Azure Instance Metadata Service-Attested data TLS: Critical changes are almost here!

Published Nov 09 2021 12:05 PM 1,902 Views
Microsoft

In 2020 most Azure services were updated to use TLS certificates from Certificate Authorities (CAs) that chain up to the DigiCert Global G2 root. However, Azure Instance Metadata Service -Attested data certificate, remained on TLS certificates issued by the Baltimore CyberTrust Root. The time has now come Azure Instance Metadata Service -Attested data to switch from the Baltimore CyberTrust CA Root to the DigiCert Global G2 CA Root*. The migration will start in February 2022, and finish by end of March 2022.  

We expect that most Azure Instance Metadata Service customers will not be impacted; however, if you use the Attested data endpoint you may be impacted if you explicitly specify a list of acceptable CAs (a practice known as “certificate pinning”)

This change is limited to public Azure cloud and US Government cloud. There are no changes in other sovereign clouds like Azure China

 

If your application has pinned to the root CA Baltimore CyberTrust Root or current intermediate CAs listed in the table belowimmediate action is required to prevent disruption in applications using Instance Metadata Service Attested Data endpoint.

* Other Azure service TLS certificates may be issued by a different PKI. 

 

Action Required 

  • If your client application has pinned to the Baltimore CyberTrust Root CA, in addition to Baltimore, add the DigiCert Global Root G2 to your trusted root store before February 2022. 
  • If your client application has pinned to the intermediate CAs, in addition to Microsoft RSA TLS CAs, add the Microsoft Azure TLS Issuing CAs to your trusted root store before February 2022. 
  • Keep using the current root or intermediate CAs in your applications or devices until the transition period is completed (necessary to prevent connection interruption). 

How to check 

1. If your client application has pinned to  

  • Root CA: Baltimore CyberTrust Root CA or,  
  • Intermediate CA:  Microsoft RSA TLS CA 01 
  • Intermediate CA:  Microsoft RSA TLS CA 02   

detailed in the table below, then search your source code for the thumbprint, Common Name, and other cert properties of any of the root CA or intermediate CAs. If there is a match, then your application will be impacted, immediate action is required:  

  • To continue without disruption due to this change, Microsoft recommends that client applications or devices trust the root CA – DigiCert Global Root G2  (Thumbprint: df3c24f9bfd666761b268073fe06d1cc8d4f82a4) 
  • Intermediate certificates are expected to change more frequently than root CA. Customers who use certificate pinning are recommended to NOT taking dependencies on them and instead pin to the root certificate, as it rolls less frequently.
    If you are currently pinning to the intermediate CAs and have a requirement to continue pinning to intermediate CAs, to prevent disruption due to this change, you should update the source code to add the intermediate Microsoft Azure TLS Issuing CAs listed in the table below to the trusted store. 

2. To prevent future disruption, you should also add the following roots to the trusted store. This will save you from the allow list effort in near future if you add the recommended root CAs now: 

Note: If you have a requirement to pin to intermediate CAs, to prevent future disruption, you should also add the intermediate Microsoft Azure ECC TLS CAs listed in the table below to the trusted store.

 

Certificate Renewal Summary 

The table below provides information about the certificates that are being rolled. Depending on which certificate your service uses for establishing TLS connections, action may be needed to prevent disruption in applications using Instance Metadata Service Attested Data endpoint.

 

Certificate 

Current 

Post Rollover (February, 2022 – March, 2022) 

Action 

Root 

Thumbprint (SHA1): d4de20d05e66fc53fe1a50882c78db2852cae474 
Expiration: Monday, May 12, 2025, 4:59:00 PM 
Subject Name: 
CN = Baltimore CyberTrust Root 

OU = CyberTrust 
O = Baltimore 
C = IE  

Thumbprint (SHA1): df3c24f9bfd666761b268073fe06d1cc8d4f82a4 

Expiration: ‎Friday, ‎January ‎15, ‎2038 5:00:00 AM 
Subject Name: 
CN = DigiCert Global Root G2 
OU = www.digicert.com 
O = DigiCert Inc 
C = US  

 

Required before February 2022

 

Root 

  

