Starting February 24, 2026, DigiCert will update MPIC to enforce corroboration using at least three remote network locations from at least two different Regional Internet Registry regions to comply with the next phase of CA/Browser Forum MPIC requirements.
Background
In March 2025, DigiCert started checking domain control and CAA record details from multiple network locations per CA Browser Forum requirements, in advance of future phases of Multi-Perspective Issuance Corroboration (MPIC). In September 2025, DigiCert enhanced its certificate validation and issuance process by implementing the next phase of MPIC and enforcing corroboration using at least two remote network locations.
| Important: On February 24, 2026, DigiCert will add another User Agent and two new IP addresses to the MPIC agents' IP addresses. See the Add User Agents DigiCert DCV /1.1 and DigiCert DCV Bot/1.1 or the IP addresses to your allowlist section below. |
What is corroboration?
Corroboration means that multiple network perspectives must return the same DNS record details or website file contents for a given domain before the domain can be considered validated and before the certificate can be issued. MPIC requirements apply to both Domain Control Validation (DCV) and Certificate Authority Authorization (CAA) checks.
Benefits of using corroboration
This redundancy provides stronger protection against security threats, helping catch and block unauthorized attempts to intercept or alter data as it travels across networks. For you, this means enhanced security and increased confidence that only authorized parties obtain certificates for your domains.
To begin, DigiCert performs its standard validation check from our primary network. This check is then repeated from additional remote locations, each on different networks and in different geographical regions. The table below outlines the number of corroborations required for domain control to be verified, for CAA checks to pass, and for a certificate to be issued.
MPIC applies to all common domain control validation (DCV) methods, including:
The corroboration requirements apply to each DCV method listed above. If an insufficient number of network locations corroborate the primary network’s details, the domain validation will fail, and the certificate cannot be issued. This redundancy ensures that only those with legitimate domain control can obtain certificates for said domains. Learn more about these domain control validation (DCV) methods.
MPIC also applies to the CAA record check DigiCert performs to make sure we have permission to issue the certificate for a domain. Remember, before DigiCert can issue a TLS/SSL certificate or a Secure Email (S/MIME) certificate, we must check, process, and abide by the domain or email domain’s DNS CAA resource records. Learn more about the DNS CAA resource record check.
You should have little to do before we implement this next phase of MPIC. However, depending on the DCV method you are using, there may be things you need to do while other things fall more in the troubleshooting category.
Start by auditing your current validation setup. Verify what DCV methods you are using. Are you using the HTTP Practical demonstration, DNS TXT record, or Email to CAA contact?
If using the HTTP practical demonstration DCV methods and an allowlist to control inbound traffic, then action is required. Updating your allowlist ensures DigiCert can access the .txt file containing the random value at a predetermined location on your website.
Before September 1, 2025, add the user agent or IP addresses to your allowlist:
| MPIC agents' IP addresses |
|
These are the IP addresses being used right now. However, we will continue to add more. If possible, we strongly recommend allowlisting the user agent instead. 3Note: on February 24, 2026, DigiCert will add two new IP addresses marked with a superscript 3 (3). |
|
There is a chance you could experience a disruption to your certificate issuance process if using:
You should check that changes propagate reliably across all authoritative nameservers and that your TTL settings allow for timely updates.
Conducting these checks can help ensure that DigiCert can locate the random value or email contact within your DNS record and confirm access to the CAA resource record, thereby authorizing us to issue TLS and S/MIME certificates for your domains.
Troubleshooting MPIC validation issues
If you do experience issues, DigiCert recommends checking your domain's DNS configuration to ensure it is accessible from multiple regions. To check the configuration, you may need to contact your DNS provider.