The Google Chrome Root Program requires Certificate Authorities (CAs) to use dedicated TLS root hierarchies for issuing public TLS certificates. To enhance digital trust and comply with the Google Chrome Root Program requirement, DigiCert is transitioning our DigiCert Global Root G2 and DigiCert Global Root G3 roots to single-purpose root hierarchies dedicated to issuing public RSA and ECC TLS end-entity certificates. Learn more about Google Chrome’s root program requirements.
On May 15, 2026, DigiCert will revoke specific G2 and G3 intermediate CA (ICA) certificates. We will not revoke the end-entity certificates issued from these ICA certificates; they will remain active. What you do with these certificates depends on their use and whether you still need them. More details are below.
If the ICA certificate in the trust chain of an end-entity certificate is revoked, the end-entity certificate is treated as not trusted or invalid. For example, if the ICA certificate that issued your TLS certificate is revoked, browsers will show a "not trusted" warning or "invalid certificate" error, blocking customers from accessing your site because the TLS certificate no longer chains to a valid ICA certificate.
| Root CA | Certificate issued from the ICA | ICA being revoked on May 15, 2026 | Replacement ICA certificate |
| DigiCert Global Root G2 | Public TLS | DigiCert Global CA G2 Note: DigiCert must revoke this ICA certificate because it does not include the Google Chrome-required Server Authentication extended key usage (EKU). |
DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
| Public S/MIME | DigiCert G2 SMIME RSA4096 SHA384 2024 CA1 | DigiCert Assured ID SMIME RSA2048 SHA256 2021 CA1 | |
| DigiCert Global Root G3 | Public Code Signing |
|
DigiCert G5 CS ECC SHA384 2021 CA1 |
|
DigiCert G5 Code Signing Europe ECC P-384 SHA384 2023 CA1 |
On May 15, 2026, DigiCert will also revoke two G5 cross-signed root certificates. End-entity certificates that chain to the G5 root as the trust anchor will remain valid and trusted until they expire. However, if the alternative trust path from the cross-signed root is needed, it will fail once the cross-signed root is revoked.
DigiCert's G5 roots are newer and may be less widely available than the G2 and G3 roots. Some older operating systems may not include the G5 roots in their trust stores. DigiCert suggests installing a DigiCert G5 cross-signed root CA certificate to ensure your certificates are trusted, even if the new G5 root is missing from the required trust store.
Are you still using any of the ICA certificates that DigiCert is revoking on May 15, 2026, or do you have an active certificate issued by them?
If you are still using the ICA certificates that DigiCert will revoke, you must switch to a new ICA certificate to issue your certificates before May 15, 2026. You cannot issue certificates from a revoked ICA certificate.
As for your active certificates, you should reissue or renew affected TLS, code signing, and S/MIME certificates from the new ICA certificates if they are still needed. End-entity certificates issued from revoked ICA certificates may not function as intended and, in most cases, appear as invalid/distrusted.
Another irregularity is that these certificates lose access to the Certificate Revocation List (CRL) and the Online Certificate Status Protocol (OCSP). When you revoke a certificate after its ICA certificate is revoked, that revocation is no longer recorded in CRLs or OCSPs, meaning:
Before May 15, 2026, do the following as required:
| Stop using this ICA certificate | Start using this ICA certificate |
| DigiCert Global CA G2 | DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
Before May 15, 2026, do the following as required:
| Stop using this ICA certificate | Start using this ICA certificate |
| DigiCert G2 SMIME RSA4096 SHA384 2024 CA1 | DigiCert Assured ID SMIME RSA2048 SHA256 2021 CA1 |
Before May 15, 2026, do the following as required:
| Stop using these ICA certificates | Start using these ICA certificates |
|
DigiCert G5 CS ECC SHA384 2021 CA1 |
| DigiCert Global G3 Code Signing Europe ECC P-384 SHA384 2023 CA1 | DigiCert G5 Code Signing Europe ECC P-384 SHA384 2023 CA1 |
| Resign your Java files before the code signing ICA certificates are revoked. Java checks the trustworthiness of code-signing signatures based on the certificate status, not the revocation date. This means that all Java signatures become invalid as soon as a code signing ICA certificate is revoked, regardless of when the revocation occurs. |
Do you include any of the cross-signed root certificates DigiCert is revoking on May 15, 2026, in your certificate trust chains?
For those using one or both cross-signed root certificates that DigiCert will revoke in your end-entity certificate chains, you don't need to reissue these certificates. You just need to replace the cross-signed root CA certificate in each certificate trust chain before May 15, 2026.
| Replace this cross-signed root CA certificate | With the new cross-signed root CA certificate |
| DigiCert TLS ECC P384 Root G5 | Coming soon. |
| Replace this cross-signed root CA certificate | With the new cross-signed root CA certificate |
| DigiCert CS ECC P384 Root G5 | Coming soon. |
Use these instructions to learn how to replace a cross-signed root in a certificate chain.

To learn more about other Google Chrome Root Program requirements and how DigiCert is meeting them, see Sunsetting the client authentication EKU from DigiCert public TLS certificates.
If you have any questions or concerns, contact your account manager or DigiCert Support.
i