Fix crash when trying to change UI language when UI settings have not been previously saved.
5.4.2 : 2021/05/21
Important: Fix for manual certificates (those not using IIS for the domain list) not performing standard deployment (affecting new certs created with v5.4.0, v5.4.1).
Progress UI updates for DNS challenges which may be paused (Certify DNS, Manual DNS, acme-dns)
Updated docs links for DNS providers
5.4.1 : 2021/05/20
Fix for manual certificates (those not using IIS for the domain list) being identified as externally managed
Fix for potential exception when using keyboard to delete a managed certificate
Certify DNS: pass subject domain to registration service for dashboard monitoring
5.4.0 : 2021/05/18
New Certify DNS service in beta. This is a new cloud based acme-dns style service and can be enabled on your certifytheweb.com License Keys tab.
Tasks: Powershell script task now has an optional parameter for max timeout minutes.
DNS: Azure DSN provider has new option for alternative azure global services
CLI: new options to add/remove domains from a given managed cert
Engineering: preparation for .net 5/.net 6 versions. Preliminary support for Windows Server 2022.
UI: New setting to manually select language for UI translations. UI now defaults to English for all users. Users keen to see translations continue should discuss on https://github.com/webprofusion/certify
DNS: General fixes for zone matching based on label depth.
DNS: AWS Route 53 zone paging
DNS: Cloudflare provider should not error if TXT record already exists
UI: Fix error launching browser in some environments links when clicking links.
Renewals: Failed renewals should not count against batch limit causing no renewals to be attempted.
Migration: If task script files are deleted then migration should skip them, if credentials deleted don't try to migrate them.
Revert to previous 10 managed certificates limit in Community Edition
5.3.5 : 2021/03/17
Refine startup window positioning when used with multiple monitors
Import CSV should migrate pre/post request scripts to deployment tasks
IONOS DNS provider updates
DNS Made Easy DNS Provider updates
5.3.4 : 2021/03/04
Installer updates (minor)
5.3.3 : 2021/03/02
Add new DNSPod (v2) provider. The old version is now deprecated due to provider API changes.
5.3.2 : 2021/02/26
Fix for primary domain preference not persisting when saved (first domain in list gets selected instead).
Additional refinements to configuration validation
5.3.1 : 2021/02/23
Added additional ACME API request exception handling for slow or unavailable services.
Custom CA root certs can now be stored under C:\ProgramData\certify\custom_ca_certs\pem or C:\ProgramData\certify\custom_ca_certs\der, for instance to support new Let's Encrypt staging root certs or any custom/new CA root without adding to the machine trust store.
Fix issue where new certificate orders may not include the primary domain (automated tests)
Fix logging of identifier name during validation
Fix issuer cache refresh without restarting service
5.3.0 : 2021/02/19
Display IIS sites by default if either mode (website/ftp) is started
Report error if DNS validation fails during testing.
Azure DNS provider max number of DNS zones increased
Updated Posh-ACME DNS provider integrations to v4.x, retired UnoEuro provider, added Simply.com and Rimu Hosting
CLI: Add --renew-all-due option and id=<managed cert id> option to target individual items. Managed cert ID can be found under Certificate > Advanced > Actions
Initial support for IP address identifiers (requires CA support).
Report error type if problem occurs attempting to parse a custom CSR private key.
General UI Updates
5.2.1 : 2020/12/03
fix selection of HMAC algorithm for external account binding.
5.2.0 : 2020/11/26
⚠ Important Update for users who need to support old versions of Android on their sites.
This version provides new support for "preferred chain", this is important for users who still need to support older Android devices using their sites.
On January 11 2021 Let's Encrypt will move to a new a root certificate ISRG Root X1 which is not trusted in older versions of Android. Affected users should set their preferred chain to DST Root CA X3 either at their Let's Encrypt account level (Settings > Certificate Authorities) or on specific certificates in Certificate > Advanced > Certificate Authority.
Alternatively switch to using an alternative Certificate Authority with an existing trusted root (e.g BuyPass Go or ZeroSSL).
Other enhancements in this version:
Added ZeroSSL as a standard Certificate Authority option. To get started with ZeroSSL go to zerossl.com and create a free account, then go to Developer > EAB Credentials for ACME Clients > Generate to get your 'External Account Binding' credentials. You can then add your ZeroSSL account under Settings> Certificate Authorities, New Account. See the Advanced tab to set EAB credentials.
New support for External Account Binding - this lets you use certificate authorities which require this feature.