Thumbprint (SHA1): 
7e04de896a3e666d00e687d33ffad93be83d349e 
Expiration: ‎Friday, ‎January ‎15, ‎2038 5:00:00 AM 
CN = DigiCert Global Root G3 
OU = www.digicert.com 
O = DigiCert Inc 
C = US 

 

Thumbprint (SHA1): 
73a5e64a3bff8316ff0edccc618a906e4eae4d74 
Expiration: ‎Friday, ‎July ‎18, ‎2042 4:00:23 PM 
CN = Microsoft RSA Root Certificate Authority 2017 
O = Microsoft Corporation 
C = US 

 

Thumbprint (SHA1): 
999a64c37ff47d9fab95f14769891460eec4c3c5 
Expiration: ‎Friday, ‎July ‎18, ‎2042 4:16:04 PM 
CN = Microsoft ECC Root Certificate Authority 2017 
O = Microsoft Corporation 
C = US 

 

Recommended to prevent disruption 
from future changes 

Intermediates 

Thumbprints (SHA1):  

  

CN = Microsoft RSA TLS CA 01 

Thumbprint: 

703d7a8f0ebf55aaa59f98eaf4a206004eb2516a 

 

CN = Microsoft RSA TLS CA 02 

Thumbprint: b0c2d2d13cdd56cdaa6ab6e2c04440be4a429c75 

  

Expiration: ‎Tuesday, ‎October ‎8, ‎2024 12:00:00 AM;  
Subject Name:  

O = Microsoft Corporation 

C = US 

Thumbprints (SHA1):  

  

CN = Microsoft Azure TLS Issuing CA 01 
Thumbprint:  

b9ed88eb05c15c79639493016200fdab08137af3 

 

CN = Microsoft Azure TLS Issuing CA 02 

Thumbprint:  

c5fb956a0e7672e9857b402008e7ccad031f9b08 

 

CN = Microsoft Azure TLS Issuing CA 05  

Thumbprint:  

56f1ca470bb94e274b516a330494c792c419cf87 

 

CN = Microsoft Azure TLS Issuing CA 06 

Thumbprint:  

8f1fd57f27c828d7be29743b4d02cd7e6e5f43e6 

 

Expiration: ‎Thursday, ‎June 27, ‎2024 4:59:59 PM;  
Subject Name: 

Issuer = Microsoft RSA Root Certificate Authority 2017 

O = Microsoft Corporation 

C = US 

 

-------------------------------------------------------

 

CN = Microsoft Azure TLS Issuing CA 01 
Thumbprint:  

2f2877c5d778c31e0f29c7e371df5471bd673173 

 

CN = Microsoft Azure TLS Issuing CA 02 

Thumbprint:  

e7eea674ca718e3befd90858e09f8372ad0ae2aa 

 

CN = Microsoft Azure TLS Issuing CA 05 
Thumbprint:  

6c3af02e7f269aa73afd0eff2a88a4a1f04ed1e5 

 

CN = Microsoft Azure TLS Issuing CA 06 

Thumbprint:  

30e01761ab97e59a06b41ef20af6f2de7ef4f7b0 

 

Expiration: ‎Thursday, ‎June 27, ‎2024 4:59:59 PM;  
Subject Name:  

Issuer = DigiCert Global Root G2 

O = DigiCert Inc 

C = US 

 

Required before February 2022

Intermediates 

 

Thumbprints (SHA1):  

 

CN = Microsoft Azure ECC TLS Issuing CA 01 

Thumbprint:  

cda57423ec5e7192901ca1bf6169dbe48e8d1268 

 

CN = Microsoft Azure ECC TLS Issuing CA 02 

Thumbprint:  

489ff5765030eb28342477693eb183a4ded4d2a6 

 

CN = Microsoft Azure ECC TLS Issuing CA 05 

Thumbprint:  

4c15bc8d7aa5089a84f2ac4750f040d064040cd4 

 

CN = Microsoft Azure ECC TLS Issuing CA 06 

Thumbprint:  

dfeb65e575d03d0cc59fd60066c6d39421e65483 

 

Expiration: ‎Thursday, ‎June 27, ‎2024 4:59:59 PM;  
Subject Name: 

Issuer = Microsoft ECC Root Certificate Authority 2017 

O = Microsoft Corporation 

C = US 

 

-------------------------------------------------------

 

