What’s Changing

The End of Public Client Authentication
This change is coming from the Google Chrome Root Program (not the CA/Browser Forum), and in practice it applies to all public CAs that want to remain trusted in Chrome. The CA/Browser Forum may later follow with an alignment ballot, but the operational impact for relying parties is the same.
This direction has been discussed and anticipated for years: browsers have steadily narrowed the WebPKI’s scope to public server authentication, not general-purpose client identity.
Effective June 15, 2026:
All corresponding unexpired and unrevoked subscriber certificates issued on or after June 15, 2026 MUST include the extendedKeyUsage extension and only assert an extendedKeyUsage purpose of id-kp-serverAuth.
This change separates the WebPKI’s role (public server authentication) from the role of client identity and access control (private client authentication). It affects any environment using publicly trusted certificates for client authentication, both browser and non-browser, such as VPN access, API gateways, device authentication, or internal service mesh communication.
This does not mean you can’t use client authentication or mTLS; it means client certificates should come from a Private PKI (or equivalent) while server certificates remain publicly trusted for serverAuth.
Scope note: This change is about publicly trusted TLS certificates (the WebPKI). It does not inherently prevent other certificate use cases (for example S/MIME or internal signing/sealing certificates) from including clientAuth, but it’s still recommended to consider a purpose-built clientAuth issuing CA for client identity.
More broadly, expect that root programs may continue to tighten and refine what is acceptable in publicly trusted certificates, and similar constraints could expand to additional public certificate profiles over time.
Direct Impact of clientAuth EKU Removal
| Scenario | Public Certificate Usage | Risk |
|---|---|---|
| API Authentication | Used to authenticate clients/machines to API gateways. | Service Disruption (Authentication fails) |
| VPN/Device Access | Used by devices or users for network access control. | Operational Outage (Access is denied) |
| Audit/Compliance | Policies currently allow public CAs for client identities. | Audit Failure (Non-compliance with policy) |
Migration Challenges and Critical Risks

How Digitorus Enables a Secure Migration
We provide a full-service strategy to manage this complex transition, ensuring a seamless move to a compliant, resilient machine identity foundation.
Phased Migration Journey
Our structured approach addresses all technical and compliance requirements before deployment.
- Phase 1
- Discover
- Inventory all affected certificates and map dependencies.
- Discover
- Phase 2
- Strategy
- Determine target architecture: Public, Private PKI, PKIaaS, or alternative method.
- Strategy
- Phase 3
- Implement
- Build or adopt the new CA environment and pilot enrollment and authentication.
- Implement
- Phase 4
- Migrate
- Orchestrate the systematic replacement of old public TLS clientAuth certificates.
- Migrate
Supporting Capabilities for Private PKI

Our work is practical and outcome-focused: we work with you to choose the right approach for your environment and make it operable, without forcing a one-size-fits-all “build a PKI” program. That means aligning on the key decisions together (platform, issuance model, trust distribution, key protection) and producing the governance you actually need (controls, risk assessments, and CP/CPS updates where appropriate).
For clientAuth and mTLS, we focus on what breaks in production: consistent certificate profiles (EKUs, subject/SAN strategy), reliable enrollment at scale, partner/customer onboarding, and lifecycle hygiene (renewal, rotation, revocation).
