Apple Follows Google’s Lead: Get Ready for 45-Day TLS Certificate Lifespans

Note: Read about Apple’s revised timeline for reducing certificate lifespans to 47 days in our latest blog.

At the last CA/Browser (CA/B) Forum meeting, Apple dropped a big announcement, causing quite a stir in the PKI industry. Apple introduced a draft ballot, proposing a gradual reduction of the maximum validity for public SSL/TLS certificates from 398 days to just 45 days by 2027. The proposal also includes cutting the Domain Control Validation (DCV) re-use period to 10 days within a similar timeframe.

Currently, the maximum validity period for public TLS certificates is 398 days. Apple’s proposal calls for an incremental reduction starting in 2024, with the 45-day cap taking effect by April 2027.

Here’s the proposed timeline:

Timeframe Maximum Certificate Validity Domain Control Validation Re-use Period
September 2025 200 days 200 days
September 2026 100 days 100 days
April 2027 45 days 45 days
September 2027 10 days

Apple’s proposal, if voted on by CA/B Forum members and approved, could dramatically change how businesses handle and manage digital certificates in the years ahead.

The Shift Towards Shorter Certificate Lifespans

Apple’s proposal is part of a growing trend we’ve seen from other major industry players. Last year, Google unveiled its “Moving Forward, Together” roadmap, which aims to reduce the maximum validity period for public SSL/TLS certificates from 398 days to just 90 days. Google is expected to introduce this change either in a future policy update of its Chrome Root Program or a CA/B Forum Ballot Proposal.

The move was driven by the need for automation and crypto-agility to strengthen enterprise security postures and prepare for the evolving PKI landscape and post-quantum cryptography. Shorter validity TLS certificates coupled with more frequent domain validation also helps ensure accurate and up-to-date domain ownership information, reducing the risk of breaches or compromises from outdated certificates or unauthorized certificate issuance. With Apple now joining Google in advocating for similar changes, we have two leading browsers pushing for shorter certificate lifespans.

Though Apple’s proposal is still under discussion, the message is clear: the industry is heading toward much shorter TLS certificate validity periods. If this ballot passes, businesses will need to adapt to a new reality where SSL/TLS certificates will require more frequent renewals.

TLS certificate lifespans have been gradually decreasing over the years as part of a continuous drive to enhance Internet security. To learn more about the reasons behind this shift and explore Google’s proposal for 90-day validity certificates, check out our informative document: Navigating Google’s 90-Day TLS Certificate Validity Proposal.

Again, What Does this Change Mean to Organizations?

A validity period of 45 days essentially means public TLS certificates will now need to be renewed not once but over 8 times a year. That’s a massive shift from how TLS certificates are renewed and managed today. The added workload of frequent renewals will place tremendous pressure on IT, PKI, security, DevOps and applications teams to stay on top of certificate expirations if they continue to rely on manual processes.

Certificate Lifecycle Management with Visibility, Control and Insights – All in One Place

The Challenge of Frequent Certificate Renewals and Domain Revalidation

With non-human identities growing 20x times more than human identities, managing certificates is already a challenge for IT teams. Now, with renewal windows shrinking, manually tracking and renewing hundreds to thousands of certificates every few weeks could quickly spiral into a stressful ordeal. The process is not only labor-intensive but heavily error-prone. Without a centralized certificate lifecycle management (CLM) solution to track expirations and streamline the certificate request and renewal process, there is an increased risk of missed renewals, delays, and provisioning errors, leading to unexpected outages and security vulnerabilities.

Fragmented approaches to CLM do not solve the challenge either. Using separate, ad hoc tools for CLM results in fragmented views of the certificate landscape, leaving blind spots that make it difficult to identify and remediate issues on time. Without centralized visibility and management, missing renewals becomes routine. It’s not just about renewals—without the ability to enforce uniform policies, you risk variations in crypto standards, vulnerabilities, security breaches, and compliance violations.

Frequent domain revalidation is a beneficial change that helps prevent unauthorized issuance of certificates, ensuring that the entity requesting the certificate is the rightful owner of the domain. However, limiting the domain validation reuse period to just 10 days presents challenges and places additional strain on technical teams, requiring ongoing monitoring and management of domain ownership and certificate statuses.

