Skip to content

Commit fbe3ccb

Browse files
[SSL] Remove references to DigiCert as a CF CA (#18990)
* Delete digicert-update folder and add redirects * Update pages that linked saying will soon be deprecated * Also remove dcv-update, add redirects, and fix hyperlinks * Delete certificate-authority-specific and add redirect * Find 'digicert' and exclude simpler cases * Remove digicert CAA records * Fix broken links on pages that will remain * Update certificate-authorities.mdx * Delete features that relied on Digicert and create redirects * Remove unused digicert-specific partials * Remove DigiCert CAA from wpengine troubleshooting
1 parent 406578e commit fbe3ccb

File tree

29 files changed

+25
-667
lines changed

29 files changed

+25
-667
lines changed

public/_redirects

+7
Original file line numberDiff line numberDiff line change
@@ -1010,6 +1010,7 @@
10101010
/ssl/certificate-transparency-monitoring/ /ssl/edge-certificates/additional-options/certificate-transparency-monitoring/ 301
10111011
/ssl/client-certificates/byo-ca-api-shield/ /ssl/client-certificates/byo-ca/ 301
10121012
/ssl/edge-certificates/certificate-transparency-monitoring/ /ssl/edge-certificates/additional-options/certificate-transparency-monitoring/ 301
1013+
/ssl/edge-certificates/changing-dcv-method/methods/email/ /ssl/edge-certificates/changing-dcv-method/methods/ 301
10131014
/ssl/edge-certificates/custom-certificates/caa-records/ /ssl/edge-certificates/caa-records/ 301
10141015
/ssl/edge-certificates/disable-weak-cipher-suites/ /ssl/edge-certificates/additional-options/cipher-suites/customize-cipher-suites/ 301
10151016
/ssl/edge-certificates/http-strict-transport-security/ /ssl/edge-certificates/additional-options/http-strict-transport-security/ 301
@@ -1021,6 +1022,8 @@
10211022
/ssl/reference/cipher-suites/custom-certificates/ /ssl/edge-certificates/custom-certificates/#certificate-packs 301
10221023
/ssl/reference/cipher-suites/matching-on-origin/ /ssl/origin-configuration/cipher-suites/#match-on-origin 301
10231024
/ssl/reference/migration-guides/lets-encrypt-chain/ /ssl/reference/certificate-authorities/#lets-encrypt 301
1025+
/ssl/reference/migration-guides/dcv-update/ /ssl/reference/migration-guides/ 301
1026+
/ssl/reference/migration-guides/digicert-update/ /ssl/reference/migration-guides/ 301
10241027
/ssl/reference/validation-backoff-schedule/ /ssl/edge-certificates/changing-dcv-method/validation-backoff-schedule/ 301
10251028
/ssl/universal-ssl/changing-dcv-method/ /ssl/edge-certificates/changing-dcv-method/ 301
10261029
/support/dns/how-to/certification-authority-authorization-caa-faq/ /ssl/edge-certificates/troubleshooting/caa-records/ 301
@@ -1039,6 +1042,9 @@
10391042
/cloudflare-for-platforms/cloudflare-for-saas/domain-support/worker-as-origin/ /cloudflare-for-platforms/cloudflare-for-saas/start/advanced-settings/worker-as-origin/ 301
10401043
/cloudflare-for-platforms/cloudflare-for-saas/start/hostname-verification-backoff-schedule/ /cloudflare-for-platforms/cloudflare-for-saas/domain-support/hostname-validation/backoff-schedule/ 301
10411044
/cloudflare-for-platforms/cloudflare-for-saas/domain-support/hostname-verification/ /cloudflare-for-platforms/cloudflare-for-saas/domain-support/hostname-validation/ 301
1045+
/cloudflare-for-platforms/cloudflare-for-saas/reference/status-codes/certificate-authority-specific/ /cloudflare-for-platforms/cloudflare-for-saas/reference/status-codes/ 301
1046+
/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/cname/ /cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/ 301
1047+
/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/email/ /cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/ 301
10421048

