Back to Guides
CertificatesActive Deadline

The End of Client Authentication in Public TLS Certificates

Chrome, DigiCert, and Sectigo are sunsetting the ClientAuth EKU. If you use public certificates for mTLS, your setup will break by June 2026.

~15 min readJanuary 2026
Client Authentication EKU Sunset - Public TLS certificates losing dual-purpose capability

The TL;DR

Starting June 2026, Google Chrome will no longer trust public TLS certificates that contain the Client Authentication Extended Key Usage (EKU). If you're using public certificates for mutual TLS (mTLS), server-to-server authentication, or any client authentication scenario—your setup will break.

This isn't a recommendation. It's a hard enforcement date.

TIME REMAINING
0
days
0
hrs
0
min
0
sec

What's Changing?

The Old Way (Before 2026)

Public TLS certificates have traditionally included two Extended Key Usages:

EKUOIDPurpose
Server Authentication1.3.6.1.5.5.7.3.1Authenticate TLS servers (HTTPS)
Client Authentication1.3.6.1.5.5.7.3.2Authenticate clients to servers

This dual-purpose design let organizations use a single certificate for both securing websites AND authenticating servers to each other (mTLS).

The New Way (After 2026)

Public TLS certificates will only contain Server Authentication. Period.

Before: ServerAuth ✓ + ClientAuth ✓
After: ServerAuth ✓ only

Why?

Browser vendors believe mixing EKUs in public certificates creates security risks:

  • Public CAs can't validate client authentication use cases
  • Dual-purpose certificates can be misused
  • Cleaner separation between public (browser) and private (enterprise) PKI

The Timeline

This is happening in phases. The deadlines are real.

June 15, 2025Chrome stops trusting mixed-EKU intermediate CAs

CAs must restructure hierarchies

October 1, 2025DigiCert removes ClientAuth by default

Must opt-in during enrollment

October 7, 2025Sectigo removes ClientAuth by default

Must opt-in during enrollment

May 1, 2026DigiCert complete removal

No exceptions, even if you ask

May 15, 2026Sectigo complete removal

No exceptions

June 15, 2026Chrome hard enforcement

All public certs with ClientAuth EKU rejected

Note: Existing certificates issued before these dates remain valid until expiration. But you cannot renew, rekey, or reissue them with ClientAuth after the deadlines.

Who's Affected?

NOT Affected (No Action Needed)

  • Standard HTTPS websites - You only need Server Authentication
  • Let's Encrypt users - Already ServerAuth only
  • Private/Internal PKI - Browser root programs don't apply
  • Existing certificates - Valid until natural expiration

AFFECTED (Action Required)

  • Mutual TLS (mTLS) using public certificates
  • Server-to-server authentication with public certs
  • API gateways authenticating with public TLS certs
  • Financial services B2B authentication

Real-world examples that will break:

✗ Load balancer using public cert to authenticate to backend servers
✗ Microservices using public certs for service mesh mTLS
✗ API gateway presenting public cert as client to upstream services
✗ Partner integrations using public certs for mutual authentication

Your Options

Option 1: Private PKI (Most Common Solution)

Run your own Certificate Authority for internal/mTLS use cases.

Pros:

  • • Full control over EKUs, validity, policies
  • • No browser root program restrictions
  • • Can issue any EKU combination

Cons:

  • • Requires PKI expertise
  • • Trust distribution challenges
  • • Operational overhead

Good for: Internal mTLS, service meshes, machine-to-machine within your org

Option 2: PKI-as-a-Service

Use a managed private CA service (DigiCert, Sectigo, AWS Private CA, etc.)

Pros:

  • • Expertise handled by vendor
  • • Easier operations than DIY
  • • Can include ClientAuth EKU

Cons:

  • • Ongoing cost
  • • Less control than self-hosted
  • • Still need to distribute trust

Good for: Organizations without PKI expertise who need private certificates

Option 3: X9 PKI (Financial Services Focus)

A new dedicated PKI framework created by ASC X9 (financial standards body) and operated by DigiCert.

What is X9 PKI?

X9 PKI is a separate trust hierarchy independent of browser root programs. It's designed specifically for non-browser TLS authentication—exactly what's being deprecated in public CAs.

