IAS root certificate rotation (G2 update)
The IAS clients previously distributed to you include the DigiCert Global Root G1 certificate, which will be deprecated from April 15, 2026 (see the DigiCert Root & Intermediate CA Updates to learn more). To prevent trust failures after this date, IAS is transitioning to the DigiCert Global Root G2 certificate.
Mind the deadline!
To maintain secure connectivity, you must add the new G2 Root CA to your IAS clients by January 31, 2026.
This release introduces an in-place rotation process that appends the G2 certificate to the existing roots.pem file, while keeping the G1 certificate for backward compatibility.
The following sections provide a checklist, prerequisites, and step-by-step instructions to help you complete the rotation safely and without service interruption.
Overview
The table below provides a high-level overview of the steps required to ensure that your IAS deployment includes the new DigiCert Global Root G2 certificate. Each step summarizes the action, its purpose, and the completion criteria to help you plan the rotation before moving on to the detailed procedure.
| S. no | Step | Description | Completion criteria |
|---|---|---|---|
| 1 | Backup Existing Roots File | Create a backup of the existing roots.pem file before making changes. | The backup file is successfully created. |
| 2 | Append G2 Certificate | Append the full DigiCert Global Root G2 certificate to the end of roots.pemNote: Do not remove or edit existing entries. | File saved without syntax or formatting errors. |
| 3 | Restart IAS Service | Restart IAS to load the updated certificate file. | Service restarts without errors. |
| 4 | Verify Certificate Load | Review IAS logs to confirm G2 entry appears under roots.pem | Log shows # DigiCert Global Root G2 followed by the certificate data. |
| 5 | Confirm Successful Operation | Ensure IAS is running and all SSL/TLS operations continue without issue. | IAS service active; no connectivity or handshake errors. |
| 6 | Report Completion | Notify your Akamai support contact upon successful completion | Confirmation email sent by your team |
See the sections below for the detailed instructions on how to complete each step.
Prerequisites
Before performing the certificate rotation, ensure that the following prerequisites are met:
- Access – You have administrative (sudo) and SSH access to the IAS server.
- Certificate Availability – The DigiCert Global Root G2 certificate file is available for deployment. Make sure that you:
- Go to the Media Services Live 4 section in Download Center
- Expand the Ingest Acceleration Service G2 Root CA menu.
- Click DigiCertGlobalRootG2.crt.pem to download the certificate.
- Save it to a secure location accessible from your IAS host.
- Backup – A backup of the existing
roots.pemfile has been created before making any modifications.
Example:cp /var/opt/akamai-ias/roots.pem /var/opt/akamai-ias/roots.pem.bak - Hash Verification – The certificate’s SHA-256 fingerprint has been verified and matches the expected value:
CB:3C:CB:B7:60:31:E5:E0:13:8F:8D:D3:9A:23:F9:DE:47:FF:C3:5E:43:C1:14:4C:EA:27:D4:6A:5A:B1:CB:5F
How to add the new G2 certificate
To add your certificate, follow the steps below in your preferred command-line environment (for example, Terminal, PowerShell, or a similar shell). Adjust the commands as needed for your operating system.
-
Connect to the IAS Server. Replace
<user>and<hostname-or-IP>with your actual credentials or server details:ssh -A <user>@<hostname-or-IP> -
Navigate to the Certificate Directory:
cd /var/opt/akamai-ias/ -
In the Certificate Directory:
- Confirm that the
roots.pemfile exists:ls -l roots.pem - Backup the file before making any changes by either:
cp roots.pem roots.pem.bak, orcp roots.pem roots.pem.bak_$(date +%Y%m%d)
- Confirm that the
-
Edit the Root Certificate File
-
Open the file in vi:
vi roots.pem -
Press Shift + G to jump to the bottom of the file.
-
Press ‘o’ to insert a new line below the last certificate.
-
Paste the following content exactly as shown below, including the comment and blank line at the end.
