Podcast
Root Causes 493: Disentangling Public and Private Certificate Use Cases


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
May 8, 2025
Changing root store requirements mean CAs must separate their root hierarchies for different certificate types. We explain why enterprises should consider private CA for some use cases.
Podcast Transcript
Lightly edited for flow and brevity.
In fact, a lot of people don't think about using S/MIME certificates for authentication, but you can. You can use them for authenticating into email systems. I think Tim, what we're saying is Google - we podcasted on this about the decoupling of private and public - I'm gonna put the link to the previous podcast on the screen here somewhere - and then this is an update, really, to that, because I think I had said in the 2025 predictions episode that Google was going to, based off of their blog that came out in October 2024, that there would be some kind of update later in 2025. Well, I was wrong in that it would be later in 2025. It happened February 2025 and that update specifically came in in the update to the Chrome Root Store Program version 1.6; came out in February. For those of you who want to read it, Section 3.2.1, Section 3.2.2.
Now I know you have some basis and knowledge of what it is saying, describe it, and then we're going to get down to what it really means.
So the application to become a new root, your ability to have anything other than pure TLS Server Certificates ends June 15 of this year. June 15, of 2026 is the really crazy date where all certificates that are trusted by Google's Root Store Program, Chrome, will have to be TLS Server Certificates.
Now what does that really mean is that there are a lot of you who are using TLS client certificates issued by public CAs, and you are using them for Client Authentication. Google had said a great number of CAs and a great number of certificates from a lot of CAs had no association at all with TLS server purposes. In other words, SSL, as we know it.
They were mostly being used for Client Authentication. So if you are using a publicly trusted certificate for the purposes of Client Authentication, logging into salesforce.com, your sales person was issued a certificate onto their laptop, they log into salesforce.com with it. That's something you could absolutely do at the moment.
What Google is saying is Google is only one Root Store Program, and they're not saying that they can stop a lot of these things, other than distrusting roots that are only TLS Server Certificates but what they are saying is those roots will no longer be trusted unless they are only TLS Server. Therefore they're basically pushing you towards using a private Certificate Authority, essentially, for the purposes of private Client Authentication.

