Change in Let's Encrypt Certificates: Beginning in 2026, Let's Encrypt will no longer include the "TLS Client Authentication" Extended Key Usage (EKU) in its certificates.
- Most Users Unaffected: Most users using Let's Encrypt to secure websites won't be impacted and don't need to take action.
- Affects Client Certificate Users: Those using Let's Encrypt certificates as client certificates to authenticate to a server will be affected.
Rollout in Multiple Stages:
- Today: Excludes Client Authentication EKU on the
tlsserver
ACME profile. Can verify compatibility by issuing certificates with this profile now. - October 1, 2025: Launches a new
tlsclient
ACME profile retaining the TLS Client Authentication EKU; users needing more time to migrate can opt-in. - February 11, 2026: The default
classic
ACME profile will no longer have the Client Authentication EKU. - May 13, 2026: The
tlsclient
ACME profile will be unavailable and no more certificates with the Client Authentication EKU will be issued.
- Today: Excludes Client Authentication EKU on the
- After Completion: Let's Encrypt will switch to issuing with new intermediate Certificate Authorities that also don't contain the TLS Client Authentication EKU.
Background on Certificates: All certificates have a list of intended uses (EKUs), and Let's Encrypt certificates have included TLS Server Authentication and TLS Client Authentication.
- TLS Server Authentication: Used to authenticate connections to TLS servers like websites.
- TLS Client Authentication: Used by clients to authenticate to a server; not typically used on the web and not required for website certificates.
- Reason for Change: Prompted by changes to Google Chrome's root program requirements with a June 2026 deadline to split TLS Client and Server Authentication into separate PKIs. Many client authentication uses are better served by a private certificate authority, so Let's Encrypt is discontinuing support ahead of the deadline.
**粗体** _斜体_ [链接](http://example.com) `代码` - 列表 > 引用
。你还可以使用@
来通知其他用户。