Big news in the world of PKI and digital trust: the CA/B Forum has officially passed Apple’s bold proposal to slash the maximum lifespan of public TLS certificates from 398 days to just 47 days by 2029.
Yes, you read that right—by 2029, certificates will expire almost eight times faster and need to be renewed nearly every month. It’s a massive leap from the once-a-year routine most organizations are used to.
This industry-shifting decision marks one of the most significant changes in certificate lifecycle management in recent years. It is rooted in a simple but powerful idea that shorter-lived certificates improve security, reduce the window of vulnerability, and promote automation and agility in certificate lifecycle management. The change is meant to push the industry toward a more dynamic and responsive approach.
A Quick Look at the Backstory
Back in October 2024, Apple introduced a draft ballot at a CA/B Forum meeting, proposing a gradual reduction of the maximum validity for public SSL/TLS certificates from 398 days to 45 days by 2027. The proposal also included cutting the Domain Control Validation (DCV) re-use period to 10 days within a similar timeframe.
The proposal sparked plenty of debate. After feedback from the community, Apple revised the timeline, spacing the changes out with longer intervals, to give the industry time to adapt. Nonetheless, the direction was clear: shorter-lived certificates were coming.
Last week, Apple took the revised ballot to a formal vote. After a 7-day voting process involving all major browsers, Certificate Authorities (CAs), and certificate consumers, the results were in—and the proposal passed. And with that, the phased reduction of TLS certificate validity down to 47-days officially begins.
Here’s what the reduction timeline looks like:
Timeframe (Certificates Issued After) | Maximum Certificate Validity | Domain Control Validation (DCV) Re-Use Period | Impact |
April 2025 (currently) | 398 days | 398 days | – |
March 15, 2026 | 200 days | 200 days | 2X today’s workload
(Renewals 2X per Year) |
March 15, 2027 | 100 days | 100 days | 4X today’s workload
(Renewals 4X per Year) |
March 15, 2029 | 47 days | 10 days | 8X today’s workload
(Renewals 8 – 12X per Year) |
How This Impacts Your Certificate Lifecycle Management
By March 15 2029, CAs will no longer issue public TLS certificates that are valid for more than 47 days. That means instead of renewing certificates once a year, you will have to renew over 8 times a year—essentially on a monthly basis. That’s a massive shift from how things work today.
Now, this change turns traditional, manual, or fragmented certificate lifecycle management on its head. For PKI and IT teams relying on manual processes like spreadsheets or basic CA tracking tools, this change is going to cause significant stress. Tracking, renewing, deploying, and fully provisioning hundreds to thousands of certificates every few weeks manually is not just unimaginably painful but heavily error-prone.
You Must Prioritize Post-Quantum Cryptography (PQC) and Shorter TLS Validity Readiness: Here’s Why
Without a centralized and automated certificate lifecycle management (CLM) solution to track expirations and manage renewals, there is high risk of:
- Certificate-related outages from missed renewals, expired certificates, or misconfigurations
- Certificate vulnerabilities and compliance issues due to lack of policy control and ad hoc practices
- Burn-out level workloads as teams scramble to keep up with constant certificate operations at speed and scale
As part of the new mandate, the domain validation reuse period will also drop to just 10 days by 2029. That’s another big shift. Domain validation is the process by which a certificate requester proves their control and ownership over a domain. Doing this more frequently strengthens security—it ensures only the legitimate domain owner can request certificates and prevents CAs from issuing them based on outdated or inaccurate information. But there is a trade off. This change also means PKI and IT teams will need to perform domain validation frequently and accurately to avoid certificate issuance delays. For already stretched PKI and IT teams, handling domain validation manually is a heavy lift, and if the validation fails, it can delay certificate issuance, potentially leading to costly outages.
Simply put, with 47-day certificate lifespans, the margin for error becomes razor-thin. Without a solid CLM strategy, IT, PKI, security, DevOps, and application teams could quickly find themselves overwhelmed by the relentless pace of certificate renewals and domain revalidations.
Beat the Certificate Renewal Challenge with Automation
Managing monthly certificate renewals manually just isn’t sustainable. That’s where automation steps in as a total game changer. An automated CLM solution can manage the entire certificate lifecycle, for any volume of public and private certificates, without requiring manual intervention. From tracking expirations to initiating renewals, performing Domain Control Validation (DCV), and issuing and provisioning certificates to the correct endpoints—automation does it all.
For organizations with a large volume of certificates spread across hybrid and multi-cloud environments, automation isn’t just helpful—it’s essential. It helps streamline renewals, eliminate the risk of outages, and strengthen the security posture. For smaller organizations with limited IT resources, it helps reduce workload, improve IT efficiency, and eliminate certificate-related outages or security issues.
A full-featured CLM automation solution like AppViewX AVX ONE CLM takes this a step further. It doesn’t just automate renewals—it provides complete visibility, centralized management, automation and policy control of all the certificates in your infrastructure. You can oversee all your private and public trust certificates, tackle certificate expirations, remediate vulnerabilities, and stay on top of compliance, all from a single central platform. Strict PKI policies and automated enforcement helps standardize certificate issuance and usage, ensuring certificate compliance across the board.
More importantly, centralized visibility, management, and control will set you up for crypto-agility, which is the ultimate goal as you navigate shifts and changes, such as post-quantum cryptography (PQC) migration, browser distrust, and new compliance mandates.
Prepare for the Shift to 47-Day TLS Certificates with AppViewX
AppViewX AVX ONE CLM is a ready-to-consume, scalable certificate lifecycle management (CLM) solution that automates all certificate processes end-to-end. You can discover, inventory, monitor, automate, and control the complete certificate lifecycle, all through a central console. With visibility, automation, and policy control of certificates and keys, AVX ONE CLM streamlines certificate lifecycle management end-to-end and enables crypto-agility, minimizing the risk of outages and security breaches.
Certificate Lifecycle Management with Visibility, Control and Insights – All in One Place
AVX ONE CLM delivers complete certificate lifecycle automation, including CSR generation, domain validation, provisioning to endpoints, and renewals through:
- Advanced out-of-the-box and customizable automation workflows
- Deep native integrations and REST APIs
- Support for all major auto-enrollment protocols, including – ACME, EST, SCEP, Native Windows Auto-enrollment, and Microsoft Intune
- PKI policy, governance, and RBAC (role-based access control)
AVX ONE CLM gives you the flexibility to customize automation workflows to your needs—whether you want one-click approvals or zero-touch workflows that even bind certificates to endpoints automatically. By freeing up time for security teams and IT resources, AVX ONE CLM also improves user productivity while reducing the risk of expired certificates.
The Future is Clear. Are You Ready?
The shift to 47-day TLS certificates isn’t just a one-off change—it’s an indication that PKI is evolving faster than ever. With the migration to post-quantum cryptography kicking off, and big browsers pushing for agility and automation in CLM, now is the time to modernize your CLM and adopt a crypto-agile approach to ensure you are prepared for what’s next.
Want to dive deeper into what this means for your organization? Join our upcoming webinar to explore the 47-day mandate, its impact, and how to prepare without disruption.