New settings preference UI for NTP server check (time sync diagnostic).
External certificate managers and the PFX password option features are now enabled by default.
General UI updates and bug fixes
5.1.12 : 2020/10/29
Add automatic DB backup as part of daily maintenance, move all DB maintenance to daily task.
5.1.11 : 2020/10/21
Handle possible disk IO exception during db maintenance (low disk space or IO errors etc).
Powershell: don't use previously supplied windows credentials if no longer relevant to selected user type
Add default 5 min timeout to powershell scripting and make ExecutionPolicy optional
Add ssl option flag to Exchange Deployment Task (beta - try it out if you need it).
5.1.10 : 2020/10/13
revert exception behaviour when managed certificate changes made during request
Certificate Store deployment task now allows blank cert friendly name
Improved handling of potentially invalid IIS site bindings (including ftp)
5.1.8 : 2020/09/18
Fix custom PFX credential selection UI reverting to no selection.
5.1.7 : 2020/09/14
Important: Service Manager (Stop/Start/Restart Service) Deployment Task regression since 5.1.3, caused stopped service to not restart.
5.1.6 : 2020/09/10
Update deSEC DNS provider (Posh-ACME) and fix optional parameters
Ensure concurrent updates to managed certificates list show in UI
Just show release notes for versions after currently installed version.
5.1.5 : 2020/09/07
PowerShell execution policy preference in serviceconfig.json should be passed to deployment tasks
Fix ChallengeType reported in Webhook integrations
Don't remove script files from Program Files\CertifyTheWeb\ as some users may have custom scripts there. This is a temporary change to help with upgrades. If you have scripts stored there, move them now.
Note: Do not store custom scripts under Program Files\CertifyTheWeb, instead use a custom location which will be preserved (such as C:\CertifyScripts or C:\ProgramData\Certify\Scripts)
5.1.4 : 2020/09/03
ADFS deployment task fix/update
Fix option checkbox handling for various deployment task.
Catch exception if ACME registration timeout occurs
5.1.3 : 2020/08/28
Powershell scripting logon type for local user should use .<username> if no domain specified.
Fix PFX password choice display under Certificate > Advanced (if enabled), export/conversion of password protected PFX in deployment tasks
5.1.2 : 2020/08/21
SimpleDNS provider updates and fixes
Startup exception when no existing items present
5.1.1 : 2020/08/20
Fixes: Fix issue using SimpleDNS API
5.1.0 : 2020/08/19
Custom CSR (useful for SAP Netweaver and many other servers) and Custom Private Key support
RFC2136 DNS validation support via Posh-ACME and nsupdate
New Hashicorp Vault deployment task.
New Settings UI, including options to Enable/Disable preview features
Allow custom PowerShell execution policy default via config
Fix IIS registry check exception experienced by some users
V4.1.4: Released 2019/01/29
Fix: Microsoft.Management.Infrastructure exception on Server 2008 R2. Users on older versions of windows are advised to have the latest version of the Windows Management Framework installed unless they have compatibility requirements that prevent that.
V4.1.3: Released 2019/01/27
Fix: avoid Microsoft.Management.Infrastructure exception on Server 2008 R2
V4.1.2: Released 2019/01/25
Fix: ensure legacy database schema upgrades complete OK
V4.1.1: Released 2019/01/25
Important: legacy tns-sni-01 challenges will now fallback to http-01
New: New certificate cleanup options under Settings, including daily full cleanup
New: support for acme-dns (CNAME redirection service: https://github.com/joohoi/acme-dns) for DNS challenges
New: Microsoft DNS API Provider (contributed by AJ Henderson)
New: Test results now support copy on click for copy/paste usage
Fix for account key encoding in non-english locales
Renew All/Auto Renew is now synchronous to reduce issues with larger installations committing many IIS bindings
Enhanced error reporting UI for service startup
Scheduled Task option removed from default UI, background service has performed all renewals since 3.x
Various fixes, updates and UI tweaks
V4.0.12: Released 2018/12/04
Important: Changed behaviour of Static IP and unassigned hostname binding deployment
Fix replacing of previous certificate based on thumbprint matching
Fix to ignore stale option selections if Auto deploy/auto-binding selected
Various fixes and updates
Notes regarding binding behaviour changes:
Previously the app could try to enable SNI for a Static IP binding (based on the user's settings) this is no longer attempted.
Additionally if you had specified settings for the default IP of new bindings but switched back to Auto, the specific binding IP/port etc may still have been used for new bindings, this is no longer the behaviour.
