MPIC FAQ

To comply with new CA/B Forum requirements, Sectigo is introducing Multi-Perspective Issuance Corroboration (MPIC) for Domain Control Validation (DCV) and Certificate Authority Authorization (CAA) checks. This process mitigates security risks by verifying traditional Domain Control Validation (DCV) and Certificate Authority Authorization (CAA) results from multiple remote network perspectives across different regions.

What’s new?

To comply with new CA/B Forum requirements (Ballot SC-067), Sectigo is implementing Multi-Perspective Issuance Corroboration (MPIC)—a security enhancement for TLS certificate issuance. This new validation process ensures that traditional Domain Control Validation (DCV) and Certificate Authority Authorization (CAA) checks are verified from multiple independent network perspectives.

As of May 2025, MPIC entered a reporting phase for S/MIME certificate issuance as well.

Who is affected?

Customers requesting publicly trusted TLS certificates that require DCV and CAA validation. This includes organizations using ACME-based automation, HTTP, DNS, or email-based DCV methods. S/MIME certificates follow the same requirements.

Why is this change happening?

Recent research has identified security risks, such as BGP hijacking, that could allow an attacker to manipulate DCV and CAA results. MPIC mitigates this risk by confirming validation results from multiple locations worldwide, strengthening the integrity of certificate issuance.

What do I need to do?

From February 18, 2025, MPIC has been running in reporting-only mode to help organizations monitor readiness.

To ensure a smooth transition ahead of the CA/B Forum’s enforcement deadline, Sectigo will begin MPIC enforcement on September 13, 2025, slightly earlier than the originally communicated September 15 date.

Most customers will not need to make changes. Just ensure your systems allow validation requests from multiple locations before enforcement begins.

Q&A