10431049
# workers for platforms
10441050
/cloudflare-for-platforms/workers-for-platforms/learning/ /cloudflare-for-platforms/workers-for-platforms/reference/ 301
@@ -1791,6 +1797,7 @@
17911797
/rules/url-forwarding/dynamic-redirects/* /rules/url-forwarding/single-redirects/:splat 301
17921798
/ssl/ssl-tls/* /ssl/reference/:splat 301
17931799
/ssl/reference/cipher-suites/* /ssl/edge-certificates/additional-options/cipher-suites/:splat 301
1800+
/ssl/reference/migration-guides/digicert-update/* /ssl/reference/migration-guides/ 301
17941801
/support/account-management-billing/billing-cloudflare-add-on-services/* https://www.cloudflare.com/plans/ 301
17951802
/tenant/tutorial/* /tenant/get-started/ 301
17961803
/waf/managed-rulesets/* /waf/managed-rules/:splat 301

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/reference/status-codes/certificate-authority-specific.mdx

-47
This file was deleted.

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/saas-customers/provider-guides/wpengine.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,6 @@ If you cannot activate your domain using [proxied DNS records](/dns/manage-dns-r
5252

5353
If you encounter SSL errors, check if you have a `CAA` record.
5454

55-
If you do have a `CAA` record, check that it permits SSL certificates to be issued by `digicert.com` and `letsencrypt.org`.
55+
If you do have a `CAA` record, check that it permits SSL certificates to be issued by `letsencrypt.org`.
5656

5757
For more details, refer to [CAA records](/ssl/edge-certificates/troubleshooting/caa-records/#what-caa-records-are-added-by-cloudflare).

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/renew-certificates.mdx

+1-3
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,7 @@ import { Render } from "~/components"
1313

1414
The exact method for certificate renewal depends on whether that hostname is proxying traffic through Cloudflare and whether it is a wildcard certificate.
1515

16-
Custom hostnames with DigiCert certificates currently have a validity period of one year, though DigiCert is [going to be deprecated](/ssl/reference/migration-guides/digicert-update/) soon as an option. Custom hostnames using Let's Encrypt, Google Trust Services, or SSL.com have a 90-day validity period.
17-
18-
Certificates are available for renewal 30 days before their expiration.
16+
Custom hostnames certificates have a 90-day validity period and are available for renewal 30 days before their expiration.
1917

2018
## Non-wildcard hostnames
2119

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/cname.mdx

-28
This file was deleted.

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/email.mdx

-31
This file was deleted.

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/http.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This HTTP validation should succeed as long as your customer is pointing to your
2323

2424
## Wildcard custom hostnames
2525

26-
HTTP DCV validation is [no longer allowed](/ssl/reference/migration-guides/dcv-update/) for wildcard certificates. You would instead need to use [TXT validation](/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/txt/).
26+
HTTP DCV validation is not allowed for wildcard certificates. You must use [TXT validation](/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/txt/) instead.
2727

2828
***
2929

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/index.mdx

-8
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,6 @@ import { Render } from "~/components"
1515

1616
<Render file="dcv-definition" product="ssl" /> <br/>
1717

18-
:::caution
19-
20-
21-
With the [upcoming change](/ssl/reference/migration-guides/digicert-update/custom-hostname-certificates/) to certificates issued by DigiCert, both [email](/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/email/) and [CNAME](/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/cname/) DCV will soon be unsupported.
22-
23-
24-
:::
25-
2618
## DCV situations
2719

2820
### Non-wildcard certificates

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/troubleshooting.mdx

-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,6 @@ If a domain is flagged by the CA, you need to contact Support before validation
2626
If your customer has `CAA` records set on their domain, they will either need to add the following or remove `CAA` entirely:
2727

2828
```txt
29-
example.com. IN CAA 0 issue "digicert.com"
3029
example.com. IN CAA 0 issue "letsencrypt.org"
3130
example.com. IN CAA 0 issue "pki.goog"
3231
```

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/txt.mdx

+1-9
Original file line numberDiff line numberDiff line change
@@ -62,12 +62,4 @@ You will then need to share these TXT tokens with your customers.
6262