CN = Microsoft Azure ECC TLS Issuing CA 01 

Thumbprint:  

92503d0d74a7d3708197b6ee13082d52117a6ab0 

 

CN = Microsoft Azure ECC TLS Issuing CA 02 

Thumbprint:  

1e981ccddc69102a45c6693ee84389c3cf2329f1 

 

CN = Microsoft Azure ECC TLS Issuing CA 05 

Thumbprint:  

c6363570af8303cdf31c1d5ad81e19dbfe172531 

 

CN = Microsoft Azure ECC TLS Issuing CA 06 

Thumbprint:  

7365adaedfea4909c1baadbab68719ad0c381163 

 

Expiration: ‎Thursday, ‎June 27, ‎2024 4:59:59 PM;  
Subject Name:  

Issuer = DigiCert Global Root G3 

O = DigiCert Inc 

C = US 

Recommended to prevent disruption from 
future changes 

 

 

 

 

%3CLINGO-SUB%20id%3D%22lingo-sub-2888953%22%20slang%3D%22en-US%22%3EAzure%20Instance%20Metadata%20Service-Attested%20data%20TLS%3A%20Critical%20changes%20are%20almost%20here!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2888953%22%20slang%3D%22en-US%22%3E%3CP%3EIn%202020%20most%20Azure%20services%20were%20updated%20to%20use%20TLS%20certificates%20from%20Certificate%20Authorities%20(CAs)%20that%20chain%20up%20to%20the%20DigiCert%20Global%20G2%20root.%20However%2C%E2%80%AF%3CSTRONG%3E%3CEM%3EAzure%20Instance%20Metadata%20Service%20-Attested%20data%20certificate%3C%2FEM%3E%3C%2FSTRONG%3E%2C%20remained%20on%20TLS%20certificates%20issued%20by%20the%20Baltimore%20CyberTrust%20Root.%26nbsp%3BThe%20time%20has%20now%26nbsp%3Bcome%20Azure%20Instance%20Metadata%20Service%20-Attested%20data%20to%20switch%20from%20the%20Baltimore%20CyberTrust%20CA%20Root%20to%20the%20DigiCert%20Global%20G2%20CA%26nbsp%3BRoot*.%26nbsp%3B%3CSTRONG%3EThe%26nbsp%3Bmigration%26nbsp%3Bwill%26nbsp%3Bstart%20in%20February%202022%2C%20and%20finish%20by%26nbsp%3Bend%20of%26nbsp%3BMarch%26nbsp%3B2022.%E2%80%AF%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EWe%20expect%20that%20most%20Azure%26nbsp%3BInstance%20Metadata%20Service%20customers%20will%20not%20be%20impacted%3B%20however%2C%20if%20you%20use%20the%20Attested%20data%20endpoint%20you%20may%20be%20impacted%26nbsp%3Bif%20you%20explicitly%20specify%20a%20list%20of%20acceptable%20CAs%20(a%20practice%20known%20as%20%E2%80%9Ccertificate%20pinning%E2%80%9D)%3C%2FSTRONG%3E.%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20change%20is%20limited%26nbsp%3Bto%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fregions%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Epublic%20Azure%20cloud%20and%20US%20Government%20cloud%3C%2FA%3E.%26nbsp%3BThere%20are%20no%20changes%20in%20other%26nbsp%3Bsovereign%20clouds%26nbsp%3Blike%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fazure.cn%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAzure%20China%3C%2FA%3E.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EIf%20your%20application%20has%20pinned%20to%26nbsp%3Bthe%26nbsp%3Broot%20CA%26nbsp%3BBaltimore%20CyberTrust%20Root%26nbsp%3Bor%26nbsp%3Bcurrent%26nbsp%3Bintermediate%20CAs%26nbsp%3Blisted%20in%20the%20table%20below%3C%2FSTRONG%3E%2C%26nbsp%3B%3CSTRONG%3Eimmediate%20action%20is%20required%3C%2FSTRONG%3E%26nbsp%3Bto%20prevent%20disruption%20in%20applications%20using%20Instance%20Metadata%20Service%20Attested%20Data%20endpoint.%3C%2FP%3E%0A%3CP%3E%3CEM%3E*%26nbsp%3BOther%20Azure%20service%20TLS%20certificates%20may%20be%20issued%20by%20a%20different%20PKI.