TLS Client Authentication Ends June 2026: What to Do Before the Deadline
Chrome's dual-use ban takes effect in 63 days. If your mTLS depends on public certificates, the clock is running.
April 13, 2026 · [cyphrs] Team · 11 min read
1. The Deadline Nobody Can Ignore
On June 15, 2026, Google Chrome will stop trusting any newly issued public TLS certificate that includes the Client Authentication Extended Key Usage (EKU). This isn't a recommendation. It's a hard policy change in the Chrome Root Program, and every public certificate authority on earth must comply.
The change means a structural split: public TLS certificates will be server-only. If you need a certificate for client authentication – for mTLS between services, VPN access, Wi-Fi onboarding, API-to-API calls, or any form of mutual TLS – you can no longer get it from a public CA. Not from Let's Encrypt. Not from DigiCert. Not from Sectigo. The capability is being permanently removed from the public trust ecosystem.
If your infrastructure relies on dual-purpose public certificates for mTLS, you have roughly 63 days to migrate. Here's exactly what's happening, who's affected, and what to do.
2. What's Actually Changing (And Why)
Every X.509 certificate contains Extended Key Usage fields that declare what the certificate is authorised to do. Historically, most public CAs issued certificates with both id-kp-serverAuth (server TLS) and id-kp-clientAuth (client authentication) included by default. These "dual-EKU" certificates let you use the same cert for both serving HTTPS and authenticating as a client in mTLS connections.
Chrome Root Program Policy v1.6 mandates that certificate hierarchies in Chrome's trust store must be dedicated solely to TLS server authentication. The logic is sound: the security properties, issuance requirements, and trust models for server authentication and client authentication are fundamentally different. Bundling them into one certificate creates a confused deputy problem – a certificate trusted for one purpose gets implicitly trusted for another.
Google's position is that server certificates should prove server identity, and client certificates should prove client identity, and these should come from separate trust hierarchies with separate governance. That's architecturally cleaner, and it aligns with where zero-trust frameworks have been heading for years. But it also breaks a lot of existing deployments.
3. The CA Timeline: Who's Dropping ClientAuth and When
Most CAs aren't waiting for June 15. They're removing the clientAuth EKU ahead of the deadline, which means you may already be affected depending on your CA and when your certificates were last renewed.
| Certificate Authority | ClientAuth Removed By Default | Full Removal | Status |
|---|---|---|---|
| Let's Encrypt | February 11, 2026 | May 13, 2026 | Already removed by default |
| Sectigo | September 15, 2025 | February 2027 | Removed by default |
| DigiCert | October 1, 2025 | May 1, 2026 | Removed by default |
| SwissSign | Q1 2026 | June 2026 | In progress |
| All other public CAs | Varies | June 15, 2026 | Must comply by deadline |
The critical detail: this change happens silently during certificate renewal. Your ACME client runs, the cert issues cleanly, it looks valid – but the clientAuth EKU is gone. If you have monitoring that checks certificate validity but doesn't check EKU fields, you won't catch it until mTLS connections start failing. We've covered the technical details of how and why this is happening.
4. Who's Affected
If you answer "yes" to any of these, you need to act before June 15:
mTLS Between Microservices
Using the same Let's Encrypt or public CA cert for both serving HTTPS and authenticating service-to-service calls. This is the most common pattern and the one that will break first.
VPN Client Certificates
Any VPN setup that uses public CA certificates for client authentication. This includes some OpenVPN and WireGuard deployments that share server certs for both sides.
API Gateway Authentication
API gateways or load balancers that use public certificates to authenticate upstream clients. Common in CI/CD pipelines and partner integrations.
Wi-Fi / 802.1X Onboarding
Enterprise Wi-Fi that uses public TLS certificates for EAP-TLS device authentication. The clientAuth EKU is required for the handshake to complete.
Not affected: Standard HTTPS websites that only use certificates for server authentication. If your cert's sole job is serving web traffic, this change doesn't touch you. Also not affected: private CA certificates – these operate outside the Chrome Root Program and can include whatever EKUs your organisation needs.
5. The Silent Failure Risk
This change is particularly dangerous because of how it manifests. There's no big red banner. The certificate issues successfully. Standard validation passes. The failure only surfaces when something tries to use the certificate for client authentication – and then it fails with a generic TLS handshake error that could mean a dozen different things.
Here's the sequence that's already catching teams off guard:
- 1.ACME client triggers scheduled renewal
- 2.New certificate issues cleanly – no errors, no warnings
- 3.Certificate is valid, chain is correct, expiry looks fine
- 4.Server TLS continues working – HTTPS is unaffected
- 5.mTLS connections start dropping – clientAuth EKU is missing
- 6.Downstream services can't authenticate – cascading failures
- 7.Team spends hours debugging a "TLS handshake error" before checking EKU fields
The average time to identify and remediate certificate-related outages is over five hours. If your monitoring doesn't specifically check for EKU fields – and most certificate monitoring doesn't – you're flying blind.
