November 2023 Deployment Notice - Microsoft Trusted Root Program
On Tuesday, November 28, 2023, Microsoft released an update to the Microsoft Trusted Root Certificate Program.
This release will add the following roots (CA \ Root Certificate \ SHA-1 Thumbprint):
- Altron(Lawtrust) // LAWtrust Root CA2 (4096) // eca2d530a9ab2c7d0e7561644e0ae016a154387d
- Atos // Atos TrustedRoot Root CA RSA TLS 2021 // 18523b0d0637e4d63adf23e498fb5b16fb867448
- Atos // Atos TrustedRoot Root CA ECC G2 2020 // 612556da6294e5aeb33cf811bdb1dcf8a5d8b3e4
- Atos // Atos TrustedRoot Root CA ECC TLS 2021 // 9ebc751042b302f381f4f73062d48fc3a751b2dd
- Atos // Atos TrustedRoot Root CA RSA G2 2020 // 32d127fa93b1c14c99e24a40bc7f94411b5aaca4
- A-Trust // A-Trust-Root-09 // D05849DE4004DA6E867DEE000671CDA8F423266F
- Deutsche Telekom Security GmbH // Telekom Security TLS ECC Root 2020 // c0f896c5a93b01062107da184248bce99d88d5ec
- Deutsche Telekom Security GmbH // Telekom Security SMIME ECC Root 2021 // b7f91d98ec2593f35014849aa87e22103cc43927
- Deutsche Telekom Security GmbH // Telekom Security SMIME RSA Root 2023 // 893f6f1ce24d7ffbc3d3147a0580a7dee10a5e4d
- Deutsche Telekom Security GmbH // Telekom Security TLS RSA Root 2023 // 54d3acb3bd5756f6859dcee5c321e2d4ad83d093
- Entrust // Entrust 4K EV TLS Root CA - 2022 // EADB0AB9DC7938021435FED13E488406A1AA292A
- Entrust // Entrust P384 TLS Root CA // 424AAE6D0C8C7624817CDB9CCB510DED6232191D
- Entrust // Entrust 4K TLS Root CA - 2022 // 193C2A76F8CADD84F35BF52EE7AA506657917A38
- Entrust // Entrust P384 EV TLS Root CA - 2022 // 1E6C44DC6473D4819BE89FB237AF4883FC376987
- Entrust // Entrust SMIME Root CA - 2022 // B8B1C5AAC29BEDF0AD71B2F14BFEAA38F817535E
- Entrust // Entrust Digital Signing Root Certification Authority - DSR1 // 104FE73700186E692E78A0156A3F9ED807B0608E
- Entrust // AffirmTrust 4K TLS Root CA - 2022 // 2E03931CD19C3FF5985FB87AADC153EB5DBDF1E3
- Government of Korea, KLID(Ministry of the Interior and Safety) // MOIS SSL Root CA // 65f9901c549c9bec6bf422b7fd8ee382f626186b
- SSL.com // SSL.com Client RSA Root CA 2022 // aa5970e520329fcbd0d5799ffb1b821dfd1f7965
- SSL.com // SSL.com Client ECC Root CA 2022 // 807b1d9d65723dc756f9ecc5008349f6f2acf486
- SSL.com // SSL.com Code Signing RSA Root CA 2022 // d4695284cd1798d9cb1699464c064994c4e2bbfd
- SSL.com // SSL.com Code Signing ECC Root CA 2022 // 0d9e9ab20765a89ed9cd8df2c7a63bc77495ef31
- SSL.com // SSL.com Document Signing RSA Root CA 2022 // 2f686dc8d4e39553ed32938e6357133bb7d9910c
- SSL.com // SSL.com Document Signing ECC Root CA 2022 // 3cc1a683ffe66836491af36be1d3fe0a37f59dae
- SSL.com // SSL.com TLS RSA Root CA 2022 // ec2c834072af269510ff0ef203ee3170f6789dca
- SSL.com // SSL.com TLS ECC Root CA 2022 // 9f5fd91a546df50c71f0ee7abd1749988473e239
- SwissSign AG // SwissSign RSA TLS Root CA 2022 – 1 // 193144F431E0FDDB740717D4DE926A571133884B4360D30E272913CBE660CE41
- SwissSign AG // SwissSign RSA SMIME Root CA 2022 - 1 // 9A12C392BFE57891A0C545309D4D9FD567E480CB613D6342278B195C79A7931F
- TAIWAN-CA (TWCA) // TWCA CYBER Root CA // f6b11c1a8338e97bdbb3a8c83324e02d9c7f2666
- TAIWAN-CA (TWCA) // TWCA Global Root CA G2 // 73fe922f836391ffc8c6c4dad6202f6b072e7f1b
This release will modify from the following roots (CA \ Root Certificate \ SHA-1 Thumbprint):
- GlobalSign // GlobalSign Root R46 // 4FA3126D8D3A11D1C4855A4F807CBAD6CF919D3A5A88B03BEA2C6372D93C40C9
- GlobalSign // GlobalSign Root E46 // CBB9C44D84B8043E1050EA31A69F514955D7BFD2E2C6B49301019AD61D9F5058
- GlobalSign // GlobalSign Secure Mail Root R45 // 319AF0A7729E6F89269C131EA6A3A16FCD86389FDCAB3C47A4A675C161A3F974
- GlobalSign // GlobalSign Secure Mail Root E45 // 5CBF6FB81FD417EA4128CD6F8172A3C9402094F74AB2ED3A06B4405D04F30B19
Note
- As part of this release, Microsoft also updated the Untrusted CTL time stamp and sequence number. No changes were made to the contents of the Untrusted CTL but this will cause your system to download/refresh the Untrusted CTL. This is a normal update that is sometimes done when the Trusted Root CTL is updated.
- The update package will be available for download and testing at: https://aka.ms/CTLDownload
- Signatures on the Certificate Trust Lists (CTLs) for the Microsoft Trusted Root Program changed from dual-signed (SHA-1/SHA-2) to SHA-2 only. No customer action required. For more information, please visit: https://support.microsoft.com/en-us/help/4472027/2019-sha-2-code-signing-support-requirement-for-windows-and-wsus