6363
Your DCV tokens expire after a [certain amount of time](/cloudflare-for-platforms/cloudflare-for-saas/reference/token-validity-periods/), depending on your certificate authority.
6464

65-
This means that, if your customers take too long to place their tokens at their authoritative DNS provider, you may need to [get new tokens](#1-get-txt-tokens) and re-share them with your customer.
66-
67-
---
68-
69-
### DigiCert
70-
71-
If you create a hostname with DigiCert as the certificate authority, you only need to share one TXT record for your customer to place at their authoritative DNS provider.
72-
73-
However, Cloudflare [will soon be deprecating](/ssl/reference/migration-guides/digicert-update/) DigiCert as an issuing CA for custom hostnames, so we recommend you follow our [migration guide](/ssl/reference/migration-guides/digicert-update/custom-hostname-certificates/) to move your custom hostnames over to another CA.
65+
This means that, if your customers take too long to place their tokens at their authoritative DNS provider, you may need to [get new tokens](#1-get-txt-tokens) and re-share them with your customer.

src/content/docs/pages/configuration/custom-domains.mdx

-2
Original file line numberDiff line numberDiff line change
@@ -100,11 +100,9 @@ To resolve this, add the necessary CAA records to allow Cloudflare to issue a ce
100100

101101
```
102102
example.com. 300 IN CAA 0 issue "comodoca.com"
103-
example.com. 300 IN CAA 0 issue "digicert.com; cansignhttpexchanges=yes"
104103
example.com. 300 IN CAA 0 issue "letsencrypt.org"
105104
example.com. 300 IN CAA 0 issue "pki.goog; cansignhttpexchanges=yes"
106105
example.com. 300 IN CAA 0 issuewild "comodoca.com"
107-
example.com. 300 IN CAA 0 issuewild "digicert.com; cansignhttpexchanges=yes"
108106
example.com. 300 IN CAA 0 issuewild "letsencrypt.org"
109107
example.com. 300 IN CAA 0 issuewild "pki.goog; cansignhttpexchanges=yes"
110108
```

src/content/docs/pages/configuration/debugging-pages.mdx

-2
Original file line numberDiff line numberDiff line change
@@ -157,11 +157,9 @@ To resolve this, you will need to add the following CAA records which allows all
157157
158158
```
159159
example.com. 300 IN CAA 0 issue "comodoca.com"
160-
example.com. 300 IN CAA 0 issue "digicert.com; cansignhttpexchanges=yes"
161160
example.com. 300 IN CAA 0 issue "letsencrypt.org"
162161
example.com. 300 IN CAA 0 issue "pki.goog; cansignhttpexchanges=yes"
163162
example.com. 300 IN CAA 0 issuewild "comodoca.com"
164-
example.com. 300 IN CAA 0 issuewild "digicert.com; cansignhttpexchanges=yes"
165163
example.com. 300 IN CAA 0 issuewild "letsencrypt.org"
166164
example.com. 300 IN CAA 0 issuewild "pki.goog; cansignhttpexchanges=yes"
167165
```

src/content/docs/speed/optimization/other/signed-exchanges/reference.mdx

-2
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,6 @@ dig example.com caa
3030

3131
```bash output
3232
;; ANSWER SECTION:
33-
example.com. 3600 IN CAA 0 issue "digicert.com; cansignhttpexchanges=yes"
3433
example.com. 3600 IN CAA 0 issue "pki.goog; cansignhttpexchanges=yes"
35-
example.com. 3600 IN CAA 0 issuewild "digicert.com; cansignhttpexchanges=yes"
3634
example.com. 3600 IN CAA 0 issuewild "pki.goog; cansignhttpexchanges=yes"
3735
```

src/content/docs/ssl/edge-certificates/additional-options/certificate-transparency-monitoring.mdx

+2-4
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ You *should* take action when something is clearly wrong, such as if you:
5454
* Do not recognize the certificate issuer.
5555
:::note
5656

