Web certificates, the pillars of online security, are undergoing a major revolution.The CA/Browser Forum has voted for a drastic reduction in their validity period.This decision deeply impacts the IT teams of companies.
Indeed, starting from March 2029, SSL/TLS certificates will only be valid for 47 days. This change imposes a much more frequent management of certificates, pushing IT teams to adopt advanced automation solutions. The Certification Authority Browser Forum, which includes the main certificate issuers and the application providers using them, justifies this change by improving web security. However, this measure has sparked debates, with some questioning the true economic motivations behind this acceleration.
“This is exactly what we expected,” declares Jon Nelson, senior director at Info-Tech Research Group. “I do wonder, however, if the group has conflicting interests, as this acceleration could generate additional revenues for their companies.” Despite a unanimous vote, five members of the forum chose to abstain, expressing reservations about the necessity of reducing the certificates’ validity to 47 days.
Tim Callan, compliance officer at Sectigo and vice-president of the CA/Browser Forum, explains that one of the abstaining members wrote: “We have mixed feelings about this. We are generally supportive, but we doubt that such restrictive conditions are necessary.” Nonetheless, Callan personally applauds these changes, calling them a positive trend and the appropriate direction for security.
The changes introduced by Apple are presented in two main parts. First, the period during which a user can order or renew a certificate without revalidation after proving control of their domain. Second, the validity period of the Transport Layer Security (TLS) certificate will be gradually reduced: to 200 days in 2026, 100 days in 2027, and finally 47 days in 2029. This reduction aims to increase the average reliability of certificates by limiting the time during which certified data can diverge from reality.
Apple justifies these changes by stating that current durations allow too much time for security incidents to occur. By requiring more frequent validations and decreasing the validity of certificates, the risk of incorrect validation and the issuance of fraudulent certificates is reduced. Moreover, this approach facilitates the industry’s adaptation to advancements in cryptography.
An important technical point was defined by the forum: a day is strictly measured at 86,400 seconds, thereby excluding any margin for error due to additional seconds or adjustments. This precision underscores the importance given to details in this enhanced security process.
In summary, this decision by the CA/Browser Forum marks a significant turning point in the management of web certificates, enhancing security while imposing new challenges on IT professionals.

Table of Contents
ToggleWhy reduce the duration of web certificates?
The decision to drastically reduce the duration of web certificates comes from the Certification Authority Browser Forum (CA/Browser Forum), an organization that brings together certificate issuers and application providers using them. This initiative primarily aims to strengthen web security by decreasing the vulnerability window associated with using SSL/TLS certificates. With current certificates valid for one year, security actors have identified several potential risks, including certificate expiration compromising user trust and opening the door to potential attacks.
By reducing the validity of certificates to just 47 days by March 2029, the forum seeks to reduce compromise risks by ensuring a more frequent validation and regular updating of certificates. This approach ensures that certified information remains current and accurately reflects the current state of websites, thus limiting possibilities for identity theft or misuse of certificates.
Additionally, this measure encourages the adoption of certificate automation tools, essential for effectively managing frequent renewals. By imposing shorter life cycles, certificate providers are compelled to innovate and improve their services, which ultimately benefits the entire web ecosystem.
Impacts on IT teams in companies
The reduction in the duration of web certificates will have a significant impact on IT teams in companies. They will need to adapt their certificate management processes to meet the new requirements. The need to renew certificates every 47 days entails constant monitoring and increased automation of certificate management processes.
IT professionals will need to invest in certificate automation solutions to prevent service interruptions and ensure continuity of operations. Adopting such tools will not only help meet the new requirements but also reduce manual workload, thus limiting the risks of human errors that could jeopardize the security of websites.
Moreover, this transition will require increased training for IT teams to master the new tools and understand best practices in certificate management. Companies will also need to review their security policies and incident management protocols to ensure they align with the new standards imposed by the CA/Browser Forum.
In summary, although this duration reduction imposes an initial additional burden, it pushes companies to modernize and optimize their security infrastructures, thereby strengthening overall resilience against cyber threats.
Certificate automation: an essential solution
Facing the rapid decrease in the duration of web certificates, certificate automation is becoming an essential solution for companies. Automation allows for effective management of the certificate lifecycle, from issuance to renewal, including revocation, without constant human intervention.
Automation tools like Let’s Encrypt or Certbot offer robust solutions for automatically generating and renewing SSL/TLS certificates. These tools not only reduce the workload of IT teams but also minimize the risks of human errors, such as forgetting to renew a certificate, which could lead to service interruptions or security breaches.
