Upcoming PKI and Browser Root Store Changes

Author(s): Carlos Rivera, Jon Nelson, Cameron Smith

These developments reflect industry-wide shifts driven by browser vendors, the CA/Browser Forum, and the X9 PKI Forum, and have direct implications for both public and private PKI deployments:

  • Mandatory separation of ServerAuth and ClientAuth certificates, with Chrome enforcing exclusive ServerAuth usage for publicly trusted TLS roots beginning June 15, 2026.
  • Accelerated reduction in maximum TLS certificate lifetimes, moving from 398 days today to 47 days by March 15, 2029, fundamentally changing certificate renewal and automation requirements.
  • Increased reliance on private PKI for ClientAuth use cases, including mTLS, device authentication, and internal services, as these certificates are no longer compatible with public browser trust models.
  • Growing importance of X9-aligned PKI architectures, which are designed to support financial grade trust separation, interoperability, and governance outside traditional web PKI constraints.