All Systems Operational

Updated a few seconds ago

Certificate Issuing Platforms

Operational


Certificate Lifecycle Management Platforms

Operational


Certificate Revocation Platforms

Operational


Certificate Transparency

Operational


Websites

Operational


Client Areas

Operational


Time Stamping

Operational


Scheduled Maintenance

Schedule

January 24, 2026 9:00AM - 11:00AM UTC

Components

Certificate Lifecycle Management Platforms

Locations

SCM (hard.cert-manager.com), SCM (eu.cert-manager.com)

Description

The SCM 26.1 release includes the following enhancements and fixes: - SCM now supports the ordering and management of Verified Mark (VMC) and Common Mark (CMC) certificates. (SCM-13311) - It automatically adds a 199-day term to public SSL certificate profiles in preparation for the move to limit public SSL certificate lifetimes to less than 200 days in March. (SCM-13372) - SCM now shows the backing certificate product and available inventory within the Request SSL Certificate wizard if subscriptions are enabled. (SCM-13224) - SCM now shows the backing certificate product in the certificate profiles table. (SCM-13223) - Notifications for MS Agent and Network Agent disconnected now have variables for last seen and disconnected timestamps. (SCM-10329) - Certificate reports have been enhanced to contain significantly more fields, especially for certificate types other than SSL. In some cases column names have been renamed to modern terminology and to be consistent across certificate types. (SCM-13225) - SHA-256 hashes of certificates are now shown in the SCM UI. These only exist for certificates issued or imported after SCM 25.8. (SCM-13115) - The DNS entry created by the DNS Connector is now deleted immediately after validation is completed. (SCM-12803) - Client certificates imported to the Sectigo Key Vault via Admin REST API are now exported to Intune if that feature is enabled for the target organization. (SCM-13269) - There is a new Admin REST API to get the renewal history of an SSL certificate. (SCM-13286) - Client certificate list responses in Admin REST API now include requested and expires fields. (SCM-6297) - The Create Private CA wizard now shows the issuer subject on the final page of the wizard to allow confirmation before creation. (SCM-13248) - Resolved the revocation of Entrust issued Code Signing certificates imported from ECS that would fail with "The value of the 'orderNumber' argument is invalid". (SCM-13104) - The selection of a specific certificate profile for a notification was only showing ANY instead of a list. Now resolved. (SCM-13338) - Saving a Network Discovery Task with more than 200 ports could fail. The port list has been increased to 512 characters. (SCM-12742) - Improved API error response when importing a certificate with a mandatory custom field missing. (SCM-13258) - Changing a certificate profile for a certificate requiring approval would fail with the "Internal error" message. Now resolved. (SCM-13398) - Collect certificate API requests could fail if the Accept header contained application/octet-stream even though that's the content type of the response. Now resolved. (SCM-13422)

Schedule

January 24, 2026 11:00AM - 1:00PM UTC

Components

Certificate Lifecycle Management Platforms

Locations

SCM (cert-manager.com)

Description

The SCM 26.1 release includes the following enhancements and fixes: - SCM now supports the ordering and management of Verified Mark (VMC) and Common Mark (CMC) certificates. (SCM-13311) - It automatically adds a 199-day term to public SSL certificate profiles in preparation for the move to limit public SSL certificate lifetimes to less than 200 days in March. (SCM-13372) - SCM now shows the backing certificate product and available inventory within the Request SSL Certificate wizard if subscriptions are enabled. (SCM-13224) - SCM now shows the backing certificate product in the certificate profiles table. (SCM-13223) - Notifications for MS Agent and Network Agent disconnected now have variables for last seen and disconnected timestamps. (SCM-10329) - Certificate reports have been enhanced to contain significantly more fields, especially for certificate types other than SSL. In some cases column names have been renamed to modern terminology and to be consistent across certificate types. (SCM-13225) - SHA-256 hashes of certificates are now shown in the SCM UI. These only exist for certificates issued or imported after SCM 25.8. (SCM-13115) - The DNS entry created by the DNS Connector is now deleted immediately after validation is completed. (SCM-12803) - Client certificates imported to the Sectigo Key Vault via Admin REST API are now exported to Intune if that feature is enabled for the target organization. (SCM-13269) - There is a new Admin REST API to get the renewal history of an SSL certificate. (SCM-13286) - Client certificate list responses in Admin REST API now include requested and expires fields. (SCM-6297) - The Create Private CA wizard now shows the issuer subject on the final page of the wizard to allow confirmation before creation. (SCM-13248) - Resolved the revocation of Entrust issued Code Signing certificates imported from ECS that would fail with "The value of the 'orderNumber' argument is invalid". (SCM-13104) - The selection of a specific certificate profile for a notification was only showing ANY instead of a list. Now resolved. (SCM-13338) - Saving a Network Discovery Task with more than 200 ports could fail. The port list has been increased to 512 characters. (SCM-12742) - Improved API error response when importing a certificate with a mandatory custom field missing. (SCM-13258) - Changing a certificate profile for a certificate requiring approval would fail with the "Internal error" message. Now resolved. (SCM-13398) - Collect certificate API requests could fail if the Accept header contained application/octet-stream even though that's the content type of the response. Now resolved. (SCM-13422)

Schedule

January 24, 2026 11:59PM - January 25, 2026 2:00AM UTC

Components

Certificate Issuing Platforms, Certificate Lifecycle Management Platforms, Client Areas

Locations

Public CA, SCM (cert-manager.com), SCM (hard.cert-manager.com), secure.trust-provider.com, secure.sectigo.com, SCM (eu.cert-manager.com), api.xolphin.com

Description

Sectigo Certificate Issuing Platform Scheduled Maintenance Saturday, January 24, 2026; 23:59 UTC. Sectigo Certificate Issuing Platform Scheduled Maintenance: • Minor fixes • Minor Improvements We anticipate that our certificate issuing platform will be unavailable for up to 2 hours while we add this additional functionality to the system. Please contact your Sectigo support resource if you require additional information about this scheduled maintenance event.

Schedule

February 7, 2026 9:00AM - 9:00PM UTC

Components

Certificate Issuing Platforms, Certificate Lifecycle Management Platforms, Websites, Client Areas

Locations

Public CA, IoT Manager, SCM (cert-manager.com), SCM (hard.cert-manager.com), secure.trust-provider.com, store.sectigo.com, Private CA, S3, store.comodoca.com, store.enterprisessl.com, store.hackerguardian.com, store.instantssl.com, store.positivessl.com, store.ssl.comodoca.com, secure.sectigo.com, acme.sectigo.com, secure.sitelock.com, api.sitelock.com, platform.codeguard.com, platform.sectigo.com, store.ssl247.com, Private CA - EU, SCM (eu.cert-manager.com), api.xolphin.com

Description

In compliance with requirements from the CA/Browser Forum, Sectigo will perform a datacenter switchover test commencing 9:00 AM UTC Saturday, February 7th. This test is estimated to run approximately twelve hours, during which time some Sectigo services will intermittently be unavailable, including the SCM user interface, Sectigo’s partner ordering APIs, and issuance of new leaf certificates. CRL access and OCSP requests will not be affected by this maintenance. We expect all services to resume normal operation immediately after the test.