Environments & base URLs

DigiCert® provides both production and demo environments across four geographic regions. Each API call starts with a region-specific hostname (base URL), followed by a predictable versioned path.

EnvironmentPurpose
DemoSafe testing, proof-of-concepts
ProductionLive operations

Region and hostname matrix

Make sure to use the appropriate hostname based on your regional requirements.

RegionDemo hostnameProduction hostnameNotes
United States (US)demo.one.digicert.comone.digicert.comDefault region; lowest latency for the Americas
Japan (JP)demo.one.digicert.co.jpone.digicert.co.jpJapanese data residency.
Switzerland (CH)demo.one.ch.digicert.comone.ch.digicert.comSwiss data sovereignty; strict privacy laws
Netherlands (NL)demo.one.nl.digicert.comone.nl.digicert.comEU-only data storage (GDPR)
Australia (AU)demo.one.au.digicert.comone.au.digicert.comAustralian data residency.

Base URL pattern

Every DigiCert® ONE API follows this structure:

https://{hostname}/{product}/api/v{n}/{resource}
SegmentDescriptionExamples
{hostname}DigiCert ONE hostnameone.digicert.com
demo.one.digicert.com
one.digicert.co.jp
{product}DigiCert ONE product-specific path segmentaccount (Account Manager)
certificate-authority (DigiCert Private CA)
mpki (Trust Lifecycle Manager)
signingmanager (Software Trust Manager)
devicetrustmanager (Device Trust Manager)
api/v{n}API version; most products are v1 and follow this convention. Device Trust Manager uses nested versioning for some endpoints, for example /{resource}/api/v{n}.api/v1
api/v3
/{resource}/api/v{n}*
{resource}Specific endpoint pathusers
division
/enrollment/{enrollment_id}/status
/certificate-configuration-service/api/v2/certificate-policy*

* Examples specific to API endpoints.

API endpoints by product

ProductPath segmentFull example
DigiCert® Account Manageraccounthttps://one.digicert.com/account/api/v1/user
DigiCert® Private CAcertificate-authorityhttps://one.digicert.com/certificate-authority/api/v1/ca
DigiCert® Software Trust Managersigningmanagerhttps://one.digicert.com/signingmanager/api/v1/keypairs
DigiCert® Document Trust Managerdocumentmanagerhttps://one.digicert.com/documentmanager/api/v1/credentials/list
DigiCert® Device Trust Managerdevicetrustmanagerhttps://one.digicert.com/devicetrustmanager/api/v4/devices
DigiCert® Trust Lifecycle Managermpkihttps://one.digicert.com/mpki/api/v1/certificate-owners

Working with environments

Start with demo

Demo is perfect for:

  • Integration development and testing.
  • Training new team members.
  • Validating workflows before production.
  • Load testing (within reason).
# Example: List certificates in Trust Lifecycle demo environment
curl -X GET \
  -H "x-api-key: YOUR_DEMO_KEY" \
  https://demo.one.digicert.com/mpki/api/v1/certificate-owners

Promote to production

When moving from demo to production, make sure you:

Create new credentials: Demo API keys don’t work in production.
Update base URLs: Change only the hostname portion; demo.one.* to one.*. Paths stay identical.
Verify firewall rules: Your outbound IP list might differ between environments.
Test incrementally: Start with GET calls, then progress to POST/PUT once quotas and roles are validated.
# Demo environment
BASE_URL="https://demo.one.digicert.com"

# Production environment (only hostname changes)
BASE_URL="https://one.digicert.com"

# Your code stays the same
curl -X GET \
  -H "x-api-key: $API_KEY" \
  "$BASE_URL/account/api/v1/users"

Network considerations

IP allowlisting

If your infrastructure requires IP allowlisting, make sure you understand the following:

TLS requirements

  • Minimum TLS version: 1.2
  • Recommended: TLS 1.3
  • Required for mTLS: Valid client certificate chain
  • Certificate validation: DigiCert® validates the full certificate chain

Self-hosted deployments

For on-premises or dedicated DigiCert instances:

  • Replace {hostname} with your custom FQDN (for example, pki.company.internal).
  • All path patterns remain identical.
  • The clientauth. prefix pattern still applies for mTLS.

API troubleshooting basics

SymptomLikely causeQuick fix
401 UnauthorizedMissing/invalid x-api-key or expired certificateVerify the x-api-key header; confirm the service user is active.
403 ForbiddenAuthenticated but lacks required roleAdd the needed role in Account Manager or use a different key.
429 Too Many RequestsBurst trafficImplement backoff; spread calls across service users.
503 Service UnavailableMaintenance windowRetry after header; escalate if >10 min.
SSL handshake failure when using mTLSWrong certificate, key mismatch, or incorrect URLCheck cert/key pair and ensure URL prefix is correct.
Everything stopped at midnightKey or service user reached end dateCreate/rotate the key before expiry; update all integrations.
Works in demo, fails in prodUsing demo key against prod hostnameGenerate a new key in production; update DC_BASE environment variable.

Best practices

  • Monitor Release notes for platform updates and changes.
  • Always start with demo, even for simple integrations.
  • Use environment variables instead of hard-coded URLs or keys whenever possible.
  • Be aware of region-specific URLs.