  • • Governed by ASC X9, not CA/Browser Forum
  • • Supports both ServerAuth AND ClientAuth EKUs
  • • Common root of trust for cross-organizational authentication
  • No wildcard certificates - FQDNs and IPs only
  • • Available in RSA and ECC

Pros:

  • • Purpose-built for mTLS and B2B
  • • Common root of trust
  • • Meets financial compliance

Cons:

  • • New infrastructure (launched June 2025)
  • • Requires X9 root in trust stores
  • • Won't work in browsers (by design)

Good for: Financial institutions, payment networks, B2B integrations requiring shared trust

Option 4: Separate Certificate Types

Use public TLS certificates for server authentication only, and separate client certificates from a private CA.

Server-side: Public TLS cert (ServerAuth only) ✓
Client-side: Private CA cert (ClientAuth) ✓

Pros:

  • • Clean separation of concerns
  • • Purpose-built for each role
  • • Public server certs work in browsers

Cons:

  • • More certificates to manage
  • • Need private CA infrastructure
  • • More complex configuration

Migration Checklist

Phase 1: Discovery (Do This Now)

  • Inventory all certificates with ClientAuth EKU from public CAs
  • Identify use cases - Where is ClientAuth actually being used?
  • Document dependencies - What breaks if ClientAuth is removed?
  • Check your CA's timeline - DigiCert, Sectigo, others may differ

How to check if a certificate has ClientAuth:

bash
# Check a certificate file
openssl x509 -in cert.pem -text -noout | grep -A5 "Extended Key Usage"

# Check a live server
openssl s_client -connect example.com:443 </dev/null 2>/dev/null | \
  openssl x509 -text -noout | grep -A5 "Extended Key Usage"

Look for TLS Web Client Authentication or OID 1.3.6.1.5.5.7.3.2

Phase 2: Planning (Now through Q1 2026)

  • Decide on solution - Private PKI, PKIaaS, X9 PKI, or separate certs
  • Budget and procurement - Private CA software/hardware or service contracts
  • Architecture design - How will new certs be issued and trusted?
  • Test environment - Validate solution before production

Phase 3: Implementation (Q1-Q2 2026)

  • Deploy new PKI infrastructure or configure service
  • Issue replacement certificates with appropriate EKUs
  • Update trust stores on all systems that need to trust new certs
  • Test thoroughly - Especially mTLS and authentication flows

Phase 4: Cutover (Before June 2026)

  • Replace public certs in mTLS configurations
  • Verify no ClientAuth dependency on public cert renewals
  • Monitor for failures - Some edge cases always slip through
  • Document new architecture for operations team

F5 BIG-IP Specific Considerations

If you have F5 BIG-IP configured for mTLS (Client SSL profiles requiring client certificates), pay attention:

F5 will not accept client certificates that have the EKU extension but are missing the ClientAuth purpose.

This means:

  • New public TLS certificates (ServerAuth only) cannot be used as client certificates on F5
  • You must migrate to certificates from a private CA or X9 PKI for client authentication
  • Test your Client SSL profiles after any certificate changes
Related guide: F5 Client SSL vs Server SSL Profiles

Frequently Asked Questions

Will my existing certificates stop working immediately?

No. Certificates issued before the enforcement dates remain valid until they naturally expire. The changes only affect new certificates issued after the deadlines, renewals, and reissues.

What if I need both ServerAuth and ClientAuth after June 2026?

You have three options: Private PKI (issue your own certificates with both EKUs), PKI-as-a-Service (use a managed private CA), or X9 PKI (use the new financial services PKI framework). You cannot get both EKUs from a public CA after June 2026.

Does this affect S/MIME or code signing certificates?

This specific change is about TLS certificates only. However, the broader trend of separating certificate purposes applies across the industry. Check your specific CA's policies for other certificate types.

What about Mozilla, Apple, and Microsoft?

Currently, this is primarily a Chrome Root Program requirement. However, Mozilla has signaled alignment is likely, Apple has been pushing single-purpose hierarchies since 2024, and Microsoft typically follows industry trends. Plan for Chrome's deadline, but expect others to follow.

Is this related to the 47-day certificate validity change?

No, these are separate initiatives. The 47-day validity (March 2029) is about certificate lifecycle. The ClientAuth EKU removal is about certificate purpose. Both require planning, but they're independent changes.

My vendor says their certificates have ClientAuth—is that still safe?

Check when the certificate was issued and when it expires. Also check which CA issued it. Some smaller CAs may not have announced their timelines yet. When in doubt, contact your CA directly.

Related Resources

The Bottom Line

This isn't optional and it isn't going away. The dual-purpose public TLS certificate is being retired.

If you only use certificates for HTTPS websites: Relax. Nothing changes for you.

If you use public certs for mTLS or client auth: Start planning now. You have 0 days remaining.