New SSL certificate rules from March 15, 2026: what website owners need to know

News, Security, SSL Certificates

Starting March 15, 2026, new rules for SSL/TLS certificates will take effect. The maximum validity period will be reduced almost by half. Previously a certificate could be valid for up to 398 days, but the new limit will be 200 days.

The changes were approved by the CA/Browser Forum, an industry organization that defines security standards for certificate authorities and browser developers.

In practice, this means that the validity period of SSL certificates will gradually become shorter and certificates will need to be renewed more frequently.

Let’s look at what exactly is changing and whether website owners need to take any action.

If your website does not yet use SSL, you can use a free Let’s Encrypt certificate or a commercial certificate with extended validation. More information about available options can be found on the SSL certificates page.

What will change?

The main change concerns the maximum validity period of SSL certificates.

The transition will happen gradually:

DateMaximum SSL validity period
Before March 15, 2026398 days
From March 15, 2026200 days
From March 2027100 days
From March 202947 days

As a result, the industry will gradually move from annual certificates to certificates that are valid only for a few weeks.

The reuse period for domain validation will also be shortened. This means certificate authorities will verify domain ownership more frequently.

Why is the SSL validity period being reduced?

The main reason is improving internet security.

The longer a certificate remains valid, the more time attackers have if a private key is compromised or a configuration error occurs. Shorter validity periods allow potentially vulnerable certificates to be replaced faster.

There are also other reasons:

  • faster transition to new cryptographic algorithms
  • more frequent domain ownership verification
  • preparing infrastructure for future security standards

Will SSL certificates need to be purchased more often?

No. Shorter certificate lifetimes do not mean higher costs.

Commercial certificate authorities already use a subscription model. This means a certificate can be purchased for 1 or 2 years, while it may be reissued several times during that period at no additional cost.

For example:

  • a certificate is purchased for one year
  • the first certificate is valid for about 200 days
  • a new certificate is then issued for the remaining period

This process is called reissue and is a standard practice.

What does this mean for website owners?

The main practical change is that certificates will need to be renewed more often.

Approximate renewal frequency:

  • in 2026 — about two renewals per year
  • in 2027 — three or four renewals
  • after 2029 — renewals may happen every few weeks

If SSL certificates are installed manually, the risk of forgetting to renew them will increase.

Why automatic SSL renewal is becoming the standard

Modern web infrastructure increasingly relies on automation.

If a certificate expires, browsers begin displaying security warnings. This can lead to loss of visitors and reduced trust in the website.

For this reason, most hosting platforms now use automated SSL management.

For example, free Let’s Encrypt certificates can automatically:

  • be issued
  • be installed on the server
  • be renewed before expiration

On web hosting plans, these certificates are usually enabled through the control panel and renewed automatically.

Do hosting clients need to do anything?

In most cases, no.

If you are using a free Let’s Encrypt SSL certificate through the hosting control panel, it will be issued and renewed automatically without any action from the website owner.

Commercial SSL certificates (for example, OV or EV) usually require manual installation and periodic reissuance. Their validity period will also be shortened according to the new industry rules.

When should you pay attention?

You should check your SSL configuration if:

  • the certificate is installed manually on the server
  • commercial OV or EV certificates are used
  • certificates are managed within corporate infrastructure

In these cases it is recommended to configure automatic certificate renewal in advance.

Frequently asked questions

Why is the SSL validity period being shortened?

The goal is to improve security. Shorter certificates reduce risks if a key is compromised or cryptographic algorithms become outdated.

Will I need to pay for SSL more often?

No. Commercial certificates are usually purchased for one or two years and may be reissued multiple times within that period without additional cost.

What happens if an SSL certificate expires?

Browsers will display a security warning. Visitors may not open the website and search engines may reduce trust in the site.

Do hosting users need to take any action?

If you are using a free Let’s Encrypt SSL certificate through the hosting control panel, it is renewed automatically and requires no action.

Summary

Starting in March 2026, the maximum validity period of SSL certificates will be reduced to 200 days. In the future the validity period will become even shorter.

This is part of a global shift toward more frequent certificate renewal and automated security management.

For most website owners these changes will be almost invisible, especially if SSL certificates are managed through the hosting control panel.

Need an SSL certificate for your website?

Our hosting allows you to use free Let’s Encrypt certificates with automatic renewal as well as commercial certificates for projects that require extended validation.

View available SSL certificates

WHOIS Domain Control Validation Will Phase Out Soon

SSL Certificates

If you’ve used WHOIS-based validation for your SSL/TLS certificates, it’s time to change to another validation method ASAP.

Changes are coming down the pike regarding WHOIS-based domain validation in the first half of 2025.

In August 2024, researchers at discovered a vulnerability relating to use of legacy WHOIS systems for domain control validation (DCV) that industry leaders were concerned could lead to fraudulent email-based validations for SSL/TLS certificates. Although the scope of the specific vulnerability was limited, it brought up questions about the industry’s reliance on certain legacy resources for validation.

Industry leaders will begin a phased elimination of WHOIS-based DCV methods. As a result, the WHOIS protocol or HTTPS server query data will no longer be used as a way to 1) identify domain contacts, or 2) verify an entity’s control over a domain.

Phase One: Jan. 15, 2025
Basically, CAs will be prohibited from relying on domain contact info gathered through manual or automated WHOIS lookup methods.

