-
Notifications
You must be signed in to change notification settings - Fork 111
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Please update code to reflect the Entrust to DigiCert SSL migration #194
Comments
Thanks @defconomicron ! Here is a link to the two KB articles:
It is unclear what needs to be done. For client-side operations, I suspect (hope) nothing, given the connection is direct from customer browsers to authorize.net API ( For server-side API access, which from this repo seems to occur on |
Some notes/questions about the KB article contents:
Does it mean "You will not be able to test this before it happens in production"? 😅 About the scope:
This seems a pretty unusual use case. I feel like any user connecting to Authorize API in a standard way, with a normal HTTP client, will not need to do anything. |
I had the same question where inside the repo or my code do we set the SSL certificate? |
If I get it right, this mainly affects customers who manage their own SSL certs or do Root CA pinning. That's folks who only allow certain pre-approved certificates. I'm not super familiar with it, but I think this could happen in two ways:
Users with this setup need to update their stores/whitelists with the new certs/CA (if/when they are provided). Those without this setup probably don't need to do anything, but an official confirmation would be nice. |
I am guessing we should be good... Our site didn't experience anything catastrophic yesterday or today. |
Authorize.net is updating the SSL/TLS certificates used for secure communication with our systems. This change affects both browser-based and server-to-server interactions.
Who is being affected: Merchants who utilize Authorize.net APIs and endpoint URLs in their websites or applications will need to make updates. They will need to integrate and use the newly-issued Root and Intermediate (CA) SSL certificates from DigiCert. This should be done before the scheduled revocation dates to avoid disruptions.
What you need to do: You must integrate and use the newly-issued Root and Intermediate (CA) SSL certificates from DigiCert by October 24 to avoid any disruptions. To help you fight fraud, AFDS is automatically enabled on your account, which gives you access to many powerful fraud filters, including:
For detailed instructions, please refer to the support articles below:
• Entrust to DigiCert SSL Certificate Migration (KA-05545)
• Latest Version of Authorize.net Server-Level SSL Certificates (000003009)
The text was updated successfully, but these errors were encountered: