SSL Certificate Validity Reduced to 199 Days: What You Need to Know

SSL Certificate Validity Reduced to 199 Days: What You Need to Know

Security, SSL
Starting February 24, 2026, all Certification Authorities (CAs) will begin issuing TLS/SSL certificates with a maximum validity of 199 days, down from the current 397 days. This is not a vendor-specific decision, but an industry-wide requirement mandated by the updated Baseline Requirements of the CA/Browser Forum. The primary objective is to strengthen overall internet security by reducing the exposure window of compromised certificates and enabling faster adoption of new cryptographic standards as threats evolve. Why Certificate Lifetimes Are Getting Shorter Shorter certificate validity periods bring several security and operational advantages: Reduced risk in case of private key compromise Faster response to vulnerabilities and cryptographic deprecations Improved alignment with modern automation-driven certificate management This change follows the same security-first approach that previously led to the reduction from multi-year certificates to one-year…
Read More
Sectigo Notice: Legacy Chain Re-Issuance Will End After December 31, 2025

Sectigo Notice: Legacy Chain Re-Issuance Will End After December 31, 2025

Security, SSL
Sectigo has announced an important change affecting the re-issuance of SSL/TLS certificates. Beginning January 1, 2026, Sectigo will no longer support the re-issuance of certificates using legacy (older) trust chains. All reissued certificates will instead be issued only under current, modern chains. Who Is Affected? This change primarily affects Microsoft server environments where some end-users are still using outdated operating systems or devices. In rare cases, these legacy systems do not trust Sectigo’s newer root certificates, which can cause trust warnings or connection failures. Previously, administrators could work around this issue by re-issuing the certificate with an older, cross-signed chain. However, Microsoft systems may not always honour this workaround — particularly when a shorter, but untrusted, chain path exists. In these environments, the client may ignore the cross-signed chain and…
Read More