Phase Two: July 15, 2025
This is the date by which publicly trusted CAs MUST NOT rely on any WHOIS-related domain validation methods to issue new leaf certificates or allow prior authorization reuse (even during a valid reuse period).

What Does All of This Mean for Your Organization?

If You Don’t Use WHOIS Data for Domain Control Validation
If a method other than WHOIS web-based lookups was used to validate your domain— for example, DNS TXT records, file validation, or constructed email (e.g., administrator@domain.com) verification — then this has no impact on you or your certificates. You’re right as rain and you don’t have to worry about any of these changes.

If You Did Use WHOIS Data for Your Domain Control Validation Process
If you used WHOIS-listed email address to validate your domain when getting a website security certificate, you’ll need to change validation methods when requesting a new SSL/TLS certificate.

The easiest method for most customers will be to use one of the pre-approved validation email addresses:

  • admin@yourdomain.com
  • administrator@yourdomain.com
  • webmaster@yourdomain.com
  • hostmaster@yourdomain.com
  • postmaster@yourdomain.com

Alternative methods of domain control validation include file and DNS-based validation methods:

  • DNS TXT records
  • DNS CNAME (canonical name) records that link an alias to one or more other domains
  • HTTP file authentication

We offer wide range of certificates from major certificate authorities: RapidSSL, GeoTrust, Thawte, Sectigo, DigiCert.

You can buy a Certificate not only to protect any server or hosting that is provided by us, but for any other services/servers that you use from different providers. You can also order SSL installation service from us to get your Certificate installed correctly.

No More File-Based DCV for Wildcards

SSL Certificates

Adapting to Industry Changes for Better Web Security
The CA/B Forum has voted on removing the file-based domain control validation (DCV) method for Wildcard certificates (e.g. *.domain.com) starting Dec. 1, 2021. So why the update?

The change was created in response to the concern that host-based control validation isn’t a strong enough way to demonstrate that someone has control over a domain’s entire namespace. Ultimately, this change improves security for subdomains and therefore, web users overall.

To be prepared and acclimated before the official start date, major CA’s such as DigiCert and Sectigo, will no longer allow file-based DCV for Wildcard certificates starting Nov. 15. After that, users can only use email and DNS validation methods to perform DCV for Wildcards.

We offer wide range of certificates from major certificate authorities: RapidSSL, GeoTrust, Thawte, Sectigo (formerly Comodo), Certum, Symantec.

 

You can buy a Certificate not only to protect any server or hosting that is provided by us, but for any other services/servers that you use from different providers. You can also order SSL installation service from us to get your Certificate installed correctly.

DigiCert Scheduled Maintenance

SSL Certificates

As your trusted advisor, we want to alert you about DigiCert’s upcoming scheduled maintenance. Major upgrades to their internal systems are scheduled for April 6, 2019.

The maintenance window is expected to take approximately 12 hours, starting April 6 at 15:30 UTC and ending April 7 at approximately 3:30 UTC. You’ll be able to place an order for DigiCert products with us during this time but will receive an error if you attempt generation during the maintenance window. For any orders already generated and in a pending status, validation will resume once the maintenance is complete.

Thank you for patience during this upgrade. We appreciate you putting your trust in us.

We offer wide range of certificates from major certificate authorities: RapidSSL, GeoTrust, Thawte, Sectigo (formerly Comodo), Certum, Symantec.

 

You can buy a Certificate not only to protect any server or hosting that is provided by us, but for any other services/servers that you use from different providers. You can also order SSL installation service from us to get your Certificate installed correctly.

Different Name, Same Great Solutions: Comodo is now Sectigo

SSL Certificates

Comodo CA has re-branded and is now officially Sectigo. We know you have questions, so this post is designed to give you the answers you need and outline what this change means to you as a customer.

Why the change?

Francisco Partners acquired the Comodo Group’s certificate business from back in the fall of 2017. This entity, branded Comodo CA, continued to operate in the same markets, attend the same trade shows and help the same buyers as Comodo Group. The re-brand decision was made to avoid confusion as well as help them deliver on their mission to help organizations of all sizes confidently secure and maximize the digital frontier.

What exactly is changing?

While at first glance this might look like a simple name and logo change, it goes way beyond that. Here’s a quick summary of everything that’s new:

New Company Name

Comodo CA is now officially Sectigo to clearly distinguish the new company from predecessors and prevent confusion.

New Logos

The company logo has been updated. Though November 2019, the new logo should be shown with the “Formerly Comodo CA” tagline.

New Brand

The brand has been updated to represent a more complete web security. New product line logos have also been created for EnterpriseSSL, InstantSSL and PositiveSSL.

New Product Names

All products are being renamed to align with the new brand. For example, Comodo EV SSL is now Sectigo SSL EV, and Comodo SSL Wildcard is now Sectigo SSL Wildcard.

We’re here to help you find the right level of validation based on your goals.

Core Solutions offers 76 different types of certificates from major certificate authorities: RapidSSL, GeoTrust, Thawte, Sectigo (formerly Comodo), Certum, Symantec.

 

You can buy a Certificate not only to protect any server or hosting that is provided by us, but for any other services/servers that you use from different providers. You can also order SSL installation service from us to get your Certificate installed correctly.