Industry Leaders Approve the Move to a 47-Day SSL Certificate Validity Period

Industry Leaders Approve the Move to a 47-Day SSL Certificate Validity Period

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

By 2029, SSL/TLS certificates will be valid for a maximum of 1.5 months. Here’s what to know about the certificate validity period reduction that will begin rolling out in March 2026.

If you’ve been around the industry over the past decade, then you’ve seen the writing on the wall: SSL/TLS certificates have been getting shorter. The industry will take the next step in shortening SSL/TLS certificate validity periods starting March 15, 2026.  

As of this past Friday (April 11, 2025), the CA/Browser Forum (CABF) officially voted in favor of Ballot SC-081v3, a Sectigo-sponsored measure that will reduce the current 398-day maximum certificate validity period to no more than 47 days by March 15, 2029.

Learn why these changes are happening, when they’ll be implemented, and how you can start preparing for this transition to a shorter certificate validity period.

TL;DR: A 30-Second Overview of the Changes to the Certificate Validity Period

Got your cup of coffee ready? Good. It’s time to dive in:

  • Apple’s proposed ballot was officially approved by CABF leaders on April 11, 2025.
  • The current 398-day certificate validity period for SSL/TLS certificates will be reduced in three phases, starting March 15, 2026.
  • The reuse period of certificates’ subject identity validation data (i.e., your organization’s business information) will also be reduced to a maximum of 398 days starting in March 2026.
  • The current 398-day domain validation data reuse period for SSL/TLS certificates will decline to 10 days by 2028.
  • These changes apply only to publicly trusted SSL/TLS certificates; they don’t apply to other digital certificates (e.g., code signing and document signing certificates).

When These Changes Will Roll Out

Okay, now that you know what changes will occur, it’s time to break down when they’ll happen and why.

SSL/TLS Certificate Validity Periods Drop to 47 Days By 2029

  • March 15, 2026: The validity period for certificates issued on/after this date will be a maximum of 200 days.
  • March 15, 2027: The maximum validity for certificates issued on/after this date will be reduced to 100 days.
  • March 15, 2029: Certificates issued on or after this date will have a maximum validity of no more than 47 days (or, what basically equates to 1.5 months).

Subject Data Validation Data Reuse Drops to 13 Months Starting in 2026

The current 825-day validity data reuse period will be reduced to 398 days for all organization validation (OV) and extended validation (EV) SSL/TLS certificates issued on or after March 15, 2026.

Domain Validation Data Reuse Periods Drop to 10 Days By 2029

  • March 15, 2026: The maximum reuse period for domain validation data will drop to 200 days.
  • March 15, 2027: The SAN-related validation data reuse period will be reduced to 100 days.
  • March 15, 2029: On or after this date, domain validation data will only be reusable for up to 10 days.

Overview: Reasons for the Changes & Their Impacts on Your Company

It’s time to break down what this shift to shorter validity periods (both for certificates and their validation data) means for your team and organization as a whole.

What Aims to Be AccomplishedImpacts on Your Organization and Team
Shortened certificate validity periods are thought to reduce exposure risks in the event of a key compromisePoses an operational burden on your IT team when relying on manual certificate methods
Organizations will naturally shift to using reliable certificate management automation in lieu of manual methodsAutomation solutions are common in enterprise environments but pose challenges and additional costs to smaller organizations
Addresses vulnerabilities and algorithmic changes to ensure certificates and keys are created using secure cryptographic algorithms, libraries, and componentsCertificate automation ensures your organization uses the most secure cryptography without being inundated with tedious certificate management-related tasks
Certificates represent a moment in time, so organization validation data can become outdated or inaccurate. Shorter reuse periods help ensure certificates contain the most current informationYour organization will have to revalidate its business identity data each year (i.e., at least once every 398 days)
Requiring domains to be re-validated frequently helps prevent certificates from being fraudulently issued and reduces domain impersonation risksUltimately, you must re-validate your domain information no less than every 10 days (after the final phase has been implemented)

If you want to learn more about the reasons why these changes are happening and the discussion that’s taken place within the CA/B Forum, be sure to check out the discussion on the CA/B Forum’s Server Cert Working Group Google Groups page.

Graphic for the article on changes to the SSL/TLS certificate validity period: Courtesy of Sectigo.com. This chart illustrates the decreasing certificate lifetimes between 2012 and 2029.
Image caption: A chart showing the reduction in SSL/TLS certificate validity periods over time. Image courtesy of Sectigo.com.

A screenshot of the Sectigo Certificate Manager dashboard

Facts: Certificate Validity Periods Have Been Declining for Years

Let’s be honest: This move to shorter SSL/TLS certificate validity shouldn’t come as a surprise to anyone. The maximum validity periods have been on a downward trend for more than a decade:

How Your Organization Can Start to Prepare Now

The good news is that these changes won’t begin rolling out until next year. However, we all know that migrating systems and changing operational processes take time. If you don’t like to wait until the last minute, then now’s the time to begin making preparations. 

Implement Certificate Automation with Sectigo Certificate Manager

Sectigo offers multiple certificate automation tools to fit a wide variety of server and hosting environments, including ACME-based automation and Sectigo Certificate Manager.

A closeup of the Sectigo Certificate Manager dashboard
Image: A screenshot showcasing the Sectigo Certificate Manager’s dashboard, which displays a wealth of data about the digital certificates that exist within an organization’s PKI ecosystem.

SCM is more than an automation tool. This cloud-based certificate management platform provides complete visibility and control of all the PKI assets (regardless of which CAs you use) across your entire network in a single pane of glass.

About the author

Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine.