<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Confused about updating to the new SLL Certificates in Integration and Testing</title>
    <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90450#M56900</link>
    <description>&lt;P&gt;Hi jmorrison,&lt;/P&gt;&lt;P&gt;Would you please tell us if you were able to get an answer on which certs to install on our servers in order to call Auth-Net APIs?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Like you, I am unsure and do not just want to start installing certicates randomly.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Randy&lt;/P&gt;</description>
    <pubDate>Wed, 09 Oct 2024 19:39:47 GMT</pubDate>
    <dc:creator>kroegerr</dc:creator>
    <dc:date>2024-10-09T19:39:47Z</dc:date>
    <item>
      <title>Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90345#M56835</link>
      <description>&lt;P&gt;I recently got an email about SSL certificate changes for anyone using the authorize.net API to process transactions. I use a cURL in PHP to call the following endpoint for all my payment processing:&lt;/P&gt;&lt;P&gt;&lt;A href="https://api.authorize.net/xml/v1/request.api" target="_blank"&gt;https://api.authorize.net/xml/v1/request.api&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I am confused by the whole certificate thing, I just call the endpoint with my merchant credentials in the XML, as far as I know. Do I need to do anything or install something on my server to keep it working? Or am I fine continuing to do what I have been doing?&lt;/P&gt;&lt;P&gt;Excerpt from the email I got: You must integrate and use the newly-issued Root and Intermediate (CA) SSL certificates from DigiCert by October 24 to avoid any disruptions.&lt;/P&gt;&lt;P&gt;I love the vague words "integrate and use". How do I integrate and then how do I use, in PHP and on my server?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2024 14:08:30 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90345#M56835</guid>
      <dc:creator>Talentville</dc:creator>
      <dc:date>2024-09-27T14:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90346#M56836</link>
      <description>&lt;P&gt;I too am confused by this.&amp;nbsp; I've opened a support ticket with Authorize.NET, but they only keep referring me to the same links that were in that email.&lt;/P&gt;&lt;P&gt;In their article,&amp;nbsp;&lt;A href="https://support.authorize.net/knowledgebase/Knowledgearticle/?code=KA-05545" target="_blank" rel="noopener"&gt;Entrust to DigiCert SSL Certificate Migration&lt;/A&gt;, it states, "You can download the latest version of the Root and Intermediate (CA) certificates from the zip file in the Attachments section below."&amp;nbsp; However, &lt;EM&gt;there is no attachments section or links to a zip file&lt;/EM&gt;.&amp;nbsp; They also referred me to the article&amp;nbsp;&lt;A href="https://support.authorize.net/knowledgebase/Knowledgearticle/?code=000003009" target="_self"&gt;Where can I find the latest version of Authorize.nets server-level SSL certificates?&amp;nbsp; &lt;/A&gt;However, the instructions in here also appear useless.&amp;nbsp; Navigating to the endpoints to download the certificates only gets the &lt;EM&gt;current&lt;/EM&gt; certificates -- not the new ones they will transition to.&amp;nbsp; They also have links to DigiCert to download root certificates, but DigiCert lists dozens of certificates on that page and I don't know which one to download.&lt;/P&gt;&lt;P&gt;Does anyone know which certificates we actually need and where to get them?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2024 16:33:23 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90346#M56836</guid>
      <dc:creator>jmorrison</dc:creator>
      <dc:date>2024-09-27T16:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90348#M56838</link>
