@@ -36,6 +36,7 @@ Any entity trying to access Microsoft Entra identity services via the TLS/SSL pr
36
36
| [ DigiCert Global Root CA] ( https://cacerts.digicert.com/DigiCertGlobalRootCA.crt ) | 0x083be056904246b1a1756ac95991c74a<br >A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 |
37
37
| [ DigiCert Global Root G2] ( https://cacerts.digicert.com/DigiCertGlobalRootG2.crt ) | 0x033af1e6a711a9a0bb2864b11d09fae5<br >DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 |
38
38
| [ DigiCert Global Root G3] ( https://cacerts.digicert.com/DigiCertGlobalRootG3.crt ) | 0x055556bcf25ea43535c3a40fd5ab4572<br >7E04DE896A3E666D00E687D33FFAD93BE83D349E |
39
+ | [ Entrust Root Certification Authority G2] ( https://web.entrust.com/root-certificates/entrust_g2_ca.cer ) | 4a538c28<br >8cf427fd790c3ad166068de81e57efbb932272d4 |
39
40
| [ Microsoft ECC Root Certificate Authority 2017] ( https://www.microsoft.com/pkiops/certs/Microsoft%20ECC%20Root%20Certificate%20Authority%202017.crt ) | 0x66f23daf87de8bb14aea0c573101c2ec<br >999A64C37FF47D9FAB95F14769891460EEC4C3C5 |
40
41
| [ Microsoft RSA Root Certificate Authority 2017] ( https://www.microsoft.com/pkiops/certs/Microsoft%20RSA%20Root%20Certificate%20Authority%202017.crt ) | 0x1ed397095fd8b4b347701eaabe7f45b3<br >73a5e64a3bff8316ff0edccc618a906e4eae4d74 |
41
42
@@ -50,6 +51,8 @@ Any entity trying to access Microsoft Entra identity services via the TLS/SSL pr
50
51
| [ DigiCert TLS Hybrid ECC SHA384 2020 CA1] ( https://crt.sh/?d=3422153452 ) | 0x0a275fe704d6eecb23d5cd5b4b1a4e04<br >51E39A8BDB08878C52D6186588A0FA266A69CF28 |
51
52
| [ DigiCert TLS RSA SHA256 2020 CA1] ( https://crt.sh/?d=4385364571 ) | 0x06d8d904d5584346f68a2fa754227ec4<br >1C58A3A8518E8759BF075B76B750D4F2DF264FCD |
52
53
| [ DigiCert TLS RSA SHA256 2020 CA1] ( https://crt.sh/?d=6938FD4D98BAB03FAADB97B34396831E3780AEA1 ) | 0a3508d55c292b017df8ad65c00ff7e4<br >6938fd4d98bab03faadb97b34396831e3780aea1 |
54
+ | [ Entrust Certification Authority - L1K] ( https://aia.entrust.net/l1k-chain256.cer ) | 0ee94cc30000000051d37785<br >f21c12f46cdb6b2e16f09f9419cdff328437b2d7 |
55
+ | [ Entrust Certification Authority - L1M] ( https://aia.entrust.net/l1m-chain256.cer ) | 61a1e7d20000000051d366a6<br >cc136695639065fab47074d28c55314c66077e90 |
53
56
| [ GeoTrust Global TLS RSA4096 SHA256 2022 CA1] ( https://crt.sh/?d=6670931375 ) | 0x0f622f6f21c2ff5d521f723a1d47d62d<br >7E6DB7B7584D8CF2003E0931E6CFC41A3A62D3DF |
54
57
| [ Microsoft Azure ECC TLS Issuing CA 03] ( https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20ECC%20TLS%20Issuing%20CA%2003%20-%20xsign.crt ) | 0x01529ee8368f0b5d72ba433e2d8ea62d<br >56D955C849887874AA1767810366D90ADF6C8536 |
55
58
| [ Microsoft Azure ECC TLS Issuing CA 03] ( https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20ECC%20TLS%20Issuing%20CA%2003.crt ) | 0x330000003322a2579b5e698bcc000000000033<br >91503BE7BF74E2A10AA078B48B71C3477175FEC3 |
@@ -104,6 +107,9 @@ Any entity trying to access Microsoft Entra identity services via the TLS/SSL pr
104
107
| └ [ Microsoft Azure ECC TLS Issuing CA 04] ( https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20ECC%20TLS%20Issuing%20CA%2004%20-%20xsign.crt ) | 0x02393d48d702425a7cb41c000b0ed7ca<br >FB73FDC24F06998E070A06B6AFC78FDF2A155B25 |
105
108
| └ [ Microsoft Azure ECC TLS Issuing CA 07] ( https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20ECC%20TLS%20Issuing%20CA%2007%20-%20xsign.crt ) | 0x0f1f157582cdcd33734bdc5fcd941a33<br >3BE6CA5856E3B9709056DA51F32CBC8970A83E28 |
106
109
| └ [ Microsoft Azure ECC TLS Issuing CA 08] ( https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20ECC%20TLS%20Issuing%20CA%2008%20-%20xsign.crt ) | 0x0ef2e5d83681520255e92c608fbc2ff4<br >716DF84638AC8E6EEBE64416C8DD38C2A25F6630 |
110
+ | [ ** Entrust Root Certification Authority G2** ] ( https://web.entrust.com/root-certificates/entrust_g2_ca.cer ) | 4a538c28<br >8cf427fd790c3ad166068de81e57efbb932272d4 |
111
+ | └ [ Entrust Certification Authority - L1K] ( https://aia.entrust.net/l1k-chain256.cer ) | 0ee94cc30000000051d37785<br >f21c12f46cdb6b2e16f09f9419cdff328437b2d7 |
112
+ | └ [ Entrust Certification Authority - L1M] ( https://aia.entrust.net/l1m-chain256.cer ) | 61a1e7d20000000051d366a6<br >cc136695639065fab47074d28c55314c66077e90 |
107
113
| [ ** Microsoft ECC Root Certificate Authority 2017** ] ( https://www.microsoft.com/pkiops/certs/Microsoft%20ECC%20Root%20Certificate%20Authority%202017.crt ) | 0x66f23daf87de8bb14aea0c573101c2ec<br >999A64C37FF47D9FAB95F14769891460EEC4C3C5 |
108
114
| └ [ Microsoft Azure ECC TLS Issuing CA 03] ( https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20ECC%20TLS%20Issuing%20CA%2003.crt ) | 0x330000003322a2579b5e698bcc000000000033<br >91503BE7BF74E2A10AA078B48B71C3477175FEC3 |
109
115
| └ [ Microsoft Azure ECC TLS Issuing CA 04] ( https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20ECC%20TLS%20Issuing%20CA%2004.crt ) | 0x33000000322164aedab61f509d000000000032<br >406E3B38EFF35A727F276FE993590B70F8224AED |
@@ -252,6 +258,7 @@ Microsoft updated Azure services to use TLS certificates from a different set of
252
258
253
259
### Article change log
254
260
261
+ - July 22, 2024: Added Entrust CAs from a parallel Microsoft 365 article to provide a comprehensive list.
255
262
- June 27, 2024: Removed the following CAs, which were superseded by both versions of Microsoft Azure ECC TLS Issuing CAs 03, 04, 07, 08.
256
263
257
264
| Certificate Authority | Serial Number<br>Thumbprint |
0 commit comments