Redirecting you to
FAQ

Deprecation of Client Authentication EKU from Sectigo SSL/TLS Certificates

Q&A

What is mTLS?

mTLS, also known as Mutual TLS or server-to-server authentication is a type of authentication that ensures both the client and server authenticate each other using digital certificates. Historically, TLS certificates have been used for both the client authentication as well server authentication, a practice that is being deprecated.

What is changing?

Sectigo will no longer include the Client Authentication Extended Key Usage (EKU) in newly issued publicly trusted SSL/TLS certificates.

Effective April 07, 2025, the Client Authentication EKU will no longer be included in the eIDAS QWAC certificates. No exceptions will be granted after this date. Other certificates of SSL/TLS type will remain unaffected at this point.

Effective September 15, 2025, the Client Authentication EKU will no longer be included by default.

Effective May 15, 2026, the Client Authentication EKU will be permanently removed from all newly issued SSL/TLS certificates. No exceptions will be granted after this date.

Why is this change happening in two phases?

The phased approach is designed to give organizations time to assess their use cases, plan their migration, and implement alternative solutions like Private PKI for Client Authentication use cases.

  • The September 15, 2025 deadline provides an initial transition period, where most new certificates will not include the Client Authentication EKU by default. Exceptions to this deadline can be made by Sectigo on a case by case basis.
  • The May 15, 2026 hard deadline marks the final cutoff, after which no new SSL/TLS certificates issued by Sectigo will include the Client Authentication EKU under any circumstances.

This timeline aligns with industry requirements and Sectigo’s commitment to helping customers make a smooth transition without service disruption.

An earlier enforcement date for eIDAS QWAC certificates derives from the request of the majority of our European customers who are using platforms like Chorus Pro in EDI mode, which already require the removal of Client Authentication EKU.

What is the Client Authentication EKU?

The Client Authentication EKU is an extension within a digital certificate that allows it to be used for authenticating clients to servers, commonly as part of mutual TLS (mTLS), server-to-server authentication, and other Client Authentication scenarios.

What are the key deadlines?
  • April 07, 2025: Sectigo will stop including the Client Authentication EKU in eIDAS QWAC certificates, with no exceptions.
  • September 15, 2025: Sectigo will stop including the Client Authentication EKU in SSL/TLS certificates by default.
  • May 15, 2026: Sectigo will no longer include the Client Authentication EKU in any SSL/TLS certificates. This is a hard deadline, with no exceptions.
Does this impact my S/MIME certificates?

No changes are being made at this time to Sectigo’s S/MIME certificates.

  • Multipurpose S/MIME certificates will continue to support the Client Authentication EKU.
  • Strict profile S/MIME certificates do not support Client Authentication EKU and remain unchanged.

Sectigo recommends against using publicly trusted certificates for Client Authentication purposes.

How can I tell if I am using SSL/TLS certificates for Client Authentication or mTLS?

If you are using certificates in mutual TLS (mTLS) configurations or for server-to-server authentication, you are likely relying on the Client Authentication EKU. If you are unsure, we recommend reviewing your current certificate deployment or contacting Sectigo for assistance.

How can Sectigo help?

Sectigo offers Private CA solutions that support Client Authentication EKUs for internal use cases like mTLS. Our team can help assess your needs and design a migration plan that ensures continued authentication functionality.

Why is this change happening?

Major browser and root program providers have introduced new security requirements that prohibit the inclusion of the Client Authentication EKU in publicly trusted SSL/TLS certificates. These changes are designed to reinforce certificate purpose specificity and improve ecosystem security.

How does this impact my organization?

If your organization does not use Sectigo SSL/TLS certificates for mTLS, mutual TLS, or server-to-server authentication, no action is required.

If your organization does use SSL/TLS certificates for Client Authentication purposes, you will need to transition to an alternative solution, such as a Private CA.

What alternatives are available for Client Authentication use cases?

Sectigo recommends migrating Client Authentication use cases to a Private PKI (Private CA) solution. A Private CA allows you to control certificate issuance policies, including the use of the Client Authentication EKU, and offers more flexibility for mTLS and server-to-server authentication scenarios.

What happens if I continue using SSL/TLS certificates for mTLS or Client Authentication after the deadline?

After May 15, 2026, Sectigo SSL/TLS certificates will no longer include the Client Authentication EKU and cannot be used for mTLS or other Client Authentication use cases.

To avoid disruption, we recommend transitioning to Private CA-issued certificates well in advance of this date.

What should I do next?
  • Assess whether you are using Sectigo SSL/TLS certificates for Client Authentication purposes, including mTLS or server-to-server authentication.
  • If so, contact Sectigo sales representatives to explore Private CA options.
  • Plan your migration ahead of the September 15, 2025 soft deadline to avoid disruption.
Who can I contact for more information?

If you have any questions or need assistance, please reach out to us at: clientauth@sectigo.com

Will it impact certificate reissuance and renewals?

Yes, this change applies to both new certificates and reissued or renewed certificates.

After September 15, 2025, any new, renewed, or reissued SSL/TLS certificates will no longer include the Client Authentication EKU by default.

After May 15, 2026, the Client Authentication EKU will not be included in any newly issued SSL/TLS certificates—whether they are new requests, renewals, or reissuances.

If you require certificates with Client Authentication functionality beyond these dates, you should transition to a Private CA solution.

I have SSL/TLS certificates already issued. Will they still work with Client Authentication?

Yes. SSL/TLS certificates that were issued before the deprecation deadlines and include the Client Authentication EKU will continue to work as they were issued—until they expire or are revoked.

This change only applies to newly issued certificates starting April 07, 2025 for eIDAS QWAC and starting September 15, 2025 for other SSL/TLS certificates.