The 47-Day Mandate: What’s Changing?

Phased Timeline
The transition is being implemented in phases, providing a runway for strategic planning, but demanding action now, especially for organizations managing high certificate volumes (10,000+).
- 31 Dec 2025
- Baseline (Pre-Mar 2026)
- 398-day validity with roughly one renewal per host each year.
- Baseline (Pre-Mar 2026)
- 15 Mar 2026
- 200-Day Transition
- 200-day validity with about two renewals per host annually.
- 200-Day Transition
- 15 Mar 2027
- 100-Day Milestone
- 100-day validity with around four renewals per host annually.
- 100-Day Milestone
- 15 Mar 2029
- 47-Day Era
- 47-day validity with renewals about every month.
- 47-Day Era
47-Day Certificate Readiness
Building automation and resilience for short-lived certificates
Common Challenges for Enterprise CLM
Enterprises with complex, hybrid environments face significant hurdles in adopting machine identity automation at scale. These challenges are magnified by the sheer volume and accelerated timelines when using public TLS certificates with 47-day validity for this purpose.

Migration Strategy & Automation Protocols

Automation & Vendor Ecosystem
Automation must be a strategic fit. We ensure your solution works within your current ecosystem, while also providing the necessary guidance and expert support to implement essential best practices and protocols, setting a strong foundation for future growth.
Core Automation Protocols
| Protocol | Description | Primary Enterprise Use Case |
|---|---|---|
| ACME | Automated Certificate Management Environment. Open standard for web server automation via REST/HTTPS. | High-volume, public-facing TLS (web servers, cloud workloads). |
| EST | Enrollment over Secure Transport. Modern, highly secure successor to SCEP using TLS mutual authentication. | Internal device/IoT enrollment, enterprise PKI, modern MDM. |
| SCEP | Simple Certificate Enrollment Protocol. Older protocol, simple but less secure (uses shared secret), no native revocation. | Legacy devices, basic network equipment. |
| CMP | Certificate Management Protocol. Feature-rich, complex protocol supporting full lifecycle and key recovery. | High-assurance private PKI, government, and military systems. |
Key PKI/PKIaaS and CLM Vendors and Systems
We provide vendor-independent advice to navigate this complex landscape, focusing on integration capabilities, scalability, and cost-effectiveness for your volumes.
| Category | Representative Vendors/Systems | Key Strategy Focus |
|---|---|---|
| Dedicated CLM Platforms | Venafi (CyberArk), Keyfactor, AppViewX | End-to-end orchestration, discovery, policy, and automation across multi-CA, multi-cloud environments. |
| Public CAs / PKIaaS | DigiCert, Sectigo, GlobalSign, Entrust | Sourcing public certificates and managed services for private, internal trust roots (PKIaaS). |
| Cloud/DevOps PKI | AWS Private CA, Google Cloud CA, HashiCorp Vault | Integration with cloud-native workflows and ephemeral machine identities (containers, serverless). |
| Internal / Legacy PKI | Microsoft AD CS, EJBCA | Migrating legacy internal PKI or building highly customized, self-managed environments. |
Migration Journey
- Phase 1
- Identify
- Establish certificate visibility, inventory, and ownership. Identify where it is easy to implement automation and where will it be a challenge?
- Identify
- Phase 2
- Pilots and Plans
- Launch automation pilots for ACME, EST, CMP, SCEP. Consider where you can or need to move to private certificates.
- Pilots and Plans
- Phase 3
- Migrate and Scale
- Migrate to automation or of the WebPKI where public trust is not required. Scale automation across all environments.
- Migrate and Scale
- Phase 4
- Monitor and improve
- Operate continuous automation, monitoring, and governance.
- Monitor and improve
Supporting Capabilities
We provide comprehensive support across the entire certificate automation journey, from strategic planning to operational excellence.