57-
Note that Cloudflare provisions backup certificates, so you may see a certificate listed that is not in active use for your site. The [Edge Certificates page](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/edge-certificates) will show all certificates requested for your site.
57+
Cloudflare provisions backup certificates, so you may see a certificate listed that is not in active use for your site. The [Edge Certificates page](https://dash.cloudflare.com/?to=/:account/:zone/ssl-tls/edge-certificates) will show all certificates requested for your site.
5858
:::
5959
* Have recently noticed problems with your website.
6060

@@ -66,8 +66,6 @@ You *should* take action when something is clearly wrong, such as if you:
6666

6767
Only Certificate Authorities can revoke malicious certificates. If you believe an illegitimate certificate was issued for your domain, contact the Certificate Authority listed as the **Issuer** in the email.
6868

69-
* [DigiCert support](https://www.digicert.com/support/#Contact)
70-
7169
* [GlobalSign support](https://support.globalsign.com/)
7270

7371
* [GoDaddy support](https://www.godaddy.com/contact-us?sp_hp=B)
@@ -76,7 +74,7 @@ Only Certificate Authorities can revoke malicious certificates. If you believe a
7674

7775
* [IdenTrust support](https://www.identrust.com/support/support-team)
7876

79-
* [Lets Encrypt support](https://letsencrypt.org/contact/)
77+
* [Let's Encrypt support](https://letsencrypt.org/contact/)
8078

8179
* [Sectigo support](https://sectigo.com/support)
8280

src/content/docs/ssl/edge-certificates/advanced-certificate-manager/manage-certificates.mdx

-6
Original file line numberDiff line numberDiff line change
@@ -89,12 +89,6 @@ Normally, you only need to update DCV if you have your application on a partial
8989

9090
For more information about DCV, refer to [DCV methods](/ssl/edge-certificates/changing-dcv-method/).
9191

92-
:::caution
93-
94-
Due to recent changes, HTTP DCV validation will soon not be allowed for wildcard certificates or certificates with multiple Subject Alternative Names (SANs). For more details and next steps, refer to [Changes to HTTP DCV](/ssl/reference/migration-guides/dcv-update/).
95-
96-
:::
97-
9892
---
9993

10094
## Set up alerts

src/content/docs/ssl/edge-certificates/changing-dcv-method/methods/email.mdx

-53
This file was deleted.

src/content/docs/ssl/edge-certificates/changing-dcv-method/validation-backoff-schedule.mdx

-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,6 @@ The DCV process relies on tokens that are generated by the issuing certificate a
2929
* Google Trust Services - 14 days
3030
* Let's Encrypt - 7 days
3131
* SSL.com - 14 days
32-
* DigiCert - 30 days
3332

3433
After this period, DCV tokens expire as dictated by the [CA/B Baseline Requirements](https://cabforum.org/baseline-requirements-documents/), and new, valid tokens must be placed.
3534

src/content/docs/ssl/edge-certificates/troubleshooting/ca-faq.mdx

+2-2
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ Yes. Cloudflare can issue both RSA and ECDSA certificates.
2121

2222
### Which certificate authorities does Cloudflare use?
2323

24-
Cloudflare uses Let's Encrypt, Google Trust Services, SSL.com, Sectigo, and DigiCert. You can see a complete list of products and available CAs and algorithms in the [certificate authorities reference page](/ssl/reference/certificate-authorities/).
24+
Cloudflare uses Let's Encrypt, Google Trust Services, SSL.com, and Sectigo. You can see a complete list of products and available CAs and algorithms in the [certificate authorities reference page](/ssl/reference/certificate-authorities/).
2525

26-
[DigiCert will soon be removed as a CA from the Cloudflare pipeline](/ssl/reference/migration-guides/digicert-update/) and Sectigo is only used for [backup certificates](/ssl/edge-certificates/backup-certificates/).
26+
Sectigo is only used for [backup certificates](/ssl/edge-certificates/backup-certificates/).
2727

2828
### Are there any CA limitations I should know about?
2929

0 commit comments

Comments
 (0)