If you have an existing http binding with a static IP this will be used if no hostname has been specified (all static IP SSL bindings carry a risk of binding conflicts, using SNI and specific hostnames is recommended).
If you require administrative control of https bindings you should select an option other than Auto under Deployment and Binding Add/Update should be set to Update only.
V4.0.11: Released 2018/11/28
Important: Fix for an issue with Account Key decoding which causes invalid challenge response validation for some users (affects all 4.x users)
Logging updates and additional fixes
V4.0.10: Released 2018/10/11
Important: Fix issue with binding not being updated to latest certificate (bug from v4.0.9)
V4.0.9: Released 2018/10/09
Fix wildcard domain binding matches
Improve Azure DNS API provider
Implement retries for IIS simultaneous binding updates
V4.0.8: Released 2018/08/15
Improve UI behaviour and avoid exceptions when IIS is not installed
V4.0.7: Released 2018/08/14
Fix account change after registering new contact
V4.0.6: Released 2018/08/13
Ensure current account key in use after version upgrades
Fix possible service exceptions/service stopping while querying cert bindings during cert cleanup.
Logging improvements and add additional logging for exceptions.
V4.0.5: Released 2018/07/31
Bug fix: re-use existing https port when non-standard port in use.
Improvements to background service startup.
V4.0.4: Released 2018/07/25
New UI changes to support a new wider range of features
New deployment modes and Preview feature to see what actions the app plans to perform.
Wildcard domain certificate support (*.example.com)
Let's Encrypt ACME V2 API compatibility
DNS Validation support for a range of DNS providers
Credentials manager to store and re-use DNS provider API credentials
V3.0.11: Released 2018/01/25
Fix for 'ghost' certificate bindings when using specific IP with SNI
Fix for installer not updating app files every time
tls-sni-01 no longer available as Let's Encrypt challenge type for new certs
Minor fixes & text updates
V3.0.10: Released 2018/01/06
Faster UI changing between managed sites
Invalid domains now filtered from new cert bindings
Minor fixes, logging updates
V3.0.9: Released 2017/12/22
Add warning when adding fixed IP SNI bindings (All Unassigned is recommended alternative)
Add CertificateThumbprintHash to Powershell output
V3.0.7 & 3.0.8: Released 2017/12/16
Fix config check logic to allow for proxy API outages
V3.0.8: Add optional auto download and checksum/signature verification of updates
V3.0.6: Released 2017/12/15
Add refresh option for domains in managed site settings (when new bindings added)
Fix app crash if user attempts to open log for site with no requests yet
Site wwwroot path is now configurable independent of site
New option to configure max renewal/requests per session (useful for helping avoid rate limits)
V2.0.11 : Released 2017/09/09
Fix license validation check
V2.0.10 : Released 2017/09/09
Add warning if IIS installed instead of crashing on app startup
V2.0.9 : Released 2017/09/08
UI Updates and improvements
Bug fixes, including important fix for cert renewal on SAN certificates. Some users were seeing an issue with renewed certificates not containing all the required domains due to previous validation.
V2.0.8-beta : Released 2017/09/06
V2.0.7-beta4 : Released 2017/05/22
Bug fixes (import and settings UI)
V2.0.6-beta3 : Released 2017/05/22
New Feedback Submission UI
V2.0.5-beta2 : Released 2017/05/21
Make use of EFS for sensitive files optional
V2.0.4-beta1 : Released 2017/05/19
First 2.0 Beta
Bug fixes and UI updates, TLS1.2-only comms now supported
New registration options
V2.0.3-alpha : Released 2017/05/09
Alpha preview of V2.0 released for initial feedback
New Managed Sites feature for granular control of requests and renewals
New Auto Renew and Renew All features
Multi domain/subdomain certificate support using SAN certificates
No longer requires PowerShell
Disable identifier re-use. Caused issues for renewals.
Enable ACME identifier re-use if identifers not expired and still pending/valid, to avoid rate limits when making repeated requests for same domain. You should upgrade from this version immediately. Renewed certificates will not work due to decryption key issues.
Fix powershell version detection sequence to avoid crash initialising vault. You need to be running Powershell 4.0 or higher.
Fix issue where generate domain identifier aliases were too long, causing cert requests to fail.
Remove default filter on IIS site state (some users not seeing there IIS sites)
Update to automated extensionless URL config checks for IIS (including Server 2012)
Removed the dependency on the ACMESharp PowerShell module from Powershell Gallery and bundled our own build
Minor fixes and UI Updates: Tree view now expands your domain list by default