%3C%2FEM%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--2117874702%22%20id%3D%22toc-hId--2116985679%22%3E%3CSTRONG%3E%3CEM%3EAction%20Required%26nbsp%3B%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CUL%3E%0A%3CLI%3EIf%20your%20client%20application%20has%20pinned%20to%20the%20Baltimore%20CyberTrust%20Root%20CA%2C%20in%20addition%20to%20Baltimore%2C%20add%26nbsp%3Bthe%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.digicert.com%2Fkb%2Fdigicert-root-certificates.htm%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EDigiCert%20Global%20Root%20G2%3C%2FA%3E%26nbsp%3Bto%20your%20trusted%20root%20store%26nbsp%3Bbefore%20February%202022.%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EIf%20your%20client%20application%20has%20pinned%20to%20the%26nbsp%3Bintermediate%26nbsp%3BCAs%2C%20in%20addition%20to%26nbsp%3BMicrosoft%20RSA%20TLS%20CAs%2C%20add%20the%26nbsp%3BMicrosoft%20Azure%20TLS%20Issuing%20CAs%E2%80%AFto%20your%20trusted%20root%20store%26nbsp%3Bbefore%26nbsp%3BFebruary%202022.%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EKeep%20using%20the%20current%20root%20or%20intermediate%20CAs%20in%20your%20applications%20or%20devices%20until%20the%20transition%20period%20is%20completed%20(necessary%20to%20prevent%20connection%20interruption).%26nbsp%3B%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH3%20id%3D%22toc-hId-369638131%22%20id%3D%22toc-hId-370527154%22%3E%3CSTRONG%3E%3CEM%3EHow%20to%20check%26nbsp%3B%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CP%3E1.%20If%20your%20client%20application%20has%20pinned%20to%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ERoot%20CA%3A%26nbsp%3BBaltimore%20CyberTrust%20Root%20CA%26nbsp%3Bor%2C%26nbsp%3B%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EIntermediate%20CA%3A%26nbsp%3B%26nbsp%3BMicrosoft%26nbsp%3BRSA%26nbsp%3BTLS%20CA%26nbsp%3B01%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EIntermediate%20CA%3A%26nbsp%3B%26nbsp%3BMicrosoft%26nbsp%3BRSA%26nbsp%3BTLS%20CA%26nbsp%3B02%26nbsp%3B%20%26nbsp%3B%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3Edetailed%26nbsp%3Bin%20the%20table%20below%2C%20then%20search%20your%20source%20code%20for%20the%20thumbprint%2C%20Common%20Name%2C%20and%20other%20cert%20properties%20of%20any%20of%20the%26nbsp%3Broot%20CA%26nbsp%3Bor%20intermediate%20CAs.%26nbsp%3BIf%20there%20is%20a%20match%2C%20then%20your%20application%20will%20be%20impacted%2C%26nbsp%3B%3CSTRONG%20style%3D%22font-family%3A%20inherit%3B%22%3Eimmediate%20action%20is%20required%3A%3C%2FSTRONG%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3E%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ETo%20continue%20without%20disruption%20due%20to%20this%20change%2C%20Microsoft%20recommends%26nbsp%3Bthat%20client%20applications%20or%20devices%20trust%20the%26nbsp%3Broot%20CA%26nbsp%3B%E2%80%93%26nbsp%3B%3CA%20style%3D%22font-family%3A%20inherit%3B%20background-color%3A%20%23ffffff%3B%22%20href%3D%22https%3A%2F%2Fwww.digicert.com%2Fkb%2Fdigicert-root-certificates.htm%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EDigiCert%20Global%20Root%20G2%26nbsp%3B%26nbsp%3B%3C%2FA%3E(Thumbprint%3A%26nbsp%3Bdf3c24f9bfd666761b268073fe06d1cc8d4f82a4)%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EIntermediate%20certificates%20are%20expected%20to%20change%26nbsp%3Bmore%26nbsp%3Bfrequently%26nbsp%3Bthan%26nbsp%3Broot%20CA.%3CSTRONG%3E%26nbsp%3BCustomers%20who%26nbsp%3Buse%20certificate%20pinning%20are%26nbsp%3Brecommended%20to%26nbsp%3BNOT%26nbsp%3Btaking%20dependencies%20on%20them%20and%20instead%20pin%26nbsp%3Bto%26nbsp%3Bthe%20root%20certificate%2C%26nbsp%3B%3C%2FSTRONG%3Eas%20it%20rolls%20less%20frequently.