6. The Migration: What to Do Before June 15
There are three viable paths forward. Which one you choose depends on your current architecture and how deeply mTLS is embedded in your infrastructure.
Path A: Split Your Certificates (Minimum Viable Fix)
Keep using public certificates for server authentication (HTTPS). Issue separate certificates from a private CA for client authentication. This is the smallest change that solves the immediate problem.
What this looks like:
- – Server cert: public CA (Let's Encrypt, DigiCert, etc.) with serverAuth EKU only
- – Client cert: private CA with clientAuth EKU
- – Services present the right certificate for each role
- – Trust stores updated to trust your private CA root for client verification
Effort: Medium. Requires standing up a private CA (or using an existing one like AD CS, AWS Private CA, or a purpose-built internal CA) and updating your service configurations to present separate certs per role.
Path B: Move Internal Services to Private Trust Entirely (Recommended)
This is the approach we recommend at [cyphrs]. Rather than splitting certificates across two trust hierarchies, ask the question: do your internal services need public certificates at all?
Services that only communicate with other services inside your infrastructure don't need to be trusted by Chrome, Firefox, or Safari. They need to be trusted by each other. A private CA gives you both server and client authentication from a single trust hierarchy that you control – with whatever certificate lifetimes, EKUs, and policies make sense for your architecture.
What you gain:
- – Unified trust model: one CA for both server and client certs internally
- – No dependency on external CA policy changes (this won't be the last one)
- – Freedom to set your own lifetimes, rotation policies, and EKU combinations
- – Foundation for mTLS as an identity layer, not just an encryption layer
- – Immune to 47-day certificate compression for internal services
Effort: Higher upfront, but this is the last migration you'll need to do. Every future policy change from the CA/Browser Forum – shorter lifetimes, new EKU restrictions, DCV reuse limits – only affects your public-facing certificates, which are a fraction of your total estate.
Path C: DigiCert X9 PKI (Special Case)
DigiCert operates the X9 PKI root hierarchy separately from the Web PKI. Because it's not part of Chrome's root store, it can continue issuing dual-EKU certificates. This is a viable option if you need publicly rooted certificates with clientAuth for internet-facing mTLS (e.g., partner-to-partner API authentication across organisational boundaries). For internal mTLS, it's more expensive and less flexible than running your own private CA.
7. The 60-Day Audit Checklist
Before choosing a migration path, you need visibility into where dual-EKU certificates are actually in use. Here's the checklist:
Inventory all certificates with clientAuth EKU
Scan every endpoint, load balancer, API gateway, and service mesh. Flag any certificate that contains 1.3.6.1.5.5.7.3.2 (the clientAuth OID). Scout can do this across your entire estate in minutes.
Classify: public CA or private CA?
For each certificate with clientAuth, determine whether it was issued by a public CA (affected) or a private CA (not affected). This tells you the blast radius.
Map renewal dates against CA removal timelines
Cross-reference the table above. If a Let's Encrypt cert renews after May 13, it's already affected. DigiCert after May 1. Know which certs will lose clientAuth on their next renewal.
Identify mTLS dependencies
For each affected certificate, document which services depend on it for client authentication. These are the connections that will break on renewal.
Decide on a migration path
Path A (split certs) for quick fixes. Path B (private trust) for a permanent solution. Start with the certificates that renew soonest.
Add EKU monitoring
Update your certificate monitoring to check EKU fields, not just expiry dates. If a renewal silently drops clientAuth, you need to know before your services do.
8. The Bigger Picture: This Won't Be the Last Policy Change
The clientAuth EKU removal is one of three major public certificate changes converging in 2026:
47-Day Certificates
SC-081 compresses certificate lifetimes from 398 to 47 days by 2029. Phase one (200 days) is already live.
Read more →ClientAuth EKU Ban
Chrome separates server and client trust hierarchies. Public CAs exit client authentication permanently. June 15, 2026.
You are herePost-Quantum Transition
Google won't put PQC signatures into X.509. Merkle Tree Certificates are coming. A new format for the public web.
Read more →Each of these changes shares the same underlying lesson: the public certificate ecosystem is getting more restrictive, more specialised, and more opinionated about what public certificates should and shouldn't do. Organisations that depend on public certificates for everything – server TLS, client auth, internal services, machine identity – are going to keep getting disrupted.
The organisations that won't have to scramble at every policy change are the ones that have already separated their public and private trust. Public certificates for public-facing endpoints. Private certificates – issued by infrastructure you control – for everything else.
9. Start Here
The June 15 deadline is fixed. But the migration doesn't have to be a fire drill.
Scan with Scout
Find every certificate with clientAuth EKU across your infrastructure. Know the blast radius before you start migrating.
Stand Up Trust CA
Deploy a private CA with full server and client authentication support. Your trust, your policies, your timelines.
Manage in Hub
Track your migration progress. Monitor public and private certificates from a single pane with EKU-level visibility.
Free assessment: Not sure how exposed you are? Run a Scout scan against your domains – it checks EKU fields as part of the certificate analysis and flags any dual-EKU public certificates that will be affected. Takes under a minute.