-machines-linux
88
ms.subservice: monitoring
99
ms.topic: article
1010
ms.workload: infrastructure-services
11-
ms.date: 02/24/2020
11+
ms.date: 03/30/2020
1212
ms.author: sukumari
1313
ms.reviewer: azmetadata
1414
---
@@ -686,12 +686,16 @@ openssl x509 -noout -issuer -in signer.pem
686686
openssl x509 -noout -subject -in intermediate.pem
687687
# Verify the issuer for the intermediate certificate
688688
openssl x509 -noout -issuer -in intermediate.pem
689-
# Verify the certificate chain
689+
# Verify the certificate chain, for Azure China 21Vianet the intermediate certificate will be from DigiCert Global Root CA
690690
openssl verify -verbose -CAfile /etc/ssl/certs/Baltimore_CyberTrust_Root.pem -untrusted intermediate.pem signer.pem
691691
```
692692

693693
In cases where the intermediate certificate cannot be downloaded due to network constraints during validation, the intermediate certificate can be pinned. However, Azure will roll over the certificates as per standard PKI practice. The pinned certificates would need to be updated when roll over happens. Whenever a change to update the intermediate certificate is planned, the Azure blog will be updated and Azure customers will be notified. The intermediate certificates can be found [here](https://www.microsoft.com/pki/mscorp/cps/default.htm). The intermediate certificates for each of the regions can be different.
694694

695+
> [!NOTE]
696+
>The intermediate certificate for Azure China 21Vianet will be from DigiCert Global Root CA instead of Baltimore.
697+
Also if you had pinned the intermediate certificates for Azure China as part of root chain authority change, the intermediate certificates will have to be updated.
698+
695699
### Storage profile
696700

697701
Instance Metadata Service can provide details about the storage disks associated with the VM. This data can be found at the instance/compute/storageProfile endpoint.

articles/virtual-machines/windows/instance-metadata-service.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.service: virtual-machines-windows
1313
ms.topic: article
1414
ms.tgt_pltfrm: vm-windows
1515
ms.workload: infrastructure-services
16-
ms.date: 02/24/2020
16+
ms.date: 03/30/2020
1717
ms.author: sukumari
1818
ms.reviewer: azmetadata
1919
---
@@ -855,12 +855,16 @@ openssl x509 -noout -issuer -in signer.pem
855855
openssl x509 -noout -subject -in intermediate.pem
856856
# Verify the issuer for the intermediate certificate
857857
openssl x509 -noout -issuer -in intermediate.pem
858-
# Verify the certificate chain
858+
# Verify the certificate chain, for Azure China 21Vianet the intermediate certificate will be from DigiCert Global Root CA
859859
openssl verify -verbose -CAfile /etc/ssl/certs/Baltimore_CyberTrust_Root.pem -untrusted intermediate.pem signer.pem
860860
```
861861

862862
In cases where the intermediate certificate cannot be downloaded due to network constraints during validation, the intermediate certificate can be pinned. However, Azure will roll over the certificates as per standard PKI practice. The pinned certificates would need to be updated when roll over happens. Whenever a change to update the intermediate certificate is planned, the Azure blog will be updated and Azure customers will be notified. The intermediate certificates can be found [here](https://www.microsoft.com/pki/mscorp/cps/default.htm). The intermediate certificates for each of the regions can be different.
863863

864+
> [!NOTE]
865+
> The intermediate certificate for Azure China 21Vianet will be from DigiCert Global Root CA instead of Baltimore.
866+
Also if you had pinned the intermediate certificates for Azure China as part of root chain authority change, the intermediate certificates will have to be updated.
867+
864868
### Failover Clustering in Windows Server
865869

866870
For certain scenarios, when querying Instance Metadata Service with Failover Clustering, it is necessary to add a route to the routing table.

0 commit comments

Comments
 (0)