      <description>&lt;P&gt;My bigger confusion is that right now I don't rely on anything at all other than calling the API endpoint with my merchant credentials in the XML. I just call it and it works, no certificate or anything else.&amp;nbsp; If I am just calling a URL via cURL, how would this certificate even get used and where would it get 'installed'?&amp;nbsp; Am I supposed to install it somehow on my own server and then set some callback in the authnet portal?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I am getting at is a wonder of what the flow of execution is when I just call the API endpoint with XML passed in, as well as where this certificate would be put and how it would be triggered in my use of the API endpoints.&lt;/P&gt;&lt;P&gt;Perhaps I just have to wait it out and see if it all keeps working, without real guidance from those in the know.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2024 16:40:54 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90348#M56838</guid>
      <dc:creator>Talentville</dc:creator>
      <dc:date>2024-09-27T16:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90349#M56839</link>
      <description>&lt;P&gt;When you call the API endpoint, the Auth.Net server sends back a TLS certificate.&amp;nbsp; This certificate was issued by a trusted third party (DigiCert in this case), and the Auth.Net certificate references back to an intermediate and root certificate from DigiTrust.&amp;nbsp; Your server must know and trust those other certificates in order to trust the Auth.Net certificate.&amp;nbsp; If your server doesn't trust the TLS certificate, the connection will likely fail.&lt;/P&gt;&lt;P&gt;Therefore, it sounds like we need to verify that these intermediate and root certificates are installed on our servers so that the new Auth.Net certificate will be trusted.&amp;nbsp; However, I don't know what intermediate and root certificates to check for or install if they are missing.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2024 16:48:58 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90349#M56839</guid>
      <dc:creator>jmorrison</dc:creator>
      <dc:date>2024-09-27T16:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90352#M56842</link>
      <description>&lt;P&gt;Hey all,&lt;/P&gt;&lt;P&gt;Are you using the &lt;A href="https://github.com/AuthorizeNet" target="_self"&gt;SDK&lt;/A&gt; or not? I'm using the PHP SDK, and there is &lt;A href="https://github.com/AuthorizeNet/sdk-php/blob/master/lib/ssl/cert.pem" target="_self"&gt;a certificate file called "cert.pem"&lt;/A&gt;. This file was updated 6 years ago, and I think it should be updated with this change. This file is used in the &lt;A href="https://github.com/AuthorizeNet/sdk-php/blob/master/lib/net/authorize/util/HttpClient.php" target="_self"&gt;HttpClient&lt;/A&gt; class (look at line 80):&lt;/P&gt;&lt;LI-CODE lang="php"&gt;curl_setopt($curl_request, CURLOPT_CAINFO, dirname(dirname(__FILE__)) . '/../../ssl/cert.pem');&lt;/LI-CODE&gt;&lt;P&gt;I'm using the very old version of this SDK actually, but there is the same code also.&lt;/P&gt;&lt;P&gt;One thing I don't understand at the moment is where we can get a new version of "cert.pem" if it's not updated within GitHub. Maybe you have an idea?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2024 22:05:08 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90352#M56842</guid>
      <dc:creator>mvs3d</dc:creator>
      <dc:date>2024-09-27T22:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90357#M56847</link>
      <description>&lt;P&gt;I actually do not use the official PHP SDK,I use a third party PHP class (which I see in the comments was created 15 years ago!) that uses simple cURL calls with attached XML to call the CIM module (which I use to store my customer info).&amp;nbsp; There is no reference to any certificate of any sort, purely a basic call that includes my merchant login ID and secret key.&amp;nbsp; So, even the idea of upgrading a certificate means little to me.&lt;/P&gt;&lt;P&gt;Since I doubt AuthNet will let tons of merchants to suddenly stop being able to take money, I think I am going to have to take my chances, although I may investigate new libraries to be as ready as I can be if suddenly my site cannot accept payments.&lt;/P&gt;&lt;P&gt;These sorts of things make me wonder why I use authorize.net, there are probably other processors who are more modern and who can actually provide developer and merchant support that means something.&amp;nbsp; It was just so simple previously integrating payments by just building the transaction in XML and calling an endpoint when I first started taking payments at my site.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Sep 2024 13:14:50 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90357#M56847</guid>
