Back to Guides
EnterpriseIndustryNEW

What is the CA/Browser Forum?

The consortium that decides how certificates work on the internet. Understanding who makes the rules and why.

15 min readJanuary 2026Global Standard
CA/Browser Forum - Certificate Authorities and Web Browsers collaborating on certificate rules

The 30-Second Explanation

The CA/Browser Forum is a voluntary consortium where Certificate Authorities (the companies that issue certificates) and browser vendors (Chrome, Firefox, Safari, Edge) collaborate to create the rules governing publicly-trusted certificates.

Key point: When browsers announce certificate validity changes — like the phased reduction to 47 days by 2029 — those decisions come from the CA/Browser Forum.

The CA/Browser Forum is not a government agency — it's a voluntary industry collaboration with no legal enforcement power. It's also not a standards body like the IETF, though it frequently references IETF standards like TLS and X.509. Think of it as a rule-making body that creates Baseline Requirements all publicly-trusted CAs must follow to remain in browser root programs.

Not a government agency

Voluntary industry collaboration

Not a standards body

Though they reference IETF standards

More like a rule-making body

Creates Baseline Requirements CAs must follow

Who's at the Table

Certificate Authorities (Issuers)

Companies that issue publicly-trusted certificates:

  • DigiCert, Sectigo, Let's Encrypt, GlobalSign
  • Entrust, GoDaddy, SSL.com, and others

Must comply with forum rules to remain trusted. Have voting rights on ballots.

Browser Vendors (Consumers)

Applications that trust (or distrust) certificates:

  • Google Chrome — Often drives aggressive timelines
  • Mozilla Firefox — Strong security advocacy
  • Apple Safari — Operates own root program
  • Microsoft Edge — Follows Microsoft Root Program

The Power Dynamic

Browsers don't need forum permission to distrust a CA. The forum is where CAs negotiate reasonable timelines before browsers act unilaterally. This collaboration benefits everyone — CAs get predictable requirements, browsers get industry buy-in.

What They Produce

Baseline Requirements for TLS (BR)

The core rulebook for issuing SSL/TLS certificates

v2.2.1
Dec 2025

Extended Validation Guidelines (EVG)

Additional requirements for EV certificates

v2.0.1
May 2024

Code Signing Baseline Requirements

Rules for code signing certificates

v3.10
Nov 2025

S/MIME Baseline Requirements

Rules for email signing/encryption certificates

v1.0.12
Oct 2025

Network Security Requirements

Security controls CAs must implement

v2.0.5
Jul 2025

All documents are publicly available at cabforum.org

How Changes Happen (The Ballot Process)

1

PROPOSAL

Anyone can propose a change, posted to public mailing list

2

DISCUSSION

7-day minimum discussion period with public comments and revisions

3

VOTING

7-day voting period — CAs and browsers vote separately

4

RESULTS

Requires majority of both groups; some ballots need 2/3 supermajority

5

EFFECTIVE

Usually 6-18 months after passage to give CAs time to implement

Ballot Naming Convention

SC-XXX

Server Certificate Working Group (TLS certs)

CS-XXX

Code Signing Working Group

SM-XXX

S/MIME Working Group

Example: SC-081 introduced the phased reduction to 47-day certificate validity (passed April 2025).

2025 Changes

Loading...

What this means for enterprise teams: These changes are already in effect. If you haven't updated your processes for MPIC, pre-issuance linting, or faster OCSP responses, you may already be relying on CAs that have adapted.

Major Upcoming Changes

Loading deadlines...

What this means for enterprise teams: Shorter public TLS certificate validity means more frequent renewals. If you're managing certificates on load balancers, appliances, vendor-managed devices, or legacy systems that don't support automation, now is the time to plan your migration to ACME or equivalent API-based automation.

Why This Matters to You

If you're a certificate subscriber

  • Shorter validity = more frequent renewals
  • New validation requirements = process changes
  • Deprecated methods = update your automation

If you manage certificates

  • Watch for ballots affecting your certificate types
  • Plan automation before validity reductions hit
  • Understand that your CA has no choice — they must comply

If you're evaluating CAs

  • All publicly-trusted CAs follow the same baseline rules
  • Differentiation is in service, automation, and support
  • A CA can't offer you a 3-year public TLS cert anymore

How to Stay Informed

Official Sources

Easier Options

  • FixMyCert Compliance Hub

    We track deadlines so you don't have to

  • Root Causes Podcast

    Tim Callan and Jason Soroko discuss industry news

  • Your CA's communications

    They'll warn you about changes affecting you

Common Misconceptions

"The CA/Browser Forum is a government body"

No — it's a voluntary industry consortium with no legal enforcement power.

"Browsers must follow CA/Browser Forum rules"

No — browsers can (and do) set stricter requirements in their own root programs. For example, Apple enforced a 398-day certificate limit before the CA/B Forum ballot passed, and Chrome has specific CT logging requirements beyond baseline.

"My CA can get me an exception"

No — CAs that violate Baseline Requirements risk distrust by browsers.

"These rules only affect public websites"

More precisely: these rules apply to publicly-trusted CAs, which typically issue certificates for public-facing endpoints. Internal/private CAs aren't bound by these rules, but many follow them as best practice.

"Changes happen overnight"

No — typical effective dates are 6-18 months after ballot passage, specifically to give the ecosystem time to adapt.

Related Resources

Track CA/B Forum Deadlines

Our Compliance Hub tracks all upcoming requirements so you never miss a deadline.

View Compliance Hub