You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Certificate rotation for Azure Database for MySQL
4
+
author: techlake
5
+
ms.author: hganten
6
+
ms.reviewer: maghan, randolphwest
7
+
ms.date: 02/17/2026
8
+
ms.service: azure-database-mysql
9
+
ms.subservice: security
10
+
ms.topic: include
11
+
ms.custom: references_regions
12
+
---
13
+
14
+
> [!IMPORTANT]
15
+
> **Root certificate rotation schedule:**
16
+
>
17
+
> - Updates for root CA certificates from DigiCert Global Root CA (G1) to DigiCert Global Root G2 in China regions start March 9, 2026.
18
+
> - If your client configuration uses the [***Recommended configurations for TLS***](../security-tls.md#recommended-configurations-for-tls), you don't need to take any action.
Copy file name to clipboardExpand all lines: articles/mysql/flexible-server/security-tls-root-certificate-rotation.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about the upcoming changes of root certificate rotation that
4
4
author: shih-che
5
5
ms.author: shihche
6
6
ms.reviewer: talawren, maghan, randolphwest
7
-
ms.date: 01/05/2026
7
+
ms.date: 02/17/2026
8
8
ms.service: azure-database-mysql
9
9
ms.subservice: security
10
10
ms.topic: concept-article
@@ -15,25 +15,25 @@ ms.custom:
15
15
16
16
# Root certificate rotation for Azure Database for MySQL
17
17
18
-
To maintain our security and compliance standards, we start changing the root certificates for Azure Database for MySQL Flexible Server after September 1, 2025.
If you use Transport Layer Security (TLS) with root certificate verification, you must have all three root certificates installed during the transition period. Once all the certificates are changed, you can remove the old SHA-1 root certificate **DigiCert Global Root CA** from the store. If you don't add the new certificates before September 1, 2025, your connections to the databases **fail**.
25
+
If you use Transport Layer Security (TLS) with root certificate verification, you must install all three root certificates during the transition period. Once you change all the certificates, you can remove the old SHA-1 root certificate **DigiCert Global Root CA** from the store. If you don't add the new certificates before September 1, 2025, your connections to the databases **fail**.
26
26
27
27
This article provides instructions on how to add the two new root certificates, and answers to frequently asked questions.
28
28
29
-
> [!NOTE]
29
+
> [!NOTE]
30
30
> If the continued use of SHA-1 is a blocker and you want to have your certificates changed before the general rollout, follow the [instructions in this article for creating a combined certificate authority (CA) certificate on the client](#how-to-update-the-root-certificate-store-on-your-client). Then open a support request to rotate your certificate for Azure Database for MySQL.
31
31
32
32
## Why is a root certificate update required?
33
33
34
-
Azure Database for MySQL users can only use the predefined certificate to connect to their MySQL server instances. The current certificate is signed by **DigiCert Global Root CA**. It uses SHA-1. The SHA-1 hashing algorithm is considerably insecure, due to discovered vulnerabilities. It's no longer compliant with our security standards.
34
+
Azure Database for MySQL users can only use the predefined certificate to connect to their MySQL server instances. The current certificate is signed by **DigiCert Global Root CA**. It uses SHA-1. The SHA-1 hashing algorithm is considerably insecure, due to discovered vulnerabilities. It's no longer compliant with security standards.
35
35
36
-
We need to rotate the certificate to one signed by a compliant root certificate authority to remediate the issue.
36
+
Microsoft needs to rotate the certificate to one signed by a compliant root certificate authority to remediate the issue.
37
37
38
38
## How to update the root certificate store on your client
39
39
@@ -43,11 +43,11 @@ The following steps guide you through the process of updating the root certifica
43
43
44
44
1. Download the three root certificates. If you installed the **DigiCert Global Root CA** certificate, you can skip the first download:
45
45
46
-
1.[Download the DigiCert Global Root CA certificate](https://cacerts.digicert.com/DigiCertGlobalRootCA.crt.pem).
46
+
-[Download the DigiCert Global Root CA certificate](https://cacerts.digicert.com/DigiCertGlobalRootCA.crt.pem).
47
47
48
-
1.[Download the DigiCert Global Root G2 certificate](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt.pem).
48
+
-[Download the DigiCert Global Root G2 certificate](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt.pem).
49
49
50
-
1.[Download the Microsoft RSA Root Certificate Authority 2017 certificate](https://www.microsoft.com/pkiops/certs/Microsoft%20RSA%20Root%20Certificate%20Authority%202017.crt).
50
+
-[Download the Microsoft RSA Root Certificate Authority 2017 certificate](https://www.microsoft.com/pkiops/certs/Microsoft%20RSA%20Root%20Certificate%20Authority%202017.crt).
51
51
52
52
1. Add the downloaded certificates to your client certificate store. The process varies depending on the client type.
53
53
@@ -103,9 +103,9 @@ openssl x509 -inform der -in MicrosoftRSARootCertificateAuthority2017.crt -out M
103
103
104
104
## Other clients
105
105
106
-
For other users that use other clients, you need to create a combined certificate file that contains all three root certificates.
106
+
For users of other clients, create a combined certificate file that contains all three root certificates.
107
107
108
-
Other clients such as:
108
+
Other clients include:
109
109
110
110
- MySQL Workbench
111
111
- C or C++
@@ -119,7 +119,7 @@ Other clients such as:
119
119
120
120
### Steps
121
121
122
-
1. Create a new text file and save it as `combined-ca-certificates.pem`
122
+
1. Create a new text file and save it as `combined-ca-certificates.pem`.
123
123
1. Copy and paste the contents of all three certificate files into this single file in the following format:
124
124
125
125
```output
@@ -136,7 +136,7 @@ Other clients such as:
136
136
137
137
## Data-in replication MySQL
138
138
139
-
For data-in replication where **both primary and replica are hosted on Azure**, you can merge the CA certificate files in this format:
139
+
For data-in replication where **both primary and replica are hosted on Azure**, merge the CA certificate files in this format:
0 commit comments