      <dc:creator>Talentville</dc:creator>
      <dc:date>2024-09-28T13:14:50Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90402#M56870</link>
      <description>&lt;P&gt;Commenting just to follow and echo the original poster. I'm pretty confused (and concerned) about what this means on my end. I'm *not* a developer but rather a lowly IT guy who inherited some Authorize.net integrations to both Drupal and Salesforce. We do have a website developer looking into that end, but I'm confused as to what I'm supposed to do in Salesforce. This integration is just custom Apex code that fires callouts to Authorize endpoints and returns transaction lists. Will I need to make any changes to this?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2024 17:45:11 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90402#M56870</guid>
      <dc:creator>zgoldberg</dc:creator>
      <dc:date>2024-10-01T17:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90450#M56900</link>
      <description>&lt;P&gt;Hi jmorrison,&lt;/P&gt;&lt;P&gt;Would you please tell us if you were able to get an answer on which certs to install on our servers in order to call Auth-Net APIs?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Like you, I am unsure and do not just want to start installing certicates randomly.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Randy&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 19:39:47 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90450#M56900</guid>
      <dc:creator>kroegerr</dc:creator>
      <dc:date>2024-10-09T19:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90452#M56902</link>
      <description>&lt;P&gt;To be honest folks, the whole certificate thing bothered me, so I ripped out AuthNet from my website and migrated to Stripe.&amp;nbsp; It took 3 days, between understanding it and implementing and a few support chats, which is pretty quick for a custom-coded website, and using their embedded checkout form I am able to avoid AuthNet's monthly charges and the certificate issue and the need to use an XML-based cURL API system.&amp;nbsp; I don't even need to run a PCI test quarterly any more with Stripe or handle ANY credit card numbers for customers.&lt;/P&gt;&lt;P&gt;Best move I ever made for my website.&lt;/P&gt;&lt;P&gt;I used AuthNet for 12 years, so glad to be getting out from under their thumb.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 20:14:40 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90452#M56902</guid>
      <dc:creator>Talentville</dc:creator>
      <dc:date>2024-10-09T20:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90459#M56906</link>
      <description>&lt;P&gt;We're also now considering this exact switch. It just seems like there are other processors that will be smoother. Just trying to figure out how to migrate subscriptions, but I think we will be moving to Stripe as well.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 15:27:04 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90459#M56906</guid>
      <dc:creator>zgoldberg</dc:creator>
      <dc:date>2024-10-10T15:27:04Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90460#M56907</link>
      <description>&lt;P&gt;I am not trying to necessarily knock AuthNet (used it for a decade), but consider the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I will no longer need quarterly PCI tests, which are invasive and filled with false positives.&amp;nbsp; That killed a week of my time every 90 days.&lt;/LI&gt;&lt;LI&gt;After cancelling my AuthNet, I called to cancel my processor, Evo Payments, and it seems I am in a contract for 2 more months, so I have to keep paying those thieves even as I do not use their service any more.&amp;nbsp; Good riddance to all of them.&lt;/LI&gt;&lt;LI&gt;I can now get rid of my entire custom-coded checkout system, as well as XML formatting and calling the AuthNet API, with their fairly substandard error messages when things go wrong.&amp;nbsp; I no longer handle any card info at all since that is done in the Stripe form.