tencent cloud

Cloud Object Storage

Release Notes and Announcements
Release Notes
Announcements
Product Introduction
Overview
Features
Use Cases
Strengths
Concepts
Regions and Access Endpoints
Specifications and Limits
Service Regions and Service Providers
Billing
Billing Overview
Billing Method
Billable Items
Free Tier
Billing Examples
Viewing and Downloading Bill
Payment Overdue
FAQs
Getting Started
Console
Getting Started with COSBrowser
User Guide
Creating Request
Bucket
Object
Data Management
Batch Operation
Global Acceleration
Monitoring and Alarms
Operations Center
Data Processing
Content Moderation
Smart Toolbox
Data Processing Workflow
Application Integration
User Tools
Tool Overview
Installation and Configuration of Environment
COSBrowser
COSCLI (Beta)
COSCMD
COS Migration
FTP Server
Hadoop
COSDistCp
HDFS TO COS
GooseFS-Lite
Online Tools
Diagnostic Tool
Use Cases
Overview
Access Control and Permission Management
Performance Optimization
Accessing COS with AWS S3 SDK
Data Disaster Recovery and Backup
Domain Name Management Practice
Image Processing
Audio/Video Practices
Workflow
Direct Data Upload
Content Moderation
Data Security
Data Verification
Big Data Practice
COS Cost Optimization Solutions
Using COS in the Third-party Applications
Migration Guide
Migrating Local Data to COS
Migrating Data from Third-Party Cloud Storage Service to COS
Migrating Data from URL to COS
Migrating Data Within COS
Migrating Data Between HDFS and COS
Data Lake Storage
Cloud Native Datalake Storage
Metadata Accelerator
GooseFS
Data Processing
Data Processing Overview
Image Processing
Media Processing
Content Moderation
File Processing Service
File Preview
Troubleshooting
Obtaining RequestId
Slow Upload over Public Network
403 Error for COS Access
Resource Access Error
POST Object Common Exceptions
API Documentation
Introduction
Common Request Headers
Common Response Headers
Error Codes
Request Signature
Action List
Service APIs
Bucket APIs
Object APIs
Batch Operation APIs
Data Processing APIs
Job and Workflow
Content Moderation APIs
Cloud Antivirus API
SDK Documentation
SDK Overview
Preparations
Android SDK
C SDK
C++ SDK
.NET(C#) SDK
Flutter SDK
Go SDK
iOS SDK
Java SDK
JavaScript SDK
Node.js SDK
PHP SDK
Python SDK
React Native SDK
Mini Program SDK
Error Codes
Harmony SDK
Endpoint SDK Quality Optimization
Security and Compliance
Data Disaster Recovery
Data Security
Cloud Access Management
FAQs
Popular Questions
General
Billing
Domain Name Compliance Issues
Bucket Configuration
Domain Names and CDN
Object Operations
Logging and Monitoring
Permission Management
Data Processing
Data Security
Pre-signed URL Issues
SDKs
Tools
APIs
Agreements
Service Level Agreement
Privacy Policy
Data Processing And Security Agreement
Contact Us
Glossary

COS Root Certificate Upgrade Announcement

PDF
Mode fokus
Ukuran font
Terakhir diperbarui: 2026-01-13 16:55:26

Background

Due to Mozilla's Trust Store updating its root certificate trust policy, all trusted root certificates from CAs worldwide must be replaced at least every 15 years after generation. Trusted root certificates exceeding this period will be gradually distrusted by Mozilla. After April 15, 2025, the old GlobalSign R1 root certificate will no longer be trusted by Mozilla browsers.
As a result, GlobalSign certificate authority will gradually discontinue issuing TLS/SSL certificates using the old root system (R1) and begin using the new root system (R3) to issue TLS/SSL certificates, to ensure that TLS/SSL certificates continue to be trusted in Firefox browsers.




Notice

Tencent Cloud COS (Cloud Object Storage, COS)'s domain uses certificates issued by GlobalSign. To ensure that user requests are not affected, COS plans to gradually update the domain certificates. The change plan is as follows:
Before April 15, 2025, COS certificates will be replaced with cross-certificates. The cross-certificates are compatible with both the old R1 root certificate and the new R3 root certificate, ensuring minimal impact on user requests.
However, as cross-certificates will gradually expire, the old R1 root certificate will eventually be phased out. By then, clients using the new R3 root certificate will be able to make requests normally, while clients using the old R1 root certificate will fail to make requests. Therefore, it is recommended that you add the new root certificate to your trusted root certificate store as soon as possible.
In the long term, the new GlobalSign R3 root certificate will also no longer be trusted by Mozilla after April 15, 2027, and will ultimately expire on March 18, 2029. Considering long-term security and compatibility, it is recommended that clients promptly upgrade their root certificates while ensuring the root certificate list includes all known and trusted authoritative root certificates such as GlobalSign R1, R3, R6, R46 (refer to GlobalSign Root Certificates for the complete list).

User Adaptation

1. Verify whether the GlobalSign R3 new root certificate already exists in the root certificate list.
If the root certificate is missing, please add the new root certificate to your trusted root certificate store as soon as possible.
2. Ensure all authoritative root certificates have been integrated into the trusted root certificate store.
Considering long-term security and compatibility, it is recommended to pre-integrate all known and trusted authoritative root certificates into the client's trusted root certificate store to avoid future connection failures or security warnings caused by certificate trust chain issues.
3. Service monitoring.
Cross-certificates are compatible with both the old R1 root certificate and the new R3 root certificate, and theoretically should not affect user requests. However, due to variations in client environments, unforeseen situations may occur. We recommend monitoring service monitoring and alarms, which can be ignored if unrelated to your business.

Bantuan dan Dukungan

Apakah halaman ini membantu?

masukan