Over the next few years, the digital security industry is changing how publicly trusted root and intermediate certificates are managed and used. Operating system and browser root programs (Google Chrome, Apple, Mozilla, and Microsoft) will require certificate authorities (CAs), such as DigiCert, to move away from multi‑purpose root hierarchies to dedicated, single-purpose hierarchies to enhance security and digital trust.
To enhance digital trust, DigiCert will align our root strategy with the evolving industry standards for issuing public TLS/SSL.
These industry shifts specifically target the public WebPKI and do not affect the following:
Deadline: April 15, 2026
On April 15, 2026, Mozilla and Google Chrome will remove DigiCert's G1 root certificates from their trust stores.
Background
To minimize the impact of the G1 root removal, DigiCert transitioned our default public TLS certificate issuance to our second-generation (G2) hierarches on March 8, 2023. See DigiCert root and intermediate CA certificate updates 2023.
However, some customers have devices that require updates before they can transition to the G2 root hierarchies. DigiCert may allow customers to continue issuing TLS certificates from our G1 root hierarchies on an exception basis. However, these certificates will not be trusted in Google Chrome or Mozilla Firefox starting April 15, 2026.
Most DigiCert customers have moved to our G2 root hierarchies, and no action is required. You are only affected if you meet these criteria:
Required actions
| If your TLS certificates expire, | Action required |
| After April 15, 2026 | Reissue or renew your TLS certificates using the DigiCert G2 or G3 root hierarchy before the deadline to avoid "Untrusted" browser warnings. |
| Before April 15, 2026 | No immediate action. Your next renewal will automatically move you to a supported G2 or G3 hierarchy. You can no longer renew certificates using a G1 root hierarchy. |
Deadline: May 15, 2026
DigiCert will revoke several G2 and G3 intermediate CA (ICA) certificates and two G5 cross-signed root certificates on May 15, 2026.
Why is this happening?
The Google Chrome Root Program requires Certificate Authorities (CAs) to use dedicated TLS root hierarchies for issuing public TLS certificates. To transition our G2 and G3 TLS root hierarchies to single-purpose root hierarchies dedicated to issuing public RSA and ECC TLS certificates, DigiCert must revoke several G2 and G3 ICA certificates used to issue non-TLS certificates, such as S/MIME and Code Signing. Learn more about the transition from multipurpose G2 and G3 roots to dedicated TLS root hierarchies.
Additional revocations
DigiCert must also revoke a TLS ICA certificate and two cross-signed root certificates that do not contain any EKUs.[JK1] [CW2] [JK3] Google Chrome policy that requires CAs to include only the Server Authentication (serverAuth) and optionally, Client Authentication (clientAuth) EKUs in their ICA and cross-signed root certificates.
See which ICA and cross-signed root certificates are being revoked:
Required actions
Deadline: March 1, 2027
On March 1, 2027, DigiCert will remove the Client Authentication EKU from certificates chaining to the DigiCert Global G2 root, the DigiCert Global G3 root, the DigiCert TLS RSA4096 Root G5, and the DigiCert TLS P384 Root G5.
This change affects all DigiCert's public TLS certificates: DV, OV, EV, EU Qualified Website Authentication Certificate (QWAC), and EU QWAC PSD2, and all DigiCert brands: DigiCert®, GeoTrust®, Thawte®, RapidSSL®, and Encryption Everywhere®.
Why is this happening?
The Google Chrome Root Program requires CAs to stop including the Client Authentication extended key usage (EKU) in public TLS certificates.
DigiCert has excellent options available for our customers and partners who require the client authentication EKU beyond March 1, 2027.
| If you require the clientAuth EKU in your TLS certificates | Description |
| X9 PKI for TLS certificate | Transition to DigiCert’s X9 PKI for TLS certificates to secure communications involving multiple organizations. X9 PKI for TLS certificates can have both Client Authentication and Server authentication EKUs. Learn more about X9 PKI for TLS. |
| Private Trust | Transition to Private PKI as a service for business needs that are strictly internal. Learn more about Private PKI as a service. |
| Existing DigiCert Roots | If you require non-browser ubiquity, you should use existing DigiCert root hierarchies to issue TLS certificates that include the clientAuth EKU. However, these certificates will not be trusted in Google Chrome or Mozilla Firefox. |