&lt;/LI&gt;&lt;LI&gt;I can now accept a wide variety of alternate payment types, from Amazon pay to Cash App and others.&amp;nbsp; Gives more flexibility with zero coding.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Implementing Stripe was easy with a bit of chat support and their embedded form (I like that instead of switching to the Stripe site for the payment).&amp;nbsp; Their form looks fine and lists the items, sends a nice receipt to the customers, etc.&amp;nbsp; Smooth 3 day integration, start to finish.&amp;nbsp; Products/Memberships (anything you sell) will have to be either manually added to their system or done via the API, but if you have loads of products, and you have their software installed (done via composer for the most part), a programmatic loop to create products and associated prices is a simple task.&lt;/P&gt;&lt;P&gt;We all have to make our own decisions on payment processors, I just finally decided an all in one setup, with a drop-in form for card info, would simplify everything.&amp;nbsp; So far it feels like a move years too late.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 15:47:34 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90460#M56907</guid>
      <dc:creator>Talentville</dc:creator>
      <dc:date>2024-10-10T15:47:34Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90477#M56915</link>
      <description>&lt;P data-unlink="true"&gt;Their support was not super helpful, and couldn't tell me specifically what certs to install.&amp;nbsp; However, looking more closely at their article, &lt;A href="https://support.authorize.net/knowledgebase/Knowledgearticle/?code=000003009" target="_self"&gt;Where can I find the latest version of Authorize.nets server-level SSL certificates?&lt;/A&gt;,&amp;nbsp; I found an Attachments section at the very bottom of the page where you can download a zip file with certificates.&amp;nbsp; It's easy to miss because there is extra whitespace between the last set of instructions and the attachments section.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2024 13:40:47 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90477#M56915</guid>
      <dc:creator>jmorrison</dc:creator>
      <dc:date>2024-10-11T13:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90575#M56952</link>
      <description>&lt;P&gt;Hi everyone.&amp;nbsp; I figured out what needed to be done.&amp;nbsp; I accomplished it by using ChatGPT &amp;amp; SSH and here are the steps (hope this can help some of you):&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i want to try with ssh. do i need to be logged in with special privelages?&lt;BR /&gt;ChatGPT said:&lt;BR /&gt;ChatGPT&lt;BR /&gt;Yes, to manually add the Root and Intermediate certificates to your server’s trusted certificate store via SSH, you will need to log in with root or superuser (sudo) privileges. This is necessary because the certificate files you’ll be modifying are located in system directories that require administrative permissions to access and modify.&lt;/P&gt;&lt;P&gt;Steps to Proceed with SSH:&lt;BR /&gt;Log in to your server via SSH:&lt;/P&gt;&lt;P&gt;Use a terminal (on Linux/Mac) or an SSH client (like PuTTY on Windows).&lt;BR /&gt;The login command should look something like this:&lt;BR /&gt;css&lt;BR /&gt;Copy code&lt;BR /&gt;ssh root@your-server-ip&lt;BR /&gt;If you're using a non-root user, but that user has sudo privileges, log in with that user and prefix commands with sudo.&lt;BR /&gt;Locate the Trusted Certificates Directory:&lt;/P&gt;&lt;P&gt;On many Linux-based systems, the CA certificate directory is typically:&lt;BR /&gt;/etc/ssl/certs/ (for trusted certificates)&lt;BR /&gt;Or /usr/share/ca-certificates/ (for adding new certificate authorities)&lt;BR /&gt;Copy the CRT files to the Trusted Directory:&lt;/P&gt;&lt;P&gt;You can use the scp command to copy the certificates from your local machine to the server, or you can use an editor like nano to manually create the certificate files in the trusted directory.