| Important: This is a dynamic article. We will update it as more information becomes available. Save this page and check back periodically for the latest information. |
Starting June 1, 2026, and finishing no later than June 14, 2026, DigiCert will update MPIC to require corroboration from at least four remote network locations across at least two different Regional Internet Registry regions to comply with the next phase of the CA/Browser Forum MPIC requirements.
Background
What is corroboration?
Corroboration means that multiple network perspectives must return the same DNS record details or website file contents for a given domain before the domain can be considered validated and before the certificate can be issued. MPIC requirements apply to both Domain Control Validation (DCV) and Certificate Authority Authorization (CAA) checks.
Benefits of using corroboration
This redundancy provides stronger protection against security threats, helping catch and block unauthorized attempts to intercept or alter data as it travels across networks. For you, this means enhanced security and increased confidence that only authorized parties obtain certificates for your domains.
To begin, DigiCert performs its standard validation check from our primary network. This check is then repeated from additional remote locations, each on different networks and in different geographical regions. The table below outlines the number of corroborations required for domain control to be verified, for CAA checks to pass, and for a certificate to be issued.
MPIC applies to all common domain control validation (DCV) methods, including:
The corroboration requirements apply to each DCV method listed above. If an insufficient number of network locations corroborate the primary network’s details, the domain validation will fail, and the certificate cannot be issued. This redundancy ensures that only those with legitimate domain control can obtain certificates for said domains. Learn more about these domain control validation (DCV) methods.
MPIC also applies to the CAA record check DigiCert performs to make sure we have permission to issue the certificate for a domain. Remember, before DigiCert can issue a TLS/SSL certificate or a Secure Email (S/MIME) certificate, we must check, process, and abide by the domain or email domain’s DNS CAA resource records. Learn more about the DNS CAA resource record check.
You should have little to do before we implement each phase of MPIC. However, for the HTTP Practical Demonstration DCV method, you may need to do some work beforehand. For other DCV methods and the CAA check, the tasks fall more into the troubleshooting category.
Start by auditing your current validation setup. Verify what DCV methods you are using. Are you using the HTTP Practical demonstration, DNS TXT record, or Email to CAA contact?
If using the HTTP practical demonstration DCV methods and an allowlist to control inbound traffic, then action is required. Updating your allowlist ensures DigiCert can access the .txt file containing the random value at a predetermined location on your website.
Add the user agent or IP addresses to your allowlist:
| MPIC agents' IP addresses |
|
| These are the IP addresses being used right now. However, we will continue to add more. If possible, we strongly recommend allowlisting the user agent instead. | |
There is a chance you could experience a disruption to your certificate issuance process if using:
You should check that changes propagate reliably across all authoritative nameservers and that your TTL settings allow for timely updates.
Conducting these checks can help ensure that DigiCert can locate the random value or email contact within your DNS record and confirm access to the CAA resource record, thereby authorizing us to issue TLS and S/MIME certificates for your domains.
Troubleshooting MPIC validation issues
If you do experience issues, DigiCert recommends checking your domain's DNS configuration to ensure it is accessible from multiple regions. To check the configuration, you may need to contact your DNS provider.