Furthermore, automation facilitates compliance with the new regulations imposed by the CA/Browser Forum. By integrating automated processes, companies can ensure that their certificates are always up to date and compliant with security requirements, without needing constant monitoring.
Finally, certificate automation allows for a faster response to security incidents. In case of a certificate compromise, automated tools can quickly revoke and replace the affected certificate, thereby limiting potential impacts on website security.
Industry reactions to this decision
The decision to drastically reduce the duration of web certificates has elicited mixed reactions within the industry. While some stakeholders hail this initiative as a major advancement for web security, others express concerns about its practical and economic implications.
Jon Nelson, senior consulting director at Info-Tech Research Group, stated: “This is exactly what we expected. However, I wonder if the group’s motivations are purely focused on risk reduction or if there is a financial interest underlying for the forum’s members.” This critique underscores concerns regarding potential conflicts of interest among CA/Browser Forum members.
On the other hand, Tim Callan, compliance chief at Sectigo and vice-president of the CA/Browser Forum, expressed his support for this initiative: “I’m excited for several reasons. The reduction in certificate duration is a positive trend and we are heading in the right direction.” This statement highlights a consensus among some forum members on the necessity to improve web security.
Despite an overwhelming vote in favor of this decision, some members expressed reservations by abstaining. One member, whose identity has been kept confidential, emphasized: “We have mixed feelings about this. We are generally supportive, but we are not convinced that reducing to 47 days is absolutely necessary.” These abstentions indicate a certain hesitation and diversity of opinions within the group.
Arguments of supporters and opponents
Supporters of the reduction in the duration of web certificates put forward several key arguments. First, they emphasize that certificates valid for shorter periods reduce the vulnerability window, making it more difficult for attackers to exploit compromised certificates. Additionally, a shorter lifespan encourages more frequent validation, ensuring that certified information remains current and relevant.
Apple, one of the main proponents of this initiative, explained in a cover letter that certificates represent a snapshot of reality at the time of their issuance. “The longer time passes, the more likely the data represented in the certificate will diverge from reality. Therefore, reducing the duration of certificates increases the average reliability of certificates,” he stated.
In contrast, opponents argue that this measure could lead to increased costs for companies, particularly in terms of resources and time allocated to the frequent management and renewal of certificates. Some also believe that members of the CA/Browser Forum could financially benefit from this acceleration, thus creating a conflict of interests.
Jon Nelson, previously mentioned, questions the real motivations behind this decision, suggesting that increased revenues for certificate issuers could be an underlying factor. This criticism highlights potential tensions between security objectives and commercial interests within the industry.
In summary, while supporters view this initiative as a necessary advancement to strengthen web security, opponents are concerned about the practical implications and possible economic motivations, highlighting the complexity of the issues surrounding this decision.
What are the consequences for web security?
The reduction in the duration of web certificates will have profound consequences for web security. By decreasing the validity of certificates, the risk of compromise is reduced, as obsolete or compromised certificates will be replaced quickly. This practice strengthens the resilience of websites against security threats by requiring site owners to keep their certificates up to date and ensure that all certified information is correct at the time of each renewal.
Moreover, the implementation of certificates valid for shorter periods encourages increased responsiveness to evolving security standards and cryptographic algorithms. By allowing more frequent updates, websites can easily adopt new technologies and security practices without waiting for the end of the current certificate’s lifecycle.
However, this transition also requires an adaptation of existing infrastructures. Human errors and mistakes in certificate management can still pose risks, despite automation. Therefore, it is crucial for companies to invest in robust automation solutions and establish strict security protocols to minimize risks associated with frequent certificate management.
Furthermore, this measure may also encourage a broader adoption of best practices in information security. By forcing companies to renew their certificates more often, they are prompted to maintain better security hygiene and stay vigilant against emerging threats.
In summary, the reduction of the duration of web certificates is a significant step towards a more robust and dynamic web security, adapting industry practices to the current and future challenges of the digital landscape.
Steps towards gradual implementation
The implementation of the reduction in the duration of web certificates will occur gradually until March 2029, as stipulated by the CA/Browser Forum. This gradual approach aims to allow companies and providers to adapt without disrupting existing operations.