&lt;BR /&gt;Example (if using scp):&lt;/P&gt;&lt;P&gt;perl&lt;BR /&gt;Copy code&lt;BR /&gt;scp /path/to/your/Intermediate.crt root@your-server-ip:/etc/ssl/certs/&lt;BR /&gt;scp /path/to/your/Root.crt root@your-server-ip:/etc/ssl/certs/&lt;BR /&gt;Update the CA Certificates:&lt;/P&gt;&lt;P&gt;If you're using a Debian-based system (like Ubuntu), you can run:&lt;BR /&gt;sql&lt;BR /&gt;Copy code&lt;BR /&gt;sudo update-ca-certificates&lt;BR /&gt;For Red Hat/CentOS-based systems, use:&lt;BR /&gt;sql&lt;BR /&gt;Copy code&lt;BR /&gt;sudo update-ca-trust&lt;BR /&gt;This will refresh the system's trusted certificate store, adding the new Root and Intermediate certificates you just copied.&lt;/P&gt;&lt;P&gt;Verify:&lt;/P&gt;&lt;P&gt;After updating the certificate store, you can verify that your server trusts the new certificates by testing the API connection to Authorize.net in the Sandbox environment.&lt;BR /&gt;Important Notes:&lt;BR /&gt;Make sure you are logged in with root or a user with sudo privileges.&lt;BR /&gt;Be careful when working with system files to avoid accidentally removing or misconfiguring important system components.&lt;BR /&gt;Let me know if you need any more detailed instructions!&lt;/P&gt;&lt;P&gt;You said:&lt;BR /&gt;I am using Terminal from WHM and the first thing I see is: [root@ded6177 ~]#&lt;BR /&gt;ChatGPT said:&lt;BR /&gt;ChatGPT&lt;BR /&gt;Since you're already logged in as root in your WHM terminal ([root@ded6177 ~]#), you have the necessary privileges to proceed with the certificate installation. Here’s how to manually add the Root and Intermediate certificates to your trusted certificate store:&lt;/P&gt;&lt;P&gt;Steps to Manually Add the Certificates&lt;BR /&gt;Create the Certificate Files:&lt;/P&gt;&lt;P&gt;You'll need to create two files in the appropriate directory to store the Root and Intermediate certificates. We’ll place them in /etc/ssl/certs/ for this example.&lt;BR /&gt;You can use a text editor like nano to create these files.&lt;/P&gt;&lt;P&gt;To create the Intermediate certificate file:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;nano /etc/ssl/certs/Intermediate-DigiCert.crt&lt;BR /&gt;Paste the entire content of the Intermediate DigiCert Certificate (CRT) into the file.&lt;BR /&gt;Save the file by pressing CTRL + X, then press Y and Enter.&lt;BR /&gt;To create the Root certificate file:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;nano /etc/ssl/certs/Root-DigiCert.crt&lt;BR /&gt;Paste the entire content of the Root DigiCert Certificate (CRT) into this file.&lt;BR /&gt;Save the file in the same way.&lt;BR /&gt;Update the CA Certificates:&lt;/P&gt;&lt;P&gt;Now that you’ve added the Root and Intermediate certificates to the directory, you need to update the CA store to recognize them.&lt;BR /&gt;Run the following command depending on your Linux distribution:&lt;/P&gt;&lt;P&gt;For Debian/Ubuntu based systems:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;update-ca-certificates&lt;BR /&gt;For Red Hat/CentOS based systems:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;update-ca-trust&lt;BR /&gt;Verify the Installation:&lt;/P&gt;&lt;P&gt;After running the command, the system should now trust the newly added certificates. You can test the connection to Authorize.net's sandbox environment or the production environment after the update.&lt;BR /&gt;Summary:&lt;BR /&gt;You’re already logged in as root, so you have the required permissions.&lt;BR /&gt;Create and paste the contents of the Root and Intermediate certificates in /etc/ssl/certs/.&lt;BR /&gt;Run update-ca-certificates (or update-ca-trust for CentOS/Red Hat).&lt;BR /&gt;Let me know how it goes or if you run into any issues!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;You said:&lt;BR /&gt;Authorize.net's sandbox environment isn't ready for a couple of days but in the meantime is there a way to verify that the certificates I added are in my server?&lt;BR /&gt;ChatGPT said:&lt;BR /&gt;ChatGPT&lt;BR /&gt;Yes, you can verify that the certificates were successfully added to your server by checking the contents of the directory where you placed them or by using specific commands to list the trusted certificates. Here’s how you can do both:&lt;/P&gt;&lt;P&gt;1. Check the Certificate Files Directly&lt;BR /&gt;You can check if the Root and Intermediate certificate files are present in the /etc/ssl/certs/ directory:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;ls -l /etc/ssl/certs/&lt;BR /&gt;Look for the files you created (Intermediate-DigiCert.crt and Root-DigiCert.crt). If they appear in the list, then they were successfully created.