Skip to content

Commit 01c5b66

Browse files
Update tlsclient profile availability messaging (#2174)
1 parent 98607cd commit 01c5b66

3 files changed

Lines changed: 8 additions & 7 deletions

File tree

content/en/docs/profiles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Profiles
33
slug: profiles
4-
lastmod: 2026-02-11
4+
lastmod: 2026-03-16
55
show_lastmod: false
66
---
77

@@ -93,7 +93,7 @@ Certificates issued with the tlsclient profile contain the TLS Client Auth EKU.
9393
It is otherwise identical to the classic profile.
9494

9595
However, as [announced on our blog](/2025/05/14/ending-tls-client-authentication),
96-
this profile will cease to exist on May 13, 2026.
96+
this profile will soon cease to exist. Subscribers who are already using it prior to May 13, 2026 may continue to use it until July 8, 2026.
9797

9898
This profile exists for the sole purpose of allowing Subscribers who need access
9999
to TLS Client Auth certificates to retain that EKU for slightly longer, to

content/en/post/2025-05-14-ending-tls-client-authorization.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,16 @@ display_support_us_footer: true
88
display_inline_newsletter_embed: false
99
---
1010

11+
> Update March 16, 2026: Thanks to some timeline changes in the root program requirements, we have been able to push back the removal of the `tlsclient` profile slightly. If you are already using the `tlsclient` profile before May 13, 2026, now you will be able to continue to do so through July 8, 2026.
12+
1113
Let's Encrypt will no longer include the "TLS Client Authentication" Extended Key Usage (EKU) in our certificates beginning in 2026. Most users who use Let's Encrypt to secure websites won't be affected and won't need to take any action. However, if you use Let's Encrypt certificates as client certificates to authenticate to a server, this change may impact you.
1214

1315
To minimize disruption, Let's Encrypt will roll this change out in multiple stages, using [ACME Profiles](https://letsencrypt.org/docs/profiles/):
1416

1517
- **Today**: Let's Encrypt already excludes the Client Authentication EKU on our [`tlsserver`](https://letsencrypt.org/docs/profiles/#tlsserver) ACME profile. You can verify compatibility by issuing certificates with this profile now.
1618
- **October 1, 2025**: Let's Encrypt will launch a new `tlsclient` ACME profile which will retain the TLS Client Authentication EKU. Users who need additional time to migrate can opt-in to this profile.
1719
- **February 11, 2026**: the default [`classic`](https://letsencrypt.org/docs/profiles/#classic) ACME profile will no longer contain the Client Authentication EKU.
18-
- **May 13, 2026**: the `tlsclient` ACME profile will no longer be available and no further certificates with the Client Authentication EKU will be issued.
20+
- **July 8, 2026**: the `tlsclient` ACME profile will no longer be available and no further certificates with the Client Authentication EKU will be issued.
1921

2022
Once this is completed, Let's Encrypt will switch to issuing with new intermediate Certificate Authorities which also do not contain the TLS Client Authentication EKU.
2123

@@ -26,4 +28,4 @@ For some background information, all certificates include a list of intended use
2628

2729
After this change is complete, only TLS Server Authentication will be available from Let's Encrypt.
2830

29-
This change is prompted by changes to Google Chrome's root program requirements, which impose a June 2026 deadline to split TLS Client and Server Authentication into separate PKIs. Many uses of client authentication are better served by a private certificate authority, and so Let's Encrypt is discontinuing support for TLS Client Authentication ahead of this deadline.
31+
This change is prompted by changes to Google Chrome's root program requirements, which impose a June 2026 deadline to split TLS Client and Server Authentication into separate PKIs. Many uses of client authentication are better served by a private certificate authority, and so Let's Encrypt is discontinuing support for TLS Client Authentication ahead of this deadline.

content/en/upcoming-features.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Upcoming Features
33
slug: upcoming-features
4-
lastmod: 2026-02-11
4+
lastmod: 2026-03-16
55
show_lastmod: 1
66
---
77

@@ -11,7 +11,7 @@ For announcements of upcoming changes, please [subscribe to the Technical Update
1111

1212
## Removal of TLS Client Authentication EKU
1313

14-
On February 11, 2026, we [removed the "TLS Client Authentication" Extended Key Usage (EKU)](https://letsencrypt.org/2025/05/14/ending-tls-client-authentication/) from our default certificate profile. As a temporary stop-gap for clients that need more time to migrate, we have a [tlsclient](https://letsencrypt.org/docs/profiles/#tlsclient) profile available until May 13, 2026.
14+
On February 11, 2026, we [removed the "TLS Client Authentication" Extended Key Usage (EKU)](https://letsencrypt.org/2025/05/14/ending-tls-client-authentication/) from our default certificate profile. As a temporary stop-gap for clients that need more time to migrate, we have a [tlsclient](https://letsencrypt.org/docs/profiles/#tlsclient) profile available. Subscribers who are already using it prior to May 13, 2026 may continue to use it until July 8, 2026.
1515

1616
## Decreasing Certificate Lifetimes to 45 Days
1717

@@ -55,4 +55,3 @@ Clients may [request a "shortlived" certificate](https://letsencrypt.org/2025/02
5555
## IP Address Certificates
5656

5757
Shortlived certificates (see above) can request that the certificate [contain IP Addresses](https://letsencrypt.org/2025/02/20/first-short-lived-cert-issued/) in its Subject Alternative Names. These addresses will be [validated in much the same way as DNS Names](https://www.rfc-editor.org/rfc/rfc8738.html) are today.
58-

0 commit comments

Comments
 (0)