| Update: Google Chrome updated their root program requirements and extended the timeline for removing the Client Authentication extended key usage (EKU) from public TLS certificates. DigiCert can continue to include Client Authentication EKU in public TLS certificates until March 1, 2027. |
The Google Chrome Root Program requires Certificate Authorities (CAs) to stop including the Client Authentication extended key usage (EKU) in public TLS certificates. To align with this requirement and enhance digital trust, DigiCert will stop including the Client Authentication EKU in our public TLS certificates on March 1, 2027.
This change affects all DigiCert's public TLS certificates: DV, OV, EV, EU Qualified Website Authentication Certificate (QWAC), and EU QWAC PSD2 and all DigiCert brands: DigiCert ®, GeoTrust ®, Thawte ®, RapidSSL ®, and Encryption Everywhere ®.
| Important: This is a dynamic article. DigiCert will update it when new information becomes available. Save this page and check back periodically for the latest information. |
On October 1, 2025, DigiCert stopped including the Client Authentication EKU in all our public TLS certificates by default and issued these certificates with the Server Authentication EKU only. Learn more about when DigiCert to stopped including the Client Authentication EKU in public TLS certificates by default.
On March 1, 2027, DigiCert will fully remove the Client Authentication EKU from our public TLS certificate issuance process for all certificates, including renewals, reissues, and duplicate certificates. The option to choose the Client Authentication EKU during enrollment for public TLS certificates will no longer be available.
This change will not affect your existing TLS certificates with the Client Authentication EKU issued before March 1, 2027. These certificates will remain trusted until they expire.
If you require the Client Authentication EKU beyond March 1, 2027, see What do you need to do below.
Change |
Chrome Policy |
DigiCert transition plan |
Extended Key Usage (EKU) |
Prior to March 15, 2027 Both Server and Client Authentication EKUs can be included in TLS certificates. |
|
Starting March 15, 2027 Only Server Authentication EKU can be included in TLS certificates. |
Fully remove the Client Authentication EKU from newly issued public TLS certificates (new, renewals, reissues, and duplicates). |
Do you also use TLS certificates for client authentication?
Transition to DigiCert’s X9 PKI for TLS certificates to secure communications involving multiple organizations. Regulated by the ASC X9 standards body, X9 PKI is governed by an independent certificate policy unaffiliated with the browsers, but that ensures interoperability by using a common root of trust. X9 PKI for TLS certificates can have both client and server authentication EKUs, meeting today's unique need for control, security, flexibility, and scalability with encryption, identity, and crosscertification capabilities. Learn more about X9 PKI and schedule a consultation.
Transition to Private PKI as a service for business needs that are strictly internal. DigiCert can configure and operate a private PKI for your organization, leveraging our operational expertise and investments in security. Learn more.
Brand |
Validation type |
Product |
DigiCert |
OV |
|
| EV | ||
| EU QWAC |
|
|
GeoTrust |
DV |
|
| OV |
|
|
| EV |
|
|
Thawte |
DV |
|
| OV |
|
|
| EV |
|
|
RapidSSL |
DV |
|
Encryption Everywhere |
DV |
|