&lt;/P&gt;&lt;P&gt;2. Display the Contents of the Certificate Files&lt;BR /&gt;You can also view the contents of the certificate files to ensure that they contain the correct data:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;cat /etc/ssl/certs/Intermediate-DigiCert.crt&lt;BR /&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;cat /etc/ssl/certs/Root-DigiCert.crt&lt;BR /&gt;This will display the contents of each file in the terminal. Ensure that the text matches the CRT files you received from Authorize.net.&lt;/P&gt;&lt;P&gt;3. Use the openssl Command&lt;BR /&gt;You can use the openssl command to verify that your server recognizes the certificates. Here's how to check if the certificates are part of the trusted store:&lt;/P&gt;&lt;P&gt;To check the Intermediate certificate:&lt;BR /&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;openssl x509 -in /etc/ssl/certs/Intermediate-DigiCert.crt -text -noout&lt;BR /&gt;To check the Root certificate:&lt;BR /&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;openssl x509 -in /etc/ssl/certs/Root-DigiCert.crt -text -noout&lt;BR /&gt;These commands will display detailed information about the certificates, including their validity and issuer details. If the commands execute without errors, your server recognizes these certificates.&lt;/P&gt;&lt;P&gt;Summary&lt;BR /&gt;Use ls -l to list the files in /etc/ssl/certs/.&lt;BR /&gt;Use cat to view the contents of the certificates.&lt;BR /&gt;Use openssl to inspect the certificates further.&lt;BR /&gt;Let me know if you need help with any of these steps or if you have further questions!&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2024 19:45:28 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90575#M56952</guid>
      <dc:creator>warmantus</dc:creator>
      <dc:date>2024-10-21T19:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90576#M56953</link>
      <description>&lt;P&gt;I finally figured this out with the help of ChatGPT.&amp;nbsp; I am pasting my conversation here.&amp;nbsp; Hope this helps someone out:&lt;/P&gt;&lt;P&gt;i want to try with ssh. do i need to be logged in with special privelages?&lt;BR /&gt;ChatGPT said:&lt;BR /&gt;ChatGPT&lt;BR /&gt;Yes, to manually add the Root and Intermediate certificates to your server’s trusted certificate store via SSH, you will need to log in with root or superuser (sudo) privileges. This is necessary because the certificate files you’ll be modifying are located in system directories that require administrative permissions to access and modify.&lt;/P&gt;&lt;P&gt;Steps to Proceed with SSH:&lt;BR /&gt;Log in to your server via SSH:&lt;/P&gt;&lt;P&gt;Use a terminal (on Linux/Mac) or an SSH client (like PuTTY on Windows).&lt;BR /&gt;The login command should look something like this:&lt;BR /&gt;css&lt;BR /&gt;Copy code&lt;BR /&gt;ssh root@your-server-ip&lt;BR /&gt;If you're using a non-root user, but that user has sudo privileges, log in with that user and prefix commands with sudo.&lt;BR /&gt;Locate the Trusted Certificates Directory:&lt;/P&gt;&lt;P&gt;On many Linux-based systems, the CA certificate directory is typically:&lt;BR /&gt;/etc/ssl/certs/ (for trusted certificates)&lt;BR /&gt;Or /usr/share/ca-certificates/ (for adding new certificate authorities)&lt;BR /&gt;Copy the CRT files to the Trusted Directory:&lt;/P&gt;&lt;P&gt;You can use the scp command to copy the certificates from your local machine to the server, or you can use an editor like nano to manually create the certificate files in the trusted directory.&lt;BR /&gt;Example (if using scp):&lt;/P&gt;&lt;P&gt;perl&lt;BR /&gt;Copy code&lt;BR /&gt;scp /path/to/your/Intermediate.crt root@your-server-ip:/etc/ssl/certs/&lt;BR /&gt;scp /path/to/your/Root.crt root@your-server-ip:/etc/ssl/certs/&lt;BR /&gt;Update the CA Certificates:&lt;/P&gt;&lt;P&gt;If you're using a Debian-based system (like Ubuntu), you can run:&lt;BR /&gt;sql&lt;BR /&gt;Copy code&lt;BR /&gt;sudo update-ca-certificates&lt;BR /&gt;For Red Hat/CentOS-based systems, use:&lt;BR /&gt;sql&lt;BR /&gt;Copy code&lt;BR /&gt;sudo update-ca-trust&lt;BR /&gt;This will refresh the system's trusted certificate store, adding the new Root and Intermediate certificates you just copied.