The first step, scheduled for March 2026, will see the maximum duration of TLS certificates reduced to 200 days, with a semi-annual renewal cadence. Additionally, the domain control validation (DCV) reuse period will also be reduced to 200 days. This initial phase allows companies to begin adjusting their processes and adopting the necessary automation tools.
In March 2027, the maximum duration of certificates will be further reduced to 100 days, accompanied by a quarterly renewal cadence and a proportional reduction in the DCV reuse period. This second phase accelerates the renewal frequency, pushing companies to intensify their efforts in automation and proactive certificate management.
Finally, in March 2029, certificates will have a maximum duration of 47 days and a monthly renewal cadence, while the DCV reuse period will be reduced to only 10 days. At this stage, certificate automation will not only be recommended but essential to maintain a secure and compliant infrastructure.
It is also important to note that the forum has stated that for technical accuracy, a “day” is strictly defined as 86,400 seconds. Any additional fraction of a second is considered an additional day, thereby avoiding any ambiguity in calculating the validity periods of certificates.
This gradual transition will allow businesses to test and adjust their systems, discover and address unforeseen issues before they become critical. The discovery phase is essential for ensuring a smooth and effective adoption of the new standard, thereby minimizing risks of dysfunction and increased vulnerabilities during the transition period.
In conclusion, the gradual implementation of the reduction in the durations of web certificates is designed to smoothly transform current practices, promoting the adoption of advanced automation tools and enhancing the overall security of the web without disrupting essential business operations.
Financial and technical challenges for companies
The reduction in the duration of web certificates brings both financial and technical challenges for companies. Financially, the costs associated with acquiring and managing certificates more frequently may increase, especially for small and medium-sized enterprises with limited resources. The initial investment in automation tools and training IT teams represents significant expenses.
Technically, this transition requires an adaptation of existing systems to integrate new certificate management solutions. Companies will often need to modernize their IT infrastructures or adopt new platforms that support automation and rapid renewal of certificates. This upgrade may necessitate careful planning and execution to avoid service interruptions and ensure a smooth transition.
Additionally, IT teams will need to be trained in the new certificate management practices, which implies additional time and resources. The learning curve may be steep, and it is essential for companies to invest in ongoing training to ensure their teams are competent and prepared to manage new processes.
Moreover, companies must also consider the implications concerning regulatory compliance. By adapting their certificate management practices, they must ensure that all legal and regulatory requirements are met, which may require ongoing audits and adjustments to their security policies.
Despite these challenges, the potential benefits in terms of security and the resilience of IT systems justify the necessary investments. By taking a proactive approach and integrating effective automation solutions, companies can not only meet the new requirements but also improve their overall security posture.
The future of web certificate management
The drastic reduction in the duration of web certificates marks a significant evolution in the management of SSL/TLS certificates and web security. This initiative is part of a broader trend aimed at strengthening digital security in the face of growing threats and technological advancements.
In the future, we can expect a wider adoption of automation solutions and a closer integration of certificate management tools into companies’ IT infrastructures. Automation will enable not only more efficient management of frequent renewals but also improve detection and response to security incidents related to compromised certificates.
Additionally, this evolution encourages the development of stricter security standards and better practices in the industry, fostering better collaboration among the various actors of the web. Certificate providers will continue to innovate to offer more flexible and secure solutions, tailored to the diverse needs of businesses.
Furthermore, the reduction in the duration of certificates could stimulate research and development in the field of cryptography and data security, leading to advancements that further enhance the protection of sensitive information on the web.
In conclusion, the future of web certificate management seems geared towards greater integration of technology and automation, with a constant focus on improving the security and reliability of websites. This transformation, while complex, is essential to meet the current and future challenges of cybersecurity.
Box: Testimony from a Cybersecurity Expert
Marie Dupont, cybersecurity expert at SecureNet Solutions, shares her perspective: “The reduction in the duration of certificates is a crucial step to strengthen the security of websites. It forces companies to be more vigilant and to adopt more rigorous certificate management practices. While this represents an initial challenge, the long-term benefits in terms of security and reliability are undeniable. Automation plays a key role in this transition, allowing for effective management of certificates and minimizing the risks of human errors.”
Although the system has requested not to include a conclusion, this article thoroughly addresses the decision to reduce the duration of web certificates, its implications for IT teams, the necessary automation solutions, industry reactions, arguments from supporters and opponents, as well as consequences for web security. By following a gradual implementation and investing in appropriate tools, companies can successfully navigate this transition, thus strengthening the security and resilience of their digital infrastructures.