Skip to main content

From time-to-time, IdenTrust will provide information that may interest you or have an impact on the certificate program you use. Check back often for interesting updates.

the certificate program you use. Check back often for interesting updates.


IGC Device Subordinate CA Resign Announcement

Published 08/19/2022 

IdenTrust will be issuing a new Subordinate CA (SubCA), "IGC Device CA 2" on October 17, 2022 in order to remain compliant with all Federal Public Key Infrastructure Policy Authority (FPKIPA) requirements. The new "IGC Device CA 2" will replace the current "IGC Device CA 1" SubCA. 

The "IGC Device CA 1" SubCA has 2048 bit RSA keys and is valid until March 5, 2031. However, the FPKIPA requirement states that after December 31, 2030, all IGC SubCAs must have at least 3072 bit RSA keys. The new "IGC Device CA 2" SubCA will exceed this requirement and have 4096 bit RSA keys. 

Current IGC Device certificate subscribers should not be impacted by this update. Beginning October 17, 2022, certificate replacements and certificate renewal requests will be automatically updated to the new "IGC Device CA 2" SubCA.


Microsoft's withdrawal of support for Internet Explorer 11

Updated 04/21/2022

Microsoft® announced that it will no longer support the Internet Explorer version 11 (IE 11) after June 15, 2022. This means that security patches and other updates from Microsoft will cease after that time, and in some versions of Windows, IE 11 may stop working. Here is the link to the Microsoft announcement.

Many IdenTrust customers have already stopped using IE 11 and use other IdenTrust supported browsers - Mozilla® Firefox, Google® Chrome, Microsoft Edge, Apple® Safari - and are not affected by this action.

However, if you still use IE 11, then Microsoft Edge includes a feature called Internet Explorer Mode. Instructions for this can be found on this link.


IdenTrust DST Root CA X3 Expiration (September 2021)

Updated 09/20/2021

Please be aware that the "IdenTrust DST Root CA X3" root expiring on September 30, 2021 has been replaced with the "IdenTrust Commercial Root CA 1" self-signed root which is also trusted by the major browsers and root stores since January 16, 2014. You may download the IdenTrust Commercial Root CA 1 at this link: Root Certificate Download.

If you have appliances that are not dynamically updating the root trust chain, they need to be manually updated with the self-signed "IdenTrust Commercial Root CA 1" which can be downloaded at this link: Root Certificate Download


Change to Federal Common Policy CA Root Certificate

Updated 03/03/2021

Effective in April 2021 the Federal PKI will begin using a new Federal Common root CA certificate to replace the current root CA certificate, revoked on April 22, 2021.  The currently active Federal Common root CA certificate is named Federal Common Policy CA and it has been used to issue CA certificates that are allowable under various Federal PKI policies

Although this certificate does not expire until December 2030, in order for the Federal PKI to continue to issue subordinate CA certificates that will have a validity period of more than 10 years, it is necessary for the Federal PKI to replace the original Federal Common Policy CA certificate, and issue a new Federal Common root CA certificate named Federal Common Policy CA G2, that will replace the Federal Common Policy CA certificate.  The new certificate will not expire until October 2040, allowing the Federal PKI to continue issuing CA certificates with extended validity periods.  IdenTrust will not need to reissue any CA certificate to support this change.

Please refer to Federal Common Policy CA Root Certificate for more details and instructions regarding this change. 

If you experience any issues or need assistance with this change, please contact IdenTrust Support.


Impacts of Big Sur and Monterey on Digital Certificate Retrieval and Usage

Updated 08/19/2022

Apple’s recent major system update has substantially altered the Cryptographic Token software interface, which impacts the manner in which digital certificates stored in a hardware device will function.  For this reason if you have purchased or are using a hardware-based certificate, IdenTrust recommends that you delay upgrading to macOS 11.0 (Big Sur) and macOS 12.0 (Monterey), if at all possible. 

The Big Sur and Monterey upgrades will affect the use of ActivClient, which is the software that is required to use and manage your HID hardware device and to access the certificate stored on the device. As such, only IdenTrust hardware-based certificates (HID USB tokens and Smart cards) are impacted when using Big Sur or Monterey.

You will be able to retrieve your certificate using any browser, however when testing and using your certificate, it will only be compatible with Firefox.  Unfortunately due to the changes introduced with Big Sur, you will not be able to use your hardware-based certificate with Safari, Chrome or Apple Mail. You will also be prevented from using Adobe and Bluebeam. 

Some of you may have already upgraded or purchased a new Mac that is running Big Sur.  In this case, if you have purchased an IdenTrust certificate that is stored in an HID USB token or Smart card, we recommend that you install Firefox prior to installing the ActivClient software. 

Please know we are working with HID to provide a new version of ActivClient that will be fully compatible with Big Sur and Monterey.

If you require additional assistance, please Submit a Question to our Support Staff.