Skip to main content

Reissue certificate

POST https://www.digicert.com/services/v2/order/certificate/{{order_id}}/reissue

Use this endpoint to reissue a certificate. A certificate reissue replaces the existing certificate with a new one that has different information, such as a different common name, CSR, or signature hash.

Important

End of 2-year public SSL/TLS certificates

The Services API no longer issues public SSL/TLS certificates with a validity period greater than 397 days.

When you reissue a public SSL/TLS certificate that has a validity greater than 397 days, the validity period of the reissued certificate is shortened to 397 days or to the time that remains on the order, whichever is sooner. To use the remaining validity included with the original certificate order, reissue the certificate again during the order's final 397-day period.

To learn more about this change, see End of 2-year DV, OV, EV public TLS/SSL certificates.

Notice

When you reissue a certificate for a Multi-year Plan, you can set a new expiration date for the reissued certificate. For more information, see Multi-year plans.

Reissue EV code signing certificates

  • eToken reissue requests

    You must have a SafeNet 5110-CC (RSA 4096 or ECC P-254) or SafeNet 5110-FIPS (ECC P-254 or P-384). If you don't, you will not be able to install the reissued certificate on your eToken. To get a DigiCert provided, preconfigured hardware token shipped to you, contact our support team.

  • HSM reissue requests

    You must have a FIPS 140-2 Level 2+ or Common Criteria EAL4+ compliant HSM that supports ECC P-256 or RSA 3072-bit key sizes or larger. If you don't have a compatible HSM, you will not be able to install the reissued certificate on your device.

For more information, see our knowledge base article. If you have any questions, contact our support team.

Example requests and responses

Request parameters

Name

Req/Opt

Type

Description

certificate

required

object

Details about the certificate.

.. common_name

conditional*

string

Domain to be secured.

*Note: The common_name request parameter is required on reissue requests for public and private TLS/SSL certificates. However, you should omit the common_name parameter from reissue requests for Verified Mark Certificates (VMC), Code Signing certificates, EV Code Signing certificates, and Document Signing certificates.

.. dns_names

optional

array

Additional domains to be secured.

.. csr

required

string

Certificate signing request (CSR). See Glossary – CSR requirements.

.. server_platform

conditional

object

Server platform type. Required for EV Code Signing certificate orders.

.. .. id

required

int

Server platform ID.

Allowed values:

Default: -1 (other)

.. cert_validity

optional

object

Defines the validity period of the reissued certificate. If not provided, the validity period for the reissued certificate defaults to the time remaining in the Multi-year Plan or the maximum certificate validity period defined by CA/B Forum baseline requirements, whichever is shorter. This object is ignored for reissues that are not associated with a Multi-year Plan.

.. .. years

optional

int

Number of years the certificate is valid after it is issued. Can be replaced with cert_validity.days or cert_validity.custom_expiration_date.

Allowed value: 1

.. .. days

optional

int

Number of days the certificate is valid after it is issued. Overrides cert_validity.years.

Max: 397

.. .. custom_expiration_date

optional

string

A custom expiration date for the certificate. Overrides cert_validity.days and cert_validity.years.

Format: dd MMM YYYY (for example, "09 JUN 2021")

Range: Must be within 397 days of the date you request the certificate.

.. signature_hash

required

string

Hash algorithm used to signing the certificate.

.. profile_option

optional

string

Certificate profile option for the reissued certificate.

Allowed values: See Glossary – Certificate profile options

.. ca_cert_id

optional

string

ID of the intermediate certificate authority (ICA) certificate to select as the issuing certificate. To get the ca_cert_id value for an ICA, use the Product list endpoint.

Account administrators can customize the default and allowed ICAs for each product at the container or user role level. If you do not provide a value for this parameter, we issue the certificate using the default ICA. If you provide the ca_cert_id value for an ICA that is not allowed, the request returns an error*. To see the custom ICA settings for each product, use the Product limits endpoint.

*This parameter is ignored if the option for ICA selection is not enabled for your account. For more information, see ICA certificate chain selection.

dcv_method

optional

string

DCV method to use when verifying domain control. See Glossary – DCV methods.

comments

optional

string

Message about the reissue.

skip_approval

optional

bool

Specify if the order should skip the approval step and be immediately submitted for validation and issued when complete.

Default: false

Response parameters

Name

Type

Description

id

int

Order ID.

certificate_id

int

Certificate ID.

Only returned if skip_approval is true.

dcv_random_value

string

Random value used for domain control validation.

Note:

  • Not returned when reissuing an OV or EV certificate.

  • For DV certificate reissues, only returned when the DCV method is dns-txt-token or http-token.

requests

array

List of requests.

.. id

int

Request ID.