47-Day Validity Readiness TLS Certificates dashboard
Table of Contents
Expand all | Collapse all
-
- Activate Next-Generation Trust Security
-
-
- Configure AWS connection
- Configure Azure Key Vault connection
-
- Workload Identity Federation authentication
- Workload Identity Federation - Azure Identity Provider authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Workload Identity Federation authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Supported OIDC claims
-
-
-
-
- Create an F5 BIG-IP LTM machine
- Create a Microsoft Azure Private Key Vault machine
- Create a Microsoft IIS machine
- Create a Microsoft Windows (PowerShell) machine
- Create a Microsoft SQL Server machine
- Create a Common KeyStore machine
- Create a Citrix ADC machine
- Create an Imperva WAF machine
- Create a VMware NSX Advanced Load Balancer (AVI) machine
- Create an A10 Thunder ADC machine
- Create a Cloudflare machine
- Create Kemp Virtual LoadMaster machine
- Create a Palo Alto Panorama machine
-
- Provision to an F5 BIG-IP LTM
- Provision to a Microsoft Azure Private Key Vault
- Provision to Microsoft IIS
- Provision to Microsoft Windows (PowerShell)
- Provision to Microsoft SQL Server
- Provision to a Common KeyStore
- Provision to a Citrix ADC
- Provision to an Imperva WAF
- Provision to VMware NSX Advanced Load Balancer (AVI)
- Provision to an A10 Thunder ADC
- Provision to Cloudflare
- Provision to a Kemp Virtual LoadMaster
- Provision to Palo Alto Panorama
-
-
- 47-Day Validity Readiness TLS Certificates dashboard
- About the Certificate Inventory
- Managing certificate lifecycle settings
- Reissuing certificates in Next-Gen Trust Security
- Downloading certificates, certificate chains, and keystores
- Retiring, recovering, and deleting certificates
- Finding certificates in the certificate inventory
- Importing certificates from a CA using EJBCA
- Notification Center overview
- Domain-based validation for external emails
- Managing user accounts
- Troubleshooting
47-Day Validity Readiness TLS Certificates dashboard
The 47-Day Validity Readiness TLS Certificates dashboard helps you prepare for upcoming certificate renewal surges resulting from the CA/Browser Forum’s new TLS Baseline Requirements. This dashboard visualizes the impact of those changes, projects renewal volumes, and recommends next steps for automation.
The TLS Certificates dashboard displays a variety of certificate insights. Click All Active Certificates at the top of the dashboard and select one of the following filters:
- All Active Certificates
- Active Public Certificates
- Active Non-Public Certificates
Note: Click Download PDF in the top right corner of the dashboard to download a comprehensive PDF of your current CA/B Readiness TLS Certificates dashboard metrics.
Warning: Starting in 2026, the maximum certificate lifespan will reduce in multiple phases—from 398 days to just 47 days by 2029.
Purpose
The dashboard provides visibility into:
- How certificate lifespans will change by mandate deadline
- When those mandates take effect
- How many certificates you’ll need to renew and when
- How to reduce operational risk through early preparation and automation
TLS Certificates dashboard widgets and features
The 47-Day Validity Readiness Dashboard offers various insights into your certificate validity readiness. Refer to the following subsections to learn more about these insights:
Why certificate lifespans are shortening
This section outlines the background behind the CA/B Forum’s phased reductions in TLS certificate validity. It includes:
- Current validity: 398 days
- Phase 1 (March 15, 2026): 200 days
- Phase 2 (March 15, 2027): 100 days
- Phase 3 (March 15, 2029): 47 days
Mandate deadline
Displays a countdown to each mandate phase:
Use this information to prioritize migration efforts and policy changes.
Renewal impact projection (Phase 1)
This section highlights the total certificates projected to be affected by the upcoming 200-day limit in Phase 1:
- After Phase 1: Over 200 Days
- After Phase 1: 200 days or less
- Renewing before Phase 1
This breakdown helps identify which certificates are non-compliant under the upcoming rules.
Note: Click the number of certificates projected for renewal impact to redirect to the **Certificates TLS Certificates dashboard.
Projected certificate renewals (2025–2029)
Forecasts how many certificates will need renewal each year based on your current inventory and the phased CAB requirements:
Note: Renewals increase as certificate validity periods shorten and existing inventory nears expiration. Plan ahead to prevent disruptions.
Phase-specific bands in the chart visually separate how each CAB requirement phase will affect renewal frequency.
Top CAs with certificates impacted by Phase 1
Highlights the certificate authorities (CAs) with certificates exceeding Phase 1 validity impact. If no data is displayed, it means none of your currently inventoried certificates from public CAs will be out of compliance during Phase 1.
Active issuing templates that need validity changes
This section identifies issuing templates that are out of alignment with the upcoming CA/Browser Forum certificate lifespan mandates. Templates are ranked by the number of certificates they issue, helping you prioritize updates.
Select any of the following filters above the chart to view templates with certificates in different validity ranges:
- Over 200 days
- 100–199 days
- 48–99 days
Note: To prepare for the upcoming certificate lifecycle changes, connect to your CA to establish communication for managing validity and renewal policies. Next, create an issuing template that aligns with CAB requirements. Finally, set up an application and configure it for auto-renewal to streamline future certificate renewals. Use the Connect button to begin the setup process. For more information on adding Certificate Authorities, refer to Adding a certificate authority