&lt;/P&gt;&lt;P&gt;Verify:&lt;/P&gt;&lt;P&gt;After updating the certificate store, you can verify that your server trusts the new certificates by testing the API connection to Authorize.net in the Sandbox environment.&lt;BR /&gt;Important Notes:&lt;BR /&gt;Make sure you are logged in with root or a user with sudo privileges.&lt;BR /&gt;Be careful when working with system files to avoid accidentally removing or misconfiguring important system components.&lt;BR /&gt;Let me know if you need any more detailed instructions!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;You said:&lt;BR /&gt;I am using Terminal from WHM and the first thing I see is: [root@ded6177 ~]#&lt;BR /&gt;ChatGPT said:&lt;BR /&gt;ChatGPT&lt;BR /&gt;Since you're already logged in as root in your WHM terminal ([root@ded6177 ~]#), you have the necessary privileges to proceed with the certificate installation. Here’s how to manually add the Root and Intermediate certificates to your trusted certificate store:&lt;/P&gt;&lt;P&gt;Steps to Manually Add the Certificates&lt;BR /&gt;Create the Certificate Files:&lt;/P&gt;&lt;P&gt;You'll need to create two files in the appropriate directory to store the Root and Intermediate certificates. We’ll place them in /etc/ssl/certs/ for this example.&lt;BR /&gt;You can use a text editor like nano to create these files.&lt;/P&gt;&lt;P&gt;To create the Intermediate certificate file:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;nano /etc/ssl/certs/Intermediate-DigiCert.crt&lt;BR /&gt;Paste the entire content of the Intermediate DigiCert Certificate (CRT) into the file.&lt;BR /&gt;Save the file by pressing CTRL + X, then press Y and Enter.&lt;BR /&gt;To create the Root certificate file:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;nano /etc/ssl/certs/Root-DigiCert.crt&lt;BR /&gt;Paste the entire content of the Root DigiCert Certificate (CRT) into this file.&lt;BR /&gt;Save the file in the same way.&lt;BR /&gt;Update the CA Certificates:&lt;/P&gt;&lt;P&gt;Now that you’ve added the Root and Intermediate certificates to the directory, you need to update the CA store to recognize them.&lt;BR /&gt;Run the following command depending on your Linux distribution:&lt;/P&gt;&lt;P&gt;For Debian/Ubuntu based systems:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;update-ca-certificates&lt;BR /&gt;For Red Hat/CentOS based systems:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;update-ca-trust&lt;BR /&gt;Verify the Installation:&lt;/P&gt;&lt;P&gt;After running the command, the system should now trust the newly added certificates. You can test the connection to Authorize.net's sandbox environment or the production environment after the update.&lt;BR /&gt;Summary:&lt;BR /&gt;You’re already logged in as root, so you have the required permissions.&lt;BR /&gt;Create and paste the contents of the Root and Intermediate certificates in /etc/ssl/certs/.&lt;BR /&gt;Run update-ca-certificates (or update-ca-trust for CentOS/Red Hat).&lt;BR /&gt;Let me know how it goes or if you run into any issues!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;You said:&lt;BR /&gt;Authorize.net's sandbox environment isn't ready for a couple of days but in the meantime is there a way to verify that the certificates I added are in my server?&lt;BR /&gt;ChatGPT said:&lt;BR /&gt;ChatGPT&lt;BR /&gt;Yes, you can verify that the certificates were successfully added to your server by checking the contents of the directory where you placed them or by using specific commands to list the trusted certificates. Here’s how you can do both:&lt;/P&gt;&lt;P&gt;1. Check the Certificate Files Directly&lt;BR /&gt;You can check if the Root and Intermediate certificate files are present in the /etc/ssl/certs/ directory:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;ls -l /etc/ssl/certs/&lt;BR /&gt;Look for the files you created (Intermediate-DigiCert.crt and Root-DigiCert.crt). If they appear in the list, then they were successfully created.