This blog contains important information about TLS certificate changes for Azure Storage endpoints that may impact client connectivity.
In 2020 most Azure services were updated to use TLS certificates from Certificate Authorities (CAs) that chain up to the DigiCert Global G2 root. However, Azure Storage, remained on TLS certificates issued by the Baltimore CyberTrust Root. The time has now come for Azure Storage to switch from the Baltimore CyberTrust CA Root to the DigiCert Global G2 CA Root*. The migration will start in July 2022, and finish by end of October 2022.
We expect that most Azure Storage customers will not be impacted; however, your application may be impacted if you explicitly specify a list of acceptable CAs (a practice known as “certificate pinning”). In scope Azure Storage services include Blob, File, Table, Queue, Static Website, ADLS Gen2. This change is limited to public Azure cloud and US Government cloud. There are no changes in other sovereign clouds like Azure China.
This change is being made because the current "Baltimore CyberTrust Root" will expire in May 2025.
If any client application has pinned to the root CA Baltimore CyberTrust Root or current intermediate CAs listed in the table below, immediate action is required to prevent disruption to connectivity to Azure Storage.
* Other Azure service TLS certificates may be issued by a different PKI.
1. If your client application has pinned to
detailed in the table below, then search your source code for the thumbprint, Common Name, and other cert properties of any of the root CA or intermediate CAs. If there is a match, then your application will be impacted, immediate action is required:
DigiCert Global Root G2
(Thumbprint: df3c24f9bfd666761b268073fe06d1cc8d4f82a4)
2. To prevent future disruption, you should also add the following roots to the trusted store. This will save you from the allowlist effort in near future if you add the recommended root CAs now:
Note: If you have a requirement to pin to intermediate CAs, to prevent future disruption, you should also add the intermediate Microsoft Azure ECC TLS CAs listed in the table below to the trusted store.
3. If you have completed the step 1 and need to validate your changes, we can provide a test environment on demand for your convenience to verify prior to July 2022. To request a test storage account, please open a support request with the options below and a member from our engineering team will get back to you.
The table below provides information about the certificates that are being rolled. Depending on which certificate your service uses for establishing TLS connections, action may be needed to prevent loss of connectivity.
Certificate |
Current |
Post Rollover (July 1, 2022 – October 31, 2022) |
Action |
Root |
Thumbprint (SHA1): d4de20d05e66fc53fe1a50882c78db2852cae474 OU = CyberTrust |
Thumbprint (SHA1): df3c24f9bfd666761b268073fe06d1cc8d4f82a4 Expiration: Friday, January 15, 2038 5:00:00 AM |
Required by 30 June 2022 |
Root |
|
Thumbprint (SHA1):
Thumbprint (SHA1):
Thumbprint (SHA1):
|
Recommended to prevent disruption |
Intermediates |
Thumbprints (SHA1):
CN = Microsoft RSA TLS CA 01 Thumbprint: 703d7a8f0ebf55aaa59f98eaf4a206004eb2516a
CN = Microsoft RSA TLS CA 02 Thumbprint: b0c2d2d13cdd56cdaa6ab6e2c04440be4a429c75
Expiration: Tuesday, October 8, 2024 12:00:00 AM; O = Microsoft Corporation C = US |
Thumbprints (SHA1):
CN = Microsoft Azure TLS Issuing CA 01 b9ed88eb05c15c79639493016200fdab08137af3
CN = Microsoft Azure TLS Issuing CA 02 Thumbprint: c5fb956a0e7672e9857b402008e7ccad031f9b08
CN = Microsoft Azure TLS Issuing CA 05 Thumbprint: 56f1ca470bb94e274b516a330494c792c419cf87
CN = Microsoft Azure TLS Issuing CA 06 Thumbprint: 8f1fd57f27c828d7be29743b4d02cd7e6e5f43e6
Expiration: Thursday, June 27, 2024 4:59:59 PM; Issuer = Microsoft RSA Root Certificate Authority 2017 O = Microsoft Corporation C = US
-------------------------------------------------------
CN = Microsoft Azure TLS Issuing CA 01 2f2877c5d778c31e0f29c7e371df5471bd673173
CN = Microsoft Azure TLS Issuing CA 02 Thumbprint: e7eea674ca718e3befd90858e09f8372ad0ae2aa
CN = Microsoft Azure TLS Issuing CA 05 6c3af02e7f269aa73afd0eff2a88a4a1f04ed1e5
CN = Microsoft Azure TLS Issuing CA 06 Thumbprint: 30e01761ab97e59a06b41ef20af6f2de7ef4f7b0
Expiration: Thursday, June 27, 2024 4:59:59 PM; Issuer = DigiCert Global Root G2 O = DigiCert Inc C = US
|
Required by 30 June 2022 |
Intermediates |
|
Thumbprints (SHA1):
CN = Microsoft Azure ECC TLS Issuing CA 01 Thumbprint: cda57423ec5e7192901ca1bf6169dbe48e8d1268
CN = Microsoft Azure ECC TLS Issuing CA 02 Thumbprint: 489ff5765030eb28342477693eb183a4ded4d2a6
CN = Microsoft Azure ECC TLS Issuing CA 05 Thumbprint: 4c15bc8d7aa5089a84f2ac4750f040d064040cd4
CN = Microsoft Azure ECC TLS Issuing CA 06 Thumbprint: dfeb65e575d03d0cc59fd60066c6d39421e65483
Expiration: Thursday, June 27, 2024 4:59:59 PM; Issuer = Microsoft ECC Root Certificate Authority 2017 O = Microsoft Corporation C = US
-------------------------------------------------------
CN = Microsoft Azure ECC TLS Issuing CA 01 Thumbprint: 92503d0d74a7d3708197b6ee13082d52117a6ab0
CN = Microsoft Azure ECC TLS Issuing CA 02 Thumbprint: 1e981ccddc69102a45c6693ee84389c3cf2329f1
CN = Microsoft Azure ECC TLS Issuing CA 05 Thumbprint: c6363570af8303cdf31c1d5ad81e19dbfe172531
CN = Microsoft Azure ECC TLS Issuing CA 06 Thumbprint: 7365adaedfea4909c1baadbab68719ad0c381163
Expiration: Thursday, June 27, 2024 4:59:59 PM; Issuer = DigiCert Global Root G3 O = DigiCert Inc C = US |
Recommended to prevent disruption from |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.