Important Notice: Sectigo Root Certificate Migration and Its Impact

Modified on Tue, 24 Feb at 4:22 AM

TABLE OF CONTENTS

Overview

Sectigo, a widely used Certificate Authority (CA) for securing IIS and API endpoints, has initiated a migration to new Public Root Certificates. This change is part of an industry-wide modernization effort and affects all newly issued TLS certificates, including:

  • Extended Validation (EV)
  • Organization Validation (OV)
  • Domain Validation (DV)

What This Means for You

If your organization has recently updated or plans to update its Sectigo certificates, please be aware of the following:

? Integration Impact

Systems that have not updated their trust stores may fail to recognise the new root certificates. This can result in:

  • API errors
  • Failed HTTPS connections
  • Service disruptions

Before renewing or installing new Sectigo certificates:

  1. Verify Compatibility: Ensure your systems trust the new root CAs.
  2. Update Trust Stores: Apply any necessary updates to your operating systems, browsers, or application environments.
  3. Review Sectigo’s Migration DetailsClick here to view Sectigo’s official documentation

? Avoid Certificate Pinning

If your systems use certificate pinning, we strongly recommend reviewing and discontinuing this practice. Pinning to old root certificates may cause unexpected failures as the new roots are adopted.

Need Help?

If you have questions or need assistance verifying compatibility, please contact our support team.
We’re here to help ensure a smooth transition.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article