Validity Period Controls

Validity controls define how long a certificate or Certificate Authority (CA) remains valid before it must be renewed or replaced. CertiNext applies validity controls differently for publicly trusted CAs and private CAs, reflecting the distinct governance models and compliance requirements that apply to each trust domain.

This separation ensures that public trust certificates remain compliant with global browser standards, while private PKI deployments retain the flexibility required for internal and machine identity use cases.

Validity Controls for Public Certificate Authorities

For publicly trusted CAs, certificate validity is not configurable by the customer within CertiNext.

Public certificate lifetimes are strictly governed by:

  • CA/Browser Forum Baseline Requirements

  • Browser and operating system root store policies

  • CA-specific public trust rules

As a result:

  • Maximum certificate validity is enforced by the issuing public CA

  • Validity options exposed in CertiNext align with what the public CA allows

  • Customers cannot extend certificate lifetimes beyond permitted limits

CertiNext enforces these rules automatically to ensure continued browser trust, compliance, and interoperability.

Validity Controls for Private Certificate Authorities

For private CAs, certificate validity is fully configurable within CertiNext, as shown in the Private CA creation workflow.

When creating a private CA or subordinate CA, administrators can define:

  • Validity duration

  • Validity unit (Years, Months, or Days)

  • Purpose of the CA (Issuing CA or End-Entity)

This flexibility allows organizations to:

  • Design long-lived root CAs for internal trust

  • Configure shorter-lived issuing or end-entity CAs

  • Align certificate lifetimes with security, operational, or compliance requirements

  • Support short-lived certificates for Zero Trust and automation-driven environments

These controls apply to emCA-based private PKI deployments managed within CertiNext.


emCA vs Microsoft PKI – Hierarchy Support

CertiNext supports building and managing private CA hierarchies only with emCA.

Key distinctions:

  • emCA CertiNext supports full private PKI hierarchy creation, including root CAs, subordinate CAs, and issuing CAs, with configurable validity at each level.

  • Microsoft Active Directory Certificate Services (AD CS) CertiNext integrates with Microsoft PKI for lifecycle management and visibility but does not support creating or modifying private CA hierarchies. Hierarchy design, validity, and CA structure for AD CS remain managed natively within Microsoft.

This ensures CertiNext respects platform boundaries while providing deep PKI lifecycle capabilities where supported.


Why Validity Controls Matter

Properly configured validity controls help organizations:

  • Reduce risk exposure from long-lived certificates

  • Enforce cryptographic and lifecycle policies

  • Align with Zero Trust and automation-first architectures

  • Maintain compliance across public and private trust domains


Summary

CertiNext enforces certificate validity based on trust context:

  • Public CA validity is dictated by CA/Browser Forum and root store requirements and enforced automatically

  • Private CA validity is configurable within CertiNext for emCA-based hierarchies

  • Microsoft PKI is supported for lifecycle operations but not for hierarchy or validity design

This model ensures strong compliance for public trust while preserving flexibility and control for private PKI deployments.

Last updated