Skip to content

Commit 72e2ac3

Browse files
authored
Merge pull request #109622 from KumariSupriya/KumariSupriya_CertChinaUpdate
Certificate Authority update for China
2 parents 1538048 + 18be26d commit 72e2ac3

File tree

2 files changed

+14
-6
lines changed

2 files changed

+14
-6
lines changed

articles/virtual-machines/linux/instance-metadata-service.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: virtual-machines-linux
88
ms.subservice: monitoring
99
ms.topic: article
1010
ms.workload: infrastructure-services
11-
ms.date: 02/24/2020
11+
ms.date: 03/30/2020
1212
ms.author: sukumari
1313
ms.reviewer: azmetadata
1414
---
@@ -686,11 +686,15 @@ openssl x509 -noout -issuer -in signer.pem
686686
openssl x509 -noout -subject -in intermediate.pem
687687
# Verify the issuer for the intermediate certificate
688688
openssl x509 -noout -issuer -in intermediate.pem
689-
# Verify the certificate chain
689+
# Verify the certificate chain, for Azure China 21Vianet the intermediate certificate will be from DigiCert Global Root CA
690690
openssl verify -verbose -CAfile /etc/ssl/certs/Baltimore_CyberTrust_Root.pem -untrusted intermediate.pem signer.pem
691691
```
692692

693-
In cases where the intermediate certificate cannot be downloaded due to network constraints during validation, the intermediate certificate can be pinned. However, Azure will roll over the certificates as per standard PKI practice. The pinned certificates would need to be updated when roll over happens. Whenever a change to update the intermediate certificate is planned, the Azure blog will be updated and Azure customers will be notified. The intermediate certificates can be found [here](https://www.microsoft.com/pki/mscorp/cps/default.htm). The intermediate certificates for each of the regions can be different.
693+
In cases where the intermediate certificate cannot be downloaded due to network constraints during validation, the intermediate certificate can be pinned. However, Azure will roll over the certificates as per standard PKI practice. The pinned certificates would need to be updated when rollover happens. Whenever a change to update the intermediate certificate is planned, the Azure blog will be updated and Azure customers will be notified. The intermediate certificates can be found [here](https://www.microsoft.com/pki/mscorp/cps/default.htm). The intermediate certificates for each of the regions can be different.
694+
695+
> [!NOTE]
696+
>The intermediate certificate for Azure China 21Vianet will be from DigiCert Global Root CA instead of Baltimore.
697+
Also if you had pinned the intermediate certificates for Azure China as part of root chain authority change, the intermediate certificates will have to be updated.
694698

695699
### Storage profile
696700

articles/virtual-machines/windows/instance-metadata-service.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.service: virtual-machines-windows
1313
ms.topic: article
1414
ms.tgt_pltfrm: vm-windows
1515
ms.workload: infrastructure-services
16-
ms.date: 02/24/2020
16+
ms.date: 03/30/2020
1717
ms.author: sukumari
1818
ms.reviewer: azmetadata
1919
---
@@ -855,11 +855,15 @@ openssl x509 -noout -issuer -in signer.pem
855855
openssl x509 -noout -subject -in intermediate.pem
856856
# Verify the issuer for the intermediate certificate
857857
openssl x509 -noout -issuer -in intermediate.pem
858-
# Verify the certificate chain
858+
# Verify the certificate chain, for Azure China 21Vianet the intermediate certificate will be from DigiCert Global Root CA
859859
openssl verify -verbose -CAfile /etc/ssl/certs/Baltimore_CyberTrust_Root.pem -untrusted intermediate.pem signer.pem
860860
```
861861

862-
In cases where the intermediate certificate cannot be downloaded due to network constraints during validation, the intermediate certificate can be pinned. However, Azure will roll over the certificates as per standard PKI practice. The pinned certificates would need to be updated when roll over happens. Whenever a change to update the intermediate certificate is planned, the Azure blog will be updated and Azure customers will be notified. The intermediate certificates can be found [here](https://www.microsoft.com/pki/mscorp/cps/default.htm). The intermediate certificates for each of the regions can be different.
862+
In cases where the intermediate certificate cannot be downloaded due to network constraints during validation, the intermediate certificate can be pinned. However, Azure will roll over the certificates as per standard PKI practice. The pinned certificates would need to be updated when rollover happens. Whenever a change to update the intermediate certificate is planned, the Azure blog will be updated and Azure customers will be notified. The intermediate certificates can be found [here](https://www.microsoft.com/pki/mscorp/cps/default.htm). The intermediate certificates for each of the regions can be different.
863+
864+
> [!NOTE]
865+
> The intermediate certificate for Azure China 21Vianet will be from DigiCert Global Root CA instead of Baltimore.
866+
Also if you had pinned the intermediate certificates for Azure China as part of root chain authority change, the intermediate certificates will have to be updated.
863867

864868
### Failover Clustering in Windows Server
865869

0 commit comments

Comments
 (0)