%20%3CBR%20%2F%3EIf%20you%26nbsp%3Bare%20currently%20pinning%20to%20the%20intermediate%20CAs%20and%26nbsp%3Bhave%20a%20requirement%20to%26nbsp%3Bcontinue%26nbsp%3Bpinning%26nbsp%3Bto%20intermediate%20CAs%2C%26nbsp%3Bto%26nbsp%3Bprevent%26nbsp%3Bdisruption%20due%20to%20this%20change%2C%20you%20should%26nbsp%3Bupdate%20the%20source%20code%26nbsp%3Bto%26nbsp%3Badd%20the%20intermediate%26nbsp%3BMicrosoft%20Azure%20TLS%20Issuing%20CAs%E2%80%AFlisted%20in%20the%20table%20below%20to%20the%20trusted%20store.%26nbsp%3B%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E2.%20To%20prevent%20future%20disruption%2C%26nbsp%3Byou%26nbsp%3Bshould%20also%20add%20the%20following%20roots%26nbsp%3Bto%20the%20trusted%20store.%20This%20will%20save%20you%20from%20the%20allow%20list%20effort%20in%20near%20future%26nbsp%3Bif%20you%20add%20the%26nbsp%3Brecommended%20root%26nbsp%3BCAs%20now%3A%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.digicert.com%2Fkb%2Fdigicert-root-certificates.htm%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EDigiCert%20Global%26nbsp%3BRoot%26nbsp%3BG3%3C%2FA%3E%26nbsp%3B%3CBR%20%2F%3E(Thumbprint%3A%207e04de896a3e666d00e687d33ffad93be83d349e)%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fpkiops%2Fcerts%2FMicrosoft%2520RSA%2520Root%2520Certificate%2520Authority%25202017.crt%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20RSA%20Root%20Certificate%20Authority%202017%3C%2FA%3E%26nbsp%3B%3CBR%20%2F%3E(Thumbprint%3A%2073a5e64a3bff8316ff0edccc618a906e4eae4d74)%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fpkiops%2Fcerts%2FMicrosoft%2520ECC%2520Root%2520Certificate%2520Authority%25202017.crt%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20ECC%20Root%20Certificate%20Authority%202017%3C%2FA%3E%26nbsp%3B%3CBR%20%2F%3E(Thumbprint%3A%20999a64c37ff47d9fab95f14769891460eec4c3c5)%26nbsp%3B%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3ENote%3A%26nbsp%3BIf%20you%20have%20a%20requirement%20to%20pin%20to%20intermediate%20CAs%2C%20to%20prevent%20future%20disruption%2C%20you%20should%20also%20add%20the%20intermediate%20Microsoft%20Azure%20ECC%20TLS%20CAs%20listed%20in%20the%20table%20below%20to%20the%20trusted%20store.%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--1437816332%22%20id%3D%22toc-hId--1436927309%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId-1049696501%22%20id%3D%22toc-hId-1050585524%22%3E%3CSTRONG%3E%3CEM%3ECertificate%20Renewal%20Summary%26nbsp%3B%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CP%3EThe%20table%20below%20provides%20information%20about%20the%20certificates%20that%20are%20being%20rolled.%20Depending%20on%20which%20certificate%20your%20service%20uses%20for%20establishing%20TLS%20connections%2C%20action%20may%20be%20needed%20to%20prevent%20disruption%20in%20applications%20using%20Instance%20Metadata%20Service%20Attested%20Data%20endpoint.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20width%3D%22587%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2258%22%3E%3CP%3E%3CSTRONG%3ECertificate%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22175%22%3E%3CP%3E%3CSTRONG%3ECurrent%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22264%22%3E%3CP%3E%3CSTRONG%3EPost%20Rollover%20(February%3C%2FSTRONG%3E%3CSTRONG%3E%2C%202022%20%E2%80%93%26nbsp%3BM%3C%2FSTRONG%3E%3CSTRONG%3Earch%3C%2FSTRONG%3E%3CSTRONG%3E%2C%202022)%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2290%22%3E%3CP%3E%3CSTRONG%3EAction%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2258%22%3E%3CP%3ERoot%