Feb 15, 2024
Over the second half of 2021, two changes in domain validation policy will take effect, which may impact how you validate domains when issuing publicly trusted TLS Certificates. These policy changes apply to all new certificate requests, renewals, re-issues and pre-validated domains. These changes will have NO IMPACT on TLS/SSL Certificates that have already been issued.
Over the past several years, there has been a concerted effort on the part of the CA/Browser Forum and various Root Programs to reduce the maximum validity of publicly-trusted Certificates. The most recent reduction came last year when TLS Certificates were limited to just 397 days of validity.
This is good for security, information becomes less reliable the further it gets from its validation date. Additionally, longer certificate lifespans limit crypto-agility and make it harder to roll out changes and updates. Plus, it encourages automating certificate lifecycle management, which eliminates the burdens historically associated with shorter validity and more certificate rotation.
However, the most recent reduction to max validity only reduced the lifespan of the Certificate itself, CAs and customers were still allowed to re-use validation information for 825 days. In September, the maximum time a domain validation lasts for will be 397 days, aligning with the maximum validity of Certificates. In many ways, this is just part two of last year's change.
GlobalSign will implement the changes on September 27, 2021.
Managed SSL (MSSL):
Retail and Partners:
Starting in November, issuance of wildcard SANs or subdomains of domains validated using the HTTP domain validation method will be prohibited for wildcard Certificates. Additionally, when that DV method is used for non-wildcard Certificates, domain validation will be required for every individual SAN/fully qualified domain name (FQDN).
GlobalSign will implement the changes on November 29, 2021.
Managed SSL (MSSL):
Retail and Partners:
For more information on these upcoming changes, please view this blog post.
Check your certificate installation for SSL issues and vulnerabilities.