In response to Apple’s proposal, several website and system administrators flocked to Reddit to vent their frustration over the staggering increase in manual workload that more frequent renewals would bring. While their concerns are valid, it is important to note that renewals aren’t the problem here; manual processes are.

There Is Only One Way to Solve These Challenges: AUTOMATION

The solution lies in automation. This push for shorter certificate lifespans calls for automation in certificate lifecycle management (CLM). Digital certificates are fundamental to Internet security and digital transformation, providing trust, secure access and encrypted communications. Automation helps you manage your certificates efficiently and ensure your infrastructure and applications remain protected.

Automating certificate lifecycle management can streamline the entire renewal process, from tracking certificates impending expiry to notifying the right people, performing Domain Control Validation (DCV), getting the certificate issued, and re-provisioning certificates to the right endpoint. You can also avoid human error, reduce administrative overhead, and ensure all your certificates are consistently renewed on time without any service interruptions.

2024 ESG Report: Managing Non-human Identities for an Effective Cybersecurity Program

For organizations managing hundreds to thousands of certificates, automation removes the risk of oversight, centralizes certificate visibility, and simplifies the renewal process, making it scalable even as the frequency of renewals increases.

Beyond efficiency, automation enhances security and compliance. Shorter certificate lifespans reduce the window of exposure for vulnerabilities, but only if certificates are renewed promptly. An automated CLM system ensures certificate issuance and renewal follow security best practices, preventing vulnerabilities and ensuring continuous compliance.

Visibility, automation, and control enable crypto-agility, which is the ultimate goal for organizations. It is essential to adapt quickly to rapid changes (like reduced certificate lifespans) and protect your organization against existing and emerging threats (like the threat of quantum computing breaking current cryptography).

As TLS certificate lifespans continue to shrink, the only way to stay on top of things and avoid unnecessary downtime and security weaknesses is through automation. Whether or not Apple and Google’s proposals are fully adopted by the CA/B Forum, their influence will likely shape the future of certificate policies. It is highly possible that Apple and Google will implement their proposals in their own policy updates. By upgrading your certificate lifecycle management (CLM) processes now, you’ll be prepared for any changes they introduce and protect your operations. Investing in automation today means your organization will stay secure, agile, and ready for whatever comes next.

AppViewX Certificate Lifecycle Automation Simplifies and Streamlines Renewal of Short-lived Certificates at Scale

AppViewX AVX ONE CLM is a ready-to-consume, scalable certificate lifecycle management (CLM) solution that automates all certificate processes end-to-end. You can discover, inventory, monitor, automate, and control the complete certificate lifecycle, all through a central console. With visibility, automation, and policy control of certificates and keys, AVX ONE CLM streamlines certificate lifecycle management end-to-end and enables crypto-agility, minimizing the risk of outages and security breaches.

AVX ONE CLM enables complete certificate lifecycle automation, including CSR generation, domain validation, and provisioning to endpoints through:

With AVX ONE CLM, you can remain flexible and tailor certificate lifecycle management to your organization’s needs. AVX ONE CLM automation workflows are customizable allowing you to implement one-click approvals and renewals, or fully automate the entire renewal and provisioning process as zero-touch, without any manual intervention–even automating the binding of certificates to endpoints.

By freeing up time for security and IT resources, AVX ONE CLM also improves user productivity while reducing the risk of expired certificates.

Talk to an AppViewX expert today for a demo on how to quickly begin automating certificate lifecycle management to eliminate outages, prevent vulnerabilities and prepare for the upcoming TLS validity changes.

Tags

  • CA/Browser (CA/B) Forum
  • certificate lifecycle management
  • certificates and keys
  • crypto-agility
  • shorter certificate lifespans
  • SSL/TLS certificates

About the Author

Krupa Patil

Product Marketing Manager

A content creator focused on providing readers and prospective buyers with accurate, useful, and latest product information to help them make better informed decisions.

More From the Author →

Related Articles

Google Second-Gen Chromecast and Audio Devices Hit By A Major Outage—Expired Intermediate CA Certificate to Blame

| 5 Min Read

NIST Releases New Report on Crypto-Agility – What You Need to Know Now

| 8 Min Read

Let’s Encrypt Issued Its First Six-Day Certificate—Here’s Why Certificate Lifecycle Management Automation Matters

| 6 Min Read