# DigiCert Global Root G2 -----BEGIN CERTIFICATE----- MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG 9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI 2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx 1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV 5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY 1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4 NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91 8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl MrY= -----END CERTIFICATE-----
Make sure to follow the guidelines
- The comment line (# DigiCert Global Root G2) helps future maintainers easily identify this certificate.
- Ensure one blank line separates this new certificate from the previous one.
- Maintain correct PEM formatting, that is each certificate block must start with
-----BEGIN CERTIFICATE-----and end with-----END CERTIFICATE-----with no extra spaces. - Do not alter or remove existing certificate entries.
-
-
To save your changes and exit, in
vi:- press Esc,
- type
:wq! - press Enter.
-
Verify the updated file:
- Verify that OpenSSL can read the PEM structure:
- Use a simple command that checks the full bundle and lists all certificate subjects:
openssl crl2pkcs7 -nocrl -certfile roots.pem | openssl pkcs7 -print_certs -noout - The expected outcome is that you should see an output listing the subjects of all certificates in the file. This confirms that OpenSSL can parse all certificates and your new root is included, for example:
subject=C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root G2issuer=C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root G2, etc.
- Use a simple command that checks the full bundle and lists all certificate subjects:
- Check PEM formatting
- Make sure each certificate has a matching pair of
BEGINandENDlines:
grep -E "BEGIN CERTIFICATE|END CERTIFICATE" roots.pem - The expected output is that the number of BEGIN and END lines should match. This ensures the file is properly formatted:
-----BEGIN CERTIFICATE----- -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- -----END CERTIFICATE----- ...
- Make sure each certificate has a matching pair of
- Validate syntax using OpenSSL
- Check that OpenSSL can parse the full bundle:
openssl verify -CAfile roots.pem roots.pem - The expected output is the following:
roots.pem: OKSome self-signed root certificates may generate a self-signed warning. This is normal and can be ignored.
- Check that OpenSSL can parse the full bundle:
- Confirm new line at end of file
- Check the last few lines to ensure the file ends cleanly:
tail -n 5 roots.pem - Ensure the file ends with a single new line to prevent parsing issues. If the last line is
-----END CERTIFICATE-----with no blank line below it, add one:sed -i -e '$a\' roots.pem
- Check the last few lines to ensure the file ends cleanly:
- Verify that OpenSSL can read the PEM structure:
-
Restart the IAS Service
- Once validation is successful, restart IAS:
sudo systemctl restart akamai-ias - Confirm service status:
sudo systemctl status akamai-ias - You should now see:
active (running)
- Once validation is successful, restart IAS:
Validation
After restarting the IAS service, verify that the certificate addition completed successfully.
The table below lists the validation steps and the expected outcomes, including information that the new DigiCert Global Root G2 certificate has been loaded
| Step | Outcome | |
|---|---|---|
| Check service status | akamai-ias service is active and running. | |
| Review latest log file | The most recent log file in /var/log/akamai-ias/ (prefix log_NORMAL_pmiaspm) should list both G1 and G2 entries. | |
| Confirm new root load | The presence of the G2 certificate entry in this log confirms successful certificate rotation. No additional action required. |
Example: verifying G2 entry in log file
Each certificate block included in roots.pem begins with a descriptive header line.
To confirm the IAS service has loaded the new G2 certificate, search the latest log file for the corresponding header:
cd /var/log/akamai-ias/ ls -ltr log_NORMAL_pmiaspm* grep -A2 "DigiCert Global Root G2" log_NORMAL_pmiaspm_<latest>.log
Expected output:
# DigiCert Global Root G2
-----BEGIN CERTIFICATE-----
MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH
MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT
MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j
b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG
9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI
2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx
1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ
q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz
tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ
vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP
BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV
5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY
1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4
NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG
Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91
8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe
pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl
MrY=
-----END CERTIFICATE-----
If the expected output appears, the new G2 root certificate has been successfully added and recognized by IAS.
Updated 20 days ago