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22175%22%3E%3CP%3EThumbprint%26nbsp%3B(SHA1)%3A%20d4de20d05e66fc53fe1a50882c78db2852cae474%26nbsp%3B%3CBR%20%2F%3EExpiration%3A%20Monday%2C%20May%2012%2C%202025%2C%204%3A59%3A00%20PM%26nbsp%3B%3CBR%20%2F%3ESubject%20Name%3A%26nbsp%3B%3CBR%20%2F%3ECN%20%3D%20Baltimore%20CyberTrust%20Root%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOU%20%3D%20CyberTrust%26nbsp%3B%3CBR%20%2F%3EO%20%3D%20Baltimore%26nbsp%3B%3CBR%20%2F%3EC%20%3D%20IE%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22264%22%3E%3CP%3EThumbprint%26nbsp%3B(SHA1)%3A%20df3c24f9bfd666761b268073fe06d1cc8d4f82a4%26nbsp%3B%3C%2FP%3E%0A%3CP%3EExpiration%3A%20%E2%80%8EFriday%2C%20%E2%80%8EJanuary%20%E2%80%8E15%2C%20%E2%80%8E2038%205%3A00%3A00%20AM%26nbsp%3B%3CBR%20%2F%3ESubject%20Name%3A%26nbsp%3B%3CBR%20%2F%3ECN%20%3D%20DigiCert%20Global%20Root%20G2%26nbsp%3B%3CBR%20%2F%3EOU%20%3D%E2%80%AF%3CA%20href%3D%22http%3A%2F%2Fwww.digicert.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ewww.digicert.com%26nbsp%3B%3CBR%20%2F%3E%3C%2FA%3EO%20%3D%20DigiCert%20Inc%26nbsp%3B%3CBR%20%2F%3EC%20%3D%20US%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2290%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERequired%20before%26nbsp%3BFebruary%202022%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2258%22%3E%3CP%3ERoot%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22175%22%3E%3CP%3E%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22264%22%3E%3CP%3EThumbprint%20(SHA1)%3A%26nbsp%3B%3CBR%20%2F%3E7e04de896a3e666d00e687d33ffad93be83d349e%26nbsp%3B%3CBR%20%2F%3EExpiration%3A%26nbsp%3B%E2%80%8EFriday%2C%20%E2%80%8EJanuary%20%E2%80%8E15%2C%20%E2%80%8E2038%205%3A00%3A00%20AM%26nbsp%3B%3CBR%20%2F%3ECN%20%3D%20DigiCert%20Global%20Root%20G3%26nbsp%3B%3CBR%20%2F%3EOU%20%3D%26nbsp%3B%3CA%20href%3D%22http%3A%2F%2Fwww.digicert.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ewww.digicert.com%26nbsp%3B%3CBR%20%2F%3E%3C%2FA%3EO%20%3D%20DigiCert%20Inc%26nbsp%3B%3CBR%20%2F%3EC%20%3D%20US%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%20(SHA1)%3A%26nbsp%3B%3CBR%20%2F%3E73a5e64a3bff8316ff0edccc618a906e4eae4d74%26nbsp%3B%3CBR%20%2F%3EExpiration%3A%26nbsp%3B%E2%80%8EFriday%2C%20%E2%80%8EJuly%20%E2%80%8E18%2C%20%E2%80%8E2042%204%3A00%3A23%20PM%26nbsp%3B%3CBR%20%2F%3ECN%20%3D%20Microsoft%20RSA%20Root%20Certificate%20Authority%202017%26nbsp%3B%3CBR%20%2F%3EO%20%3D%20Microsoft%20Corporation%26nbsp%3B%3CBR%20%2F%3EC%20%3D%20US%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%20(SHA1)%3A%26nbsp%3B%3CBR%20%2F%3E999a64c37ff47d9fab95f14769891460eec4c3c5%26nbsp%3B%3CBR%20%2F%3EExpiration%3A%26nbsp%3B%E2%80%8EFriday%2C%20%E2%80%8EJuly%20%E2%80%8E18%2C%20%E2%80%8E2042%204%3A16%3A04%26nbsp%3BPM%26nbsp%3B%3CBR%20%2F%3ECN%20%3D%20Microsoft%26nbsp%3BECC%26nbsp%3BRoot%20Certificate%20Authority%202017%26nbsp%3B%3CBR%20%2F%3EO%20%3D%20Microsoft%20Corporation%26nbsp%3B%3CBR%20%2F%3EC%20%3D%20US%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2290%22%3E%3CP%3E%3CSTRONG%3ERecommended%26nbsp%3Bto%20prevent%26nbsp%3Bdisruption%26nbsp%3B%3C%2FSTRONG%3E%3CSTRONG%3E%3CBR%20%2F%3E%3C%2FSTRONG%3E%3CSTRONG%3Efrom%26nbsp%3Bfuture%20changes%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2258%22%3E%3CP%3EIntermediates%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22175%22%3E%3CP%3E%3CU%3EThumbprints%26nbsp%3B(SHA1)%3A%26nbsp%3B%3C%2FU%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%20Microsoft%20RSA%20TLS%20CA%2001%