Menu

Showing posts with label Akamai SSL certificate renewal. Show all posts
Showing posts with label Akamai SSL certificate renewal. Show all posts

21 Oct 2025

πŸ”’ SSL Certificate Renewal on Akamai WAF and Its Impact on Applications.

  • Managing SSL certificates on Akamai is critical for ensuring uninterrupted access to Internet-facing applications. 
  • This guide covers the Akamai certificate renewal process, SSL pinning, and testing procedures on staging environments.

πŸ“š Topics Covered
  1. Akamai Certificate Renewal Method — How Akamai CPS automates and manages SSL renewals.
  2. SSL Pinning: What It Is and Why It’s Required — Understanding its purpose, risks during renewal, and testing procedures.
  3. Testing on Staging Environment (Web & Mobile) — Validating renewed certificates on Akamai’s staging edge before production rollout.
⚠️ Note: SSL certificate renewal on Akamai affects Internet-facing apps using the wildcard domain *.yourdomainapp.com.  Intranet-based apps are not affected.


⚙️ Akamai CPS Fail-Safe Deployment Features

1️⃣ 7-Day Auto Push 
If “Always Test on Staging before Deployment” is enabled, CPS automatically promotes the renewed certificate from staging to production 7 days before expiry, ensuring uninterrupted service.

2️⃣ Safety Net
CPS overrides manual holds to prevent expired certificates or DoS risks. For DV Wildcards like *.middlewarebox.com, renewal and activation happen automatically.

3️⃣ Renewal Timing
Auto-renewal starts 30 days before expiry, and the 7-day fail-safe window ensures timely production rollout even if manual steps are delayed.


πŸ’₯ Impacted Applications , Temporary SSL-Handshake or Connectivity issue.

  1. Mobile Applications – Android and iOS apps using HTTPS or certificate SHA256 pinning for API communication with *.yourdomain.com.
  2. Web-Based Applications – Internet-facing portals, dashboards, or web services behind Akamai using the same domain.
  3. API Endpoints / Partner Integrations Public or partner-facing APIs secured via *.yourdomain.com, often validating SSL through public key pinning.
Note: Internal or intranet-only apps remain unaffected.



πŸ”‘ SSL Certificate Pinning – Why It Matters
  • SSL Pinning ensures client apps (especially mobile apps) trust only a specific SSL certificate or public key, not just any CA-signed certificate.
  • This protects against Man-in-the-Middle (MITM) attacks, even if a CA is compromised.
⚠️ Important: During renewal, the public key or hash fingerprint may change. If your app uses certificate pinning, old pins will cause SSL handshake failures until updated with the new certificate.

-------------------------------------------------------------------------------------------------------


🧩 Extracting Public Key & Certificate Hash for Pinning

Step 1: Get the new SSL certificate from the Akamai team from the staging environment.

Step 2: Extract the public key SSL-pinning SHA256:
command:-
openssl x509 -in certificate.cer -pubkey -noout | openssl pkey -pubin -outform der | openssl dgst -sha256 -binary | openssl enc -base64

Example Output:
Aq7AoU/d/6jl4LBYRNpR4BrssWrtkgu7jTnp95Ibrsc=

Note:
  • This SSL pinning value (SHA-256 hash) should be updated in your mobile applications (Android/iOS) to ensure successful HTTPS communication after certificate renewal.
  • Failing to update this pin may result in SSL handshake errors or connection failures when the new certificate goes live in production.

command :-
openssl x509 -in certificate.cer -outform DER | openssl dgst -sha256 -binary | openssl enc -base64

Example Output:
4BmfNA+XSJnIoSizRiRT/d3AqW27pBROTPUMxFbpEfM=

-------------------------------------------------------------------------------------------------------



πŸ§ͺ Testing the New SSL Certificate from Staging:

Ask the Akamai team to push the new SSL certificate to the staging environment.

1️⃣ Web-Based Applications :

Step 1: Perform DNS lookup for staging: 
[applicationname].middlewarebox.com.edgekey.staging.net


Output Example:
Server:  dns.google
Address:  8.8.8.8
Non-authoritative answer:
Addresses:  2600:1f18:4ae:c608:83f8:2f9c:4a61:7b6a
          54.165.131.183
          52.44.244.98
Aliases:  middlewarebox.com.edgekey.staging.net

Step 2: Edit hosts file on your laptop: "C:\Windows\System32\drivers\etc\hosts"
52.44.244.98  middlewarebox.com

Step 3: Ping staging server:  "ping middlewarebox.com"

Step 4: Validate staging certificate in browser (use Incognito mode) via:


2️⃣ Mobile Applications:

Step 1: Perform same DNS lookup as above.

Step 2: Update hosts file with staging IP. same as above 

Step 3: Enable Windows Mobile Hotspot: run below command  or 
In Windows PC - Open Settings >> Then Mobile Hostpot.

Step 4: Connect your iOS/Android device to the hotspot.

Step 5: Open the mobile app (ensure mobile Internet is disabled) and log in to validate the new SSL certificate.


To test for Production,test via Browser / SSL Labs

SSL
SSL Pinning

















Flow Chart:


ProTip: "Renewal is automated, but testing is manual - don't skip validation! This ensures true zero-downtime for ALL your applications."