Renew or activate signature

Electronic signature activation

How to activate NEW
Certum's electronic signature?

Activate a Signature

Electronic signature renewal

Renewal of Certum's e-signature
step by step

Renew a Signature

2025-08-13

Certum implements new Root CAs


From September 15, 2025, Certum will implement new Root CAs in accordance with Mozilla’s and Google’s policies.

If you are using up-to-date operating systems and browsers, you will likely not notice this change.

If you use older systems, make sure that the new Root CAs or cross-certificates are installed. The old Root CAs will be retired, meaning that certificates based on them will no longer be trusted in the latest browsers and systems.

Why Certum is changing Root CAs

This change follows the decision of Mozilla Firefox and Google Chrome to remove trust in Root CA certificates older than 15 years (for TLS/SSL certificates) and 18 years (for S/MIME). The goal of this policy is to increase user security.

Withdrawal of trust means that browsers such as Firefox and Chrome will remove trust for issuers – old Root Cas – so even though they will still be technically valid, they will no longer be trusted by newer browser versions. As a result, SSL and S/MIME certificates issued by Certum CA, Certum Trusted Network CA, and Certum Trusted Network CA 2 will no longer be recognized as secure.

A detailed withdrawal schedule can be found at:

Which Root CAs are being retired?

From 2025, Certum has begun phasing out old Root CAs and gradually migrating to new Root CAs:

  • Certum CA – retired
  • Certum Trusted Network CA – trust removal date: 2027-04-15
  • Certum Trusted Network CA 2 – trust removal date: 2028-04-15

Important: Certificates based on these Root CAs will remain trusted in older browsers and operating systems released before these dates, and in environments that no longer receive regular security updates.

What are the new Root CAs

As of September 15, 2025, Certum is introducing new Root CAs, which—under Mozilla and Google policy—already have defined end-of-trust dates:

  • Certum Trusted Root CA
    • Trusted for SSL certificates until 2032-04-12
    • Trusted for S/MIME certificates until 2035-04-12
  • Certum EC-384 CA
    • Trusted for SSL certificates until 2033-03-22
    • Trusted for S/MIME certificates until 2036-03-22

Important: Certum Trusted Root CA and Certum EC-384 CA are trusted in all major browsers and operating systems (Windows, macOS, iOS, Android ≥14), but they may be unavailable on Android versions older than 14 if those devices have not received a certificate store update, and in older, unsupported, and non-updated operating systems.

To ensure compatibility with older environments that no longer receive regular security updates, a mechanism known as cross-certification with the old Root CAs has been applied.

What does this mean for users?

If you encounter problems with certificates, make sure that the appropriate Root CAs and Subordinate CAs are present in the trusted stores of your applications and devices.

For older environments that no longer receive regular security updates, also check for the presence of cross-certificates with the old Root CAs.

After September 15, 2025—the date of the transition to the new Root CAs—a certificate reissue for one issued under an old Root CA will replace it with a certificate from the new Root CA.

We recommend avoiding so-called certificate pinning (i.e., hardcoding trust to a specific certificate), as this may prevent migration to the new Root CAs.

The full new hierarchy of Root CAs and Subordinate Cas

SSL Certificates:

  • Certum Commercial SSL (DV)
  • Certum Trusted SSL (OV)
  • Certum Premium EV SSL (EV)
Product Key Old Root CA New Root CA
Certum Commercial SSL (DV) RSA Certum Trusted Network CA → Certum Domain Validation CA SHA2 Certum Trusted Root CA → Certum DV TLS G2 R39 CA
Certum Commercial SSL (DV) ECC Certum Trusted Network CA → Certum Domain Validation CA SHA2 Certum EC-384 CA → Certum DV TLS G2 E39 CA
Certum Trusted SSL (OV) RSA Certum Trusted Network CA → Certum Organization Validation CA SHA2 Certum Trusted Root CA → Certum OV TLS G2 R39 CA
Certum Trusted SSL (OV) ECC Certum Trusted Network CA → Certum Organization Validation CA SHA2 Certum EC-384 CA → Certum OV TLS G2 E39 CA
Certum Premium EV SSL (EV) RSA Certum Trusted Network CA → Certum Extended Validation CA SHA2 Certum Trusted Root CA → Certum EV TLS G2 R39 CA
Certum Premium EV SSL (EV) ECC Certum Trusted Network CA → Certum Extended Validation CA SHA2 Certum EC-384 CA → Certum EV TLS G2 E39 CA

 

For older systems, it may be necessary to install cross-certificates:

S/MIME Certificates:

  • Certum S/MIME Mailbox
  • Certum S/MIME Individual
  • Certum S/MIME Sponsor
  • Certum S/MIME Organization
Certum S/MIME Mailbox/Individual/Sponsor/ Organization RSA Certum Trusted Network CA à Certum Digital Identification CA SHA2 Certum Trusted Root CA à Certum SMIME RSA CA
Certum S/MIME Mailbox/Individual/Sponsor/ Organization ECC Certum EC-384 CA à Certum SMIME ECC CA