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%26nbsp%3B%3C%2FP%3E%0A%3CP%3E703d7a8f0ebf55aaa59f98eaf4a206004eb2516a%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%20Microsoft%20RSA%20TLS%20CA%2002%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%20b0c2d2d13cdd56cdaa6ab6e2c04440be4a429c75%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3EExpiration%3A%20%E2%80%8ETuesday%2C%20%E2%80%8EOctober%20%E2%80%8E8%2C%20%E2%80%8E2024%2012%3A00%3A00%20AM%3B%26nbsp%3B%26nbsp%3B%3CBR%20%2F%3ESubject%20Name%3A%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3EO%20%3D%20Microsoft%20Corporation%26nbsp%3B%3C%2FP%3E%0A%3CP%3EC%20%3D%20US%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22264%22%3E%3CP%3E%3CU%3EThumbprints%26nbsp%3B(SHA1)%3A%26nbsp%3B%3C%2FU%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20TLS%20Issuing%20CA%2001%26nbsp%3B%3CBR%20%2F%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3Eb9ed88eb05c15c79639493016200fdab08137af3%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20TLS%20Issuing%20CA%2002%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3Ec5fb956a0e7672e9857b402008e7ccad031f9b08%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20TLS%20Issuing%20CA%2005%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3E56f1ca470bb94e274b516a330494c792c419cf87%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20TLS%20Issuing%20CA%2006%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3E8f1fd57f27c828d7be29743b4d02cd7e6e5f43e6%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EExpiration%3A%20%E2%80%8EThursday%2C%20%E2%80%8EJune%26nbsp%3B27%2C%20%E2%80%8E2024%26nbsp%3B4%3A59%3A59%26nbsp%3BPM%3B%26nbsp%3B%26nbsp%3B%3CBR%20%2F%3ESubject%20Name%3A%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIssuer%20%3D%26nbsp%3BMicrosoft%26nbsp%3BRSA%26nbsp%3BRoot%20Certificate%20Authority%202017%26nbsp%3B%3C%2FP%3E%0A%3CP%3EO%20%3D%20Microsoft%20Corporation%26nbsp%3B%3C%2FP%3E%0A%3CP%3EC%20%3D%20US%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E-------------------------------------------------------%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20TLS%20Issuing%20CA%2001%26nbsp%3B%3CBR%20%2F%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3E2f2877c5d778c31e0f29c7e371df5471bd673173%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20TLS%20Issuing%20CA%2002%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3Ee7eea674ca718e3befd90858e09f8372ad0ae2aa%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20TLS%20Issuing%20CA%2005%26nbsp%3B%3CBR%20%2F%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3E6c3af02e7f269aa73afd0eff2a88a4a1f04ed1e5%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20TLS%20Issuing%20CA%2006%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3E30e01761ab97e59a06b41ef20af6f2de7ef4f7b0%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EExpiration%3A%20%E2%80%8EThursday%2C%20%E2%80%8EJune%26nbsp%3B27%2C%20%E2%80%8E2024%26nbsp%3B4%3A59%3A59%26nbsp%3BPM%3B%26nbsp%3B%26nbsp%3B%3CBR%20%2F%3ESubject%20Name%3A%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIssuer%20%3D%20DigiCert%20Global%20Root%20G2%26nbsp%3B%3C%2FP%3E%0A%3CP%3EO%20%3D%26nbsp%3BDigiCert%20Inc%26nbsp%3B%3C%2FP%3E%0A%3CP%3EC%20%3D%20US%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2290%22%3E%3CP%3E%3CSTRONG%3ERequired%20before%26nbsp%3BFebruary%202022%3C%2FSTRONG%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2258%22%3E%3CP%3EIntermediates%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