Navigating the Upcoming TLS Client Authentication Requirements

December 16, 2025

Starting in mid-2026, public Certificate Authorities will no longer issue TLS certificates containing the Client Authentication Extended Key Usage (clientAuth EKU). This post breaks down why this change is happening and provides a practical roadmap for migrating to a private CA.

Quick Recap: What's Changing

The CA/Browser Forum and Google's Chrome Root Program have mandated that publicly trusted CAs stop issuing TLS certificates with the clientAuth EKU. The key dates:

  • October 2025: Major CAs remove clientAuth by default for newly issued certificates
  • May 2026: Full elimination from all public CAs.
  • June 15, 2026: Chrome enforcement deadline.

After these deadlines, new public TLS certificates will only contain the serverAuth EKU. Existing certificates will work until expiration, but renewals will not include client authentication capabilities.

Why This Change?

This policy shift addresses fundamental security and architectural concerns:

Public trust has a specific scope. Public CAs exist to establish trust on the public internet, primarily for authenticating websites to browsers. Client authentication is typically an internal matter where organizations authenticate their own users, devices, and services. Mixing these use cases under the same trust hierarchy created unnecessary complexity.

Dedicated hierarchies improve security. By requiring server-authentication-only hierarchies, the Chrome Root Program enforces clearer boundaries. This makes certificate policies easier to audit and aligns public PKI with its original intent: securing public web traffic.

The bottom line: Client authentication belongs in private PKI, where you control the trust anchor, issuance policies, and lifecycle.

Steps to Migrating to an Internal CA

The migration requires careful planning. Here's a practical roadmap:

Step 1: Discovery and Inventory

Before you can migrate, you need complete visibility into your certificate landscape.

What you need to identify:

  • All certificates currently deployed across your environment
  • Which certificates contain the clientAuth EKU
  • What applications and services depend on these certificates
  • How certificates are being used (VPN, mTLS, IoT, API authentication, etc.)
  • Certificate expiration dates and renewal schedules

The challenge: Most organizations lack complete visibility. Certificates are scattered across servers, load balancers, containers, cloud services, IoT devices, and end-user machines. Manual discovery is time-consuming and inevitably incomplete.

How Itva solves this: Itva is the only tool on the market that can automatically discover and inventory all your active certificates across your entire infrastructure, including on-premises, cloud, hybrid, and edge environments. Itva scans your network, integrates with your infrastructure components, and builds a comprehensive Cryptographic Bill of Materials (CBOM).

More importantly, Itva identifies exactly which certificates are using client authentication and maps them to the specific applications and services that depend on them. This gives you a clear picture of your exposure and a prioritized migration list.

Step 2: Create an Internal CA

Once you understand your certificate inventory, you need to establish a private PKI infrastructure. For organizations with existing Windows infrastructure, Active Directory Certificate Services (ADCS) provides a straightforward path, but any private CA solution that fits your environment will work.

Key considerations when setting up your internal CA:

  • Hierarchy design: Root CA (offline, air-gapped) and subordinate/issuing CAs
  • Certificate templates: Define profiles for client auth certificates with appropriate EKUs, validity periods, and key usages
  • Trust distribution: Plan how you'll deploy your CA's root certificate to all systems that need to trust client certificates
  • Security controls: HSM protection for CA keys, strict access controls, audit logging

Step 3: Automate Certificate Renewals with Certificate Lifecycle Management

This is where many migration efforts fail. Even after setting up a private CA, organizations try to manage certificates manually. This approach is:

  • Time-consuming: Each certificate requires manual CSR generation, approval, issuance, and deployment
  • Error-prone: Manual processes lead to misconfigurations, forgotten renewals, and outages
  • Not scalable: As your environment grows, manual management becomes impossible

The average enterprise manages thousands of certificates. With shorter validity periods becoming standard, manual management simply isn't sustainable.

How Itva transforms certificate lifecycle management:

Itva doesn't just discover your certificates. It automates the entire lifecycle from request to retirement:

  • Automatic discovery: Continuously monitors your environment for new certificates and applications
  • Intelligent mapping: Understands which applications use which certificates and how they're deployed
  • Automated renewals: Generates CSRs, submits requests to your CA (public or private), and deploys renewed certificates, all without human intervention
  • Policy enforcement: Ensures all certificates meet your organization's security requirements
  • Expiration alerts: Proactive notifications before certificates expire, eliminating surprise outages
  • Audit trail: Complete visibility into certificate changes for compliance and troubleshooting

With Itva, migrating from public CA client certificates to private CA certificates becomes a managed process. Itva orchestrates the transition, tracking which certificates have been migrated, which are pending, and ensuring no application is left behind.

Next Steps

  1. Get complete visibility: Deploy Itva to automatically discover all certificates across your environment and identify clientAuth usage. Request a demo to see how Itva can map your certificate landscape in days, not months.
  2. Plan your private CA strategy: Based on your inventory, design a private PKI architecture that meets your needs.
  3. Automate from day one: Implement Itva's certificate lifecycle management to automate issuance, renewal, and deployment.
  4. Execute a phased migration: Work through your certificate inventory systematically, validating each migration before moving to the next.

Ready to get started? Contact Itva to begin your certificate discovery and migration planning.