Menu

Tuesday, 21 October 2025

๐Ÿ”’ SSL Certificate Renewal on Akamai WAF and Its Impact on Applications.

  • Managing SSL certificates on Akamai is critical for ensuring uninterrupted access to Internet-facing applications. 
  • This guide covers the Akamai certificate renewal process, SSL pinning, and testing procedures on staging environments.

๐Ÿ“š Topics Covered
  1. Akamai Certificate Renewal Method — How Akamai CPS automates and manages SSL renewals.
  2. SSL Pinning: What It Is and Why It’s Required — Understanding its purpose, risks during renewal, and testing procedures.
  3. Testing on Staging Environment (Web & Mobile) — Validating renewed certificates on Akamai’s staging edge before production rollout.
⚠️ Note: SSL certificate renewal on Akamai affects Internet-facing apps using the wildcard domain *.yourdomainapp.com.  Intranet-based apps are not affected.


⚙️ Akamai CPS Fail-Safe Deployment Features

1️⃣ 7-Day Auto Push 
If “Always Test on Staging before Deployment” is enabled, CPS automatically promotes the renewed certificate from staging to production 7 days before expiry, ensuring uninterrupted service.

2️⃣ Safety Net
CPS overrides manual holds to prevent expired certificates or DoS risks. For DV Wildcards like *.middlewarebox.com, renewal and activation happen automatically.

3️⃣ Renewal Timing
Auto-renewal starts 30 days before expiry, and the 7-day fail-safe window ensures timely production rollout even if manual steps are delayed.


๐Ÿ’ฅ Impacted Applications , Temporary SSL-Handshake or Connectivity issue.

  1. Mobile Applications – Android and iOS apps using HTTPS or certificate SHA256 pinning for API communication with *.yourdomain.com.
  2. Web-Based Applications – Internet-facing portals, dashboards, or web services behind Akamai using the same domain.
  3. API Endpoints / Partner Integrations Public or partner-facing APIs secured via *.yourdomain.com, often validating SSL through public key pinning.
Note: Internal or intranet-only apps remain unaffected.



๐Ÿ”‘ SSL Certificate Pinning – Why It Matters
  • SSL Pinning ensures client apps (especially mobile apps) trust only a specific SSL certificate or public key, not just any CA-signed certificate.
  • This protects against Man-in-the-Middle (MITM) attacks, even if a CA is compromised.
⚠️ Important: During renewal, the public key or hash fingerprint may change. If your app uses certificate pinning, old pins will cause SSL handshake failures until updated with the new certificate.

-------------------------------------------------------------------------------------------------------


๐Ÿงฉ Extracting Public Key & Certificate Hash for Pinning

Step 1: Get the new SSL certificate from the Akamai team from the staging environment.

Step 2: Extract the public key SSL-pinning SHA256:
command:-
openssl x509 -in certificate.cer -pubkey -noout | openssl pkey -pubin -outform der | openssl dgst -sha256 -binary | openssl enc -base64

Example Output:
Aq7AoU/d/6jl4LBYRNpR4BrssWrtkgu7jTnp95Ibrsc=

Note:
  • This SSL pinning value (SHA-256 hash) should be updated in your mobile applications (Android/iOS) to ensure successful HTTPS communication after certificate renewal.
  • Failing to update this pin may result in SSL handshake errors or connection failures when the new certificate goes live in production.

command :-
openssl x509 -in certificate.cer -outform DER | openssl dgst -sha256 -binary | openssl enc -base64

Example Output:
4BmfNA+XSJnIoSizRiRT/d3AqW27pBROTPUMxFbpEfM=

-------------------------------------------------------------------------------------------------------



๐Ÿงช Testing the New SSL Certificate from Staging:

Ask the Akamai team to push the new SSL certificate to the staging environment.

1️⃣ Web-Based Applications :

Step 1: Perform DNS lookup for staging: 
[applicationname].middlewarebox.com.edgekey.staging.net


Output Example:
Server:  dns.google
Address:  8.8.8.8
Non-authoritative answer:
Addresses:  2600:1f18:4ae:c608:83f8:2f9c:4a61:7b6a
          54.165.131.183
          52.44.244.98
Aliases:  middlewarebox.com.edgekey.staging.net

Step 2: Edit hosts file on your laptop: "C:\Windows\System32\drivers\etc\hosts"
52.44.244.98  middlewarebox.com

Step 3: Ping staging server:  "ping middlewarebox.com"

Step 4: Validate staging certificate in browser (use Incognito mode) via:


2️⃣ Mobile Applications:

Step 1: Perform same DNS lookup as above.

Step 2: Update hosts file with staging IP. same as above 

Step 3: Enable Windows Mobile Hotspot: run below command  or 
In Windows PC - Open Settings >> Then Mobile Hostpot.

Step 4: Connect your iOS/Android device to the hotspot.

Step 5: Open the mobile app (ensure mobile Internet is disabled) and log in to validate the new SSL certificate.


To test for Production,test via Browser / SSL Labs

SSL
SSL Pinning

















Flow Chart:


ProTip: "Renewal is automated, but testing is manual - don't skip validation! This ensures true zero-downtime for ALL your applications." 


No comments:

Post a Comment