22175%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22264%22%3E%3CP%3E%3CU%3EThumbprints%26nbsp%3B(SHA1)%3A%26nbsp%3B%3C%2FU%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20ECC%20TLS%20Issuing%20CA%2001%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3Ecda57423ec5e7192901ca1bf6169dbe48e8d1268%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20ECC%20TLS%20Issuing%20CA%2002%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3E489ff5765030eb28342477693eb183a4ded4d2a6%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20ECC%20TLS%20Issuing%20CA%2005%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3E4c15bc8d7aa5089a84f2ac4750f040d064040cd4%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20ECC%20TLS%20Issuing%20CA%2006%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3Edfeb65e575d03d0cc59fd60066c6d39421e65483%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EExpiration%3A%20%E2%80%8EThursday%2C%20%E2%80%8EJune%26nbsp%3B27%2C%20%E2%80%8E2024%26nbsp%3B4%3A59%3A59%26nbsp%3BPM%3B%26nbsp%3B%26nbsp%3B%3CBR%20%2F%3ESubject%20Name%3A%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIssuer%26nbsp%3B%3D%20Microsoft%20ECC%20Root%20Certificate%20Authority%202017%26nbsp%3B%3C%2FP%3E%0A%3CP%3EO%20%3D%20Microsoft%20Corporation%26nbsp%3B%3C%2FP%3E%0A%3CP%3EC%20%3D%20US%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E-------------------------------------------------------%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20ECC%20TLS%20Issuing%20CA%2001%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3E92503d0d74a7d3708197b6ee13082d52117a6ab0%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20ECC%20TLS%20Issuing%20CA%2002%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3E1e981ccddc69102a45c6693ee84389c3cf2329f1%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20ECC%20TLS%20Issuing%20CA%2005%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3Ec6363570af8303cdf31c1d5ad81e19dbfe172531%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECN%20%3D%26nbsp%3BMicrosoft%20Azure%20ECC%20TLS%20Issuing%20CA%2006%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThumbprint%3A%E2%80%AF%26nbsp%3B%3C%2FP%3E%0A%3CP%3E7365adaedfea4909c1baadbab68719ad0c381163%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EExpiration%3A%20%E2%80%8EThursday%2C%20%E2%80%8EJune%26nbsp%3B27%2C%20%E2%80%8E2024%26nbsp%3B4%3A59%3A59%26nbsp%3BPM%3B%26nbsp%3B%26nbsp%3B%3CBR%20%2F%3ESubject%20Name%3A%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIssuer%20%3D%20DigiCert%20Global%20Root%20G3%26nbsp%3B%3C%2FP%3E%0A%3CP%3EO%20%3D%26nbsp%3BDigiCert%20Inc%26nbsp%3B%3C%2FP%3E%0A%3CP%3EC%20%3D%20US%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2290%22%3E%3CP%3E%3CSTRONG%3ERecommended%20to%20prevent%20disruption%26nbsp%3Bfrom%26nbsp%3B%3C%2FSTRONG%3E%3CSTRONG%3E%3CBR%20%2F%3E%3C%2FSTRONG%3E%3CSTRONG%3Efuture%20changes%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2888953%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3EThis%20blog%20contains%20important%20information%20about%20TLS%26nbsp%3Bcertificate%20changes%20for%20Azure%26nbsp%3BInstance%20Metadata%20Service-%20Attested%20data%20endpoint%20that%20could%26nbsp%3Bimpact%20users%20of%20this%20endpoint.%3C%2FSTRONG%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2888953%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EManagement%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Nov 18 2021 06:05 PM
Updated by: