Hello Michael, I am Henry and I want to share some thoughts about your concern.
To directly answer your question, I will answer No, Microsoft does not offer a direct notification service for the routine rollover of public-facing TLS/SSL certificates for its services like login.microsoftonline.com.
The issue you encountered is a direct result of certificate pinning, where your application is configured to trust a specific leaf certificate's thumbprint or serial number. The industry-standard and recommended best practice is to trust the root Certificate Authority (CA) and validate the certificate chain, not to pin the specific end-entity certificate.
Microsoft services use certificates from a set of approved CAs. As long as your application's keystore trusts the root CA (in this case, from DigiCert), it should automatically trust any new leaf certificates issued by that authority. This approach avoids service disruption during routine certificate renewals.
Instead of subscribing to notifications, the solution is to modify your application's validation logic:
- Remove the pinned leaf certificate from your application's trust store or configuration.
- Ensure your application trusts the root CAs that Microsoft services use.
- Verify that your application correctly performs certificate chain validation up to a trusted root anchor.
Microsoft provides official guidance on this topic and lists the Certificate Authorities that its services use. You should ensure your application trusts the root CAs listed in the following documentation.
- Microsoft 365 Encryption chains: This page details the certificate chains used by Microsoft 365 and advises against pinning.
- Azure Certificate Authority details: This document provides comprehensive information on the root and intermediate CAs used across Azure and Microsoft 365 services.
Hope this clears things up! If you find this guidance helpful, you're welcome to click 'Accept Answer'—it helps others find useful solutions too.