&lt;/P&gt;&lt;P&gt;2. Display the Contents of the Certificate Files&lt;BR /&gt;You can also view the contents of the certificate files to ensure that they contain the correct data:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;cat /etc/ssl/certs/Intermediate-DigiCert.crt&lt;BR /&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;cat /etc/ssl/certs/Root-DigiCert.crt&lt;BR /&gt;This will display the contents of each file in the terminal. Ensure that the text matches the CRT files you received from Authorize.net.&lt;/P&gt;&lt;P&gt;3. Use the openssl Command&lt;BR /&gt;You can use the openssl command to verify that your server recognizes the certificates. Here's how to check if the certificates are part of the trusted store:&lt;/P&gt;&lt;P&gt;To check the Intermediate certificate:&lt;BR /&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;openssl x509 -in /etc/ssl/certs/Intermediate-DigiCert.crt -text -noout&lt;BR /&gt;To check the Root certificate:&lt;BR /&gt;bash&lt;BR /&gt;Copy code&lt;BR /&gt;openssl x509 -in /etc/ssl/certs/Root-DigiCert.crt -text -noout&lt;BR /&gt;These commands will display detailed information about the certificates, including their validity and issuer details. If the commands execute without errors, your server recognizes these certificates.&lt;/P&gt;&lt;P&gt;Summary&lt;BR /&gt;Use ls -l to list the files in /etc/ssl/certs/.&lt;BR /&gt;Use cat to view the contents of the certificates.&lt;BR /&gt;Use openssl to inspect the certificates further.&lt;BR /&gt;Let me know if you need help with any of these steps or if you have further questions!&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2024 19:48:30 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/90576#M56953</guid>
      <dc:creator>warmantus</dc:creator>
      <dc:date>2024-10-21T19:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/94164#M58229</link>
      <description>&lt;P&gt;The email is just telling you that Authorize.net will start using DigiCert’s new root and intermediate certificates for their SSL. You don’t need to change your PHP code or the way you call the API. What matters is that your server trusts those new certificates. Usually, this just means making sure your server’s “CA certificates” package is up to date. On Linux, you’d update your system (like apt-get update &amp;amp;&amp;amp; apt-get upgrade ca-certificates).&amp;nbsp;And on Windows, you may need to install the new DigiCert root and intermediate files if they aren’t already there. Once your server has the updated certificates, cURL will automatically handle everything, and your payments will keep working without interruption.&amp;nbsp;&amp;nbsp;A root certificate is an X.509 digital certificate at the top of the trust chain. It is regarded as the&amp;nbsp;core of Public Key Infrastructure.&amp;nbsp;An&amp;nbsp;intermediate certificate&amp;nbsp;is a digital certificate that can be issued by a root certificate. It serves as an intermediary between the root certificate and&amp;nbsp;the certificate used by the end user. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 06:44:32 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/94164#M58229</guid>
      <dc:creator>layla</dc:creator>
      <dc:date>2025-10-03T06:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about updating to the new SLL Certificates</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/94433#M58403</link>
      <description>&lt;P&gt;You don’t need to change your PHP or API integration the update is about SSL trust, not your code. Authorize.net is switching to new DigiCert root and intermediate certificates, and your server just needs to trust them. To stay safe, update your system’s &lt;A href="https://certera.com/blog/what-is-a-ca-certificate-authority-role-pki-trust-hierarchies/" target="_self"&gt;CA certificates&lt;/A&gt; (for example, run apt-get update &amp;amp;&amp;amp; apt-get upgrade ca-certificates on Linux). On Windows, make sure the latest DigiCert roots are installed. Once that’s done, cURL will automatically use the correct certificates, and your payments will continue working smoothly. Hope it helps!&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 12:02:30 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Confused-about-updating-to-the-new-SLL-Certificates/m-p/94433#M58403</guid>
      <dc:creator>rosalia</dc:creator>
      <dc:date>2025-10-28T12:02:30Z</dc:date>
    </item>
  </channel>
</rss>

