Integrating Key Vault with DigiCert certificate authority

Azure Key Vault allows you to easily provision, manage, and deploy digital certificates for your network and to enable secure communications for applications. A digital certificate is an electronic credential that establishes proof of identity in an electronic transaction.

Azure Key Vault users can generate DigiCert certificates directly from their key vaults. Key Vault has a trusted partnership with DigiCert certificate authority. This partnership ensures end-to-end certificate lifecycle management for certificates issued by DigiCert.

For more general information about certificates, see Azure Key Vault certificates.

If you don't have an Azure subscription, create a free account before you start.


To complete the procedures in this article, you need to have:

Before you begin

Make sure you have the following information from your DigiCert CertCentral account:

  • CertCentral account ID
  • Organization ID
  • API key

Add the certificate authority in Key Vault

After you gather the preceding information from your DigiCert CertCentral account, you can add DigiCert to the certificate authority list in the key vault.

Azure portal

  1. To add DigiCert certificate authority, go to the key vault you want to add it to.

  2. On the Key Vault property page, select Certificates.

  3. Select the Certificate Authorities tab: Screenshot that shows selecting the Certificate Authorities tab.

  4. Select Add: Screenshot that shows the Add button on the Certificate Authorities tab.

  5. Under Create a certificate authority, enter these values:

    • Name: An identifiable issuer name. For example, DigiCertCA.
    • Provider: DigiCert.
    • Account ID: Your DigiCert CertCentral account ID.
    • Account Password: The API key you generated in your DigiCert CertCentral account.
    • Organization ID: The organization ID from your DigiCert CertCentral account.
  6. Select Create.

DigicertCA is now in the certificate authority list.

Azure PowerShell

You can use Azure PowerShell to create and manage Azure resources by using commands or scripts. Azure hosts Azure Cloud Shell, an interactive shell environment that you can use through the Azure portal in a browser.

If you choose to install and use PowerShell locally, you need Azure AZ PowerShell module 1.0.0 or later to complete the procedures here. Type $PSVersionTable.PSVersion to determine the version. If you need to upgrade, see Install Azure AZ PowerShell module. If you're running PowerShell locally, you also need to run Login-AzAccount to create a connection with Azure:

  1. Create an Azure resource group by using New-AzResourceGroup. A resource group is a logical container into which Azure resources are deployed and managed.

    New-AzResourceGroup -Name ContosoResourceGroup -Location EastUS
  2. Create a key vault that has a unique name. Here, Contoso-Vaultname is the name for the key vault.

    • Vault name: Contoso-Vaultname
    • Resource group name: ContosoResourceGroup
    • Location: EastUS
    New-AzKeyVault -Name 'Contoso-Vaultname' -ResourceGroupName 'ContosoResourceGroup' -Location 'EastUS'
  3. Define variables for the following values from your DigiCert CertCentral account:

    • Account ID
    • Organization ID
    • API Key
    $accountId = "myDigiCertCertCentralAccountID"
    $org = New-AzKeyVaultCertificateOrganizationDetail -Id OrganizationIDfromDigiCertAccount
    $secureApiKey = ConvertTo-SecureString DigiCertCertCentralAPIKey -AsPlainText –Force
  4. Set the issuer. Doing so will add Digicert as a certificate authority in the key vault. Learn more about the parameters.

    Set-AzKeyVaultCertificateIssuer -VaultName "Contoso-Vaultname" -Name "TestIssuer01" -IssuerProvider DigiCert -AccountId $accountId -ApiKey $secureApiKey -OrganizationDetails $org -PassThru
  5. Set the policy for the certificate and issuing certificate from DigiCert directly in Key Vault:

    $Policy = New-AzKeyVaultCertificatePolicy -SecretContentType "application/x-pkcs12" -SubjectName "" -IssuerName "TestIssuer01" -ValidityInMonths 12 -RenewAtNumberOfDaysBeforeExpiry 60
    Add-AzKeyVaultCertificate -VaultName "Contoso-Vaultname" -Name "ExampleCertificate" -CertificatePolicy $Policy

The certificate is now issued by DigiCert certificate authority in the specified key vault.


If the certificate issued is in disabled status in the Azure portal, view the certificate operation to review the DigiCert error message for the certificate:

Screenshot that shows the Certificate Operation tab.

Error message: "Please perform a merge to complete this certificate request."

Merge the CSR signed by the certificate authority to complete the request. For information about merging a CSR, see Create and merge a CSR.

For more information, see Certificate operations in the Key Vault REST API reference. For information on establishing permissions, see Vaults - Create or update and Vaults - Update access policy.

Frequently asked questions

  • Can I generate a DigiCert wildcard certificate by using Key Vault?

    Yes, though it depends on how you configured your DigiCert account.

  • How can I create an OV SSL or EV SSL certificate with DigiCert?

    Key Vault supports the creation of OV and EV SSL certificates. When you create a certificate, select Advanced Policy Configuration and then specify the certificate type. Supported values: OV SSL, EV SSL

    You can create this type of certificate in Key Vault if your DigiCert account allows it. For this type of certificate, validation is performed by DigiCert. If validation fails, the DigiCert support team can help. You can add information when you create a certificate by defining the information in subjectName.

    For example, SubjectName="CN =, OU = Microsoft Corporation, O = Microsoft Corporation, L = Redmond, S = WA, C = US".

  • Does it take longer to create a DigiCert certificate via integration than it does to acquire it directly from DigiCert?

    No. When you create a certificate, the verification process might take time. DigiCert controls that process.

Next steps