Let’s Encrypt 45-Day Certificate Expiration: Monitoring & More

TLS certificate lifetimes are shrinking fast — and that changes how every organization handles renewals, validation, and outage prevention. Let’s Encrypt has confirmed it will move from 90-day certificates to 45-day certificates (with staged rollouts) and dramatically shorten authorization reuse windows. At the same time, the CA/Browser Forum’s Ballot SC-081v3 has adopted a broader industry schedule that ultimately caps public TLS certificates at 47 days by March 15, 2029.

For teams managing dozens — or thousands — of certificates, the real story isn’t “shorter certs.” It’s higher renewal velocity, tighter validation reuse, and a much smaller margin for operational error. Website monitoring and alerting become non-negotiable.

What Is Changing in SSL/TLS Certificate Lifetimes?

The 45-Day Policy (Let’s Encrypt)

Let’s Encrypt currently issues certificates valid for 90 days, and will cut that to 45 days by 2028. This is not a sudden “flip of a switch.” Let’s Encrypt is rolling it out in stages using ACME Profiles:

Date
Change
Authorization Reuse
Profile Affected
May 13, 2026 Phase 1
Opt-in tlsserver profile issues 45-day certificates
30 days (unchanged)
Early adopters / testing
Feb 10, 2027 Phase 2
Default classic profile shifts to 64-day certificates
Reduced to 10 days
All users not on tlsserver or shortlived
Feb 16, 2028 Phase 3
Default classic profile moves to 45-day certificates
Reduced to 7 hours
All users on default profile

Key Takeaway

The authorization reuse period matters as much as the certificate lifetime itself. It is the time window during which prior domain-control validation can be reused to issue additional certificates. Let’s Encrypt will reduce that from 30 days to just 7 hours by 2028 — making reliable ACME automation mandatory, not optional.

The Industry Baseline: 47 Days (CA/Browser Forum)

The CA/Browser Forum’s Ballot SC-081v3 introduced a phased schedule that reduces maximum public TLS certificate validity to 200 days (2026), 100 days (2027), and 47 days (2029).

Let’s Encrypt’s “45 days” is fully compatible with the industry’s “47 days” maximum — Let’s Encrypt is simply planning to reach that end state one year earlier than the CA/B Forum mandate requires.

Why Are Certificate Lifetimes Being Reduced?

Shorter lifetimes are a security and resilience play, driven by four interconnected goals:

  • Reduced blast radius for compromise: If a private key is stolen or a certificate is mis-issued, shorter validity limits how long that certificate can be abused.
  • More effective revocation ecosystem: Shorter-lived certificates reduce reliance on revocation being perfect, and Let’s Encrypt notes that shorter lifetimes make revocation technologies more efficient.
  • Less stale validation data: The CA/B changes also shrink how long domain and IP validation can be reused — down to 10 days by March 2029.
  • Push toward automation and agility: Browser and root programs are explicitly encouraging automation because it enables shorter lifecycles with fewer outages and faster security improvements.

Timeline of Certificate Lifetime Reductions

Here is the practical storyline behind the progression from 825 days to 45 days:

Maximum Validity
Era
Key Driver
825 days
Pre-2020 legacy maximum
No enforced industry cap
398 days
September 2020 onwards
Apple enforced 398-day max for certificates issued after Sep 1, 2020; non-compliant certificates cause connection failures
90 days
Let’s Encrypt norm (2014–2027)
Let’s Encrypt built the “automation-native” expectation; Chrome’s security team emphasized automation for agility and resilience
45 / 47 days
2028–2029 target
Let’s Encrypt reaches 45 days (Feb 16, 2028); CA/B Forum caps industry at 47 days (Mar 15, 2029)

Industry-Wide Impact of the 45-Day Certificate Shift

This is not a Let’s Encrypt-only change. Let’s Encrypt explicitly states it is moving “along with the rest of the industry” under CA/Browser Forum Baseline Requirements, and that all publicly trusted CAs will be making similar shifts.

How This Affects Let’s Encrypt and Other CAs

  • Renewal velocity becomes the default operating mode: By 2029, organizations effectively live in a continuous renewal cycle — especially at scale.
  • Validation reuse shrinks dramatically: Domain and IP validation reuse is scheduled to drop to 10 days by March 2029, making manual or occasional processes fragile.
  • ACME and renewal intelligence matter more: Let’s Encrypt recommends using ACME Renewal Information (ARI) so clients know when to renew, and warns that hardcoded renewal intervals such as “every 60 days” will break in a 45-day world.
  • New validation approaches are emerging: Let’s Encrypt is working on DNS-PERSIST-01 to reduce the operational burden of frequent domain validation by allowing a persistent DNS TXT record — expected in 2026.

Operational Challenges of 45-Day Certificates

45-day certificates don’t just mean “renew twice as often.” They fundamentally change failure modes:

  • Smaller buffer for errors: One missed renewal window can turn into user-facing downtime quickly.
  • More moving parts: Load balancers, CDNs, Kubernetes ingress, service meshes, API gateways, and legacy appliances may all need coordinated updates.
  • Validation friction: With authorization reuse dropping as low as 7 hours for Let’s Encrypt’s classic profile by 2028, DNS/HTTP challenge automation must be reliable — not “best effort.”
  • Inventory blind spots: Most outages happen on “forgotten” certificates — non-prod endpoints promoted to prod, old subdomains, partner-managed domains, or certificates embedded in devices and middleware.
  • Change management overhead: More frequent certificate rotation increases the chance of misconfigurations: wrong chain, incomplete chain, hostname mismatch, or deploying to only some nodes.

Because many of these failure modes happen after the certificate is issued — during propagation, reloads, edge caching, or partial rollouts — teams benefit from adding outside-in validation: checks that confirm what real clients receive in production, not just what internal logs say happened.

Why Certificate Expiration Monitoring Is Critical

Let’s Encrypt itself recommends having sufficient monitoring to alert if certificates aren’t renewed when expected, using an SSL monitoring tool. In practice, monitoring is what catches:

  • Renewal automation that silently failed;
  • Certificates expiring “off-cycle” due to reissuance;
  • Chain or issuer changes;
  • Hostname mismatches and incomplete deployments.

Without proper monitoring, SSL certificates can cause browsers to display “Your connection is not private” warnings, hurt SEO rankings overnight, and block visitors from accessing your site entirely. The consequences are immediate and measurable — and with 45-day certificates renewing roughly every 30 days, the window to catch a silent failure before it becomes a user-visible outage is significantly narrower.

🔍  How Dotcom-Monitor Keeps Your Certificates Valid

Dotcom-Monitor’s SSL Certificate Monitoring acts as an intelligent, always-on certificate checker that performs regular checks from 30+ global locations. Once you add a domain, the platform begins validating the certificate the same way real users around the world experience it — performing a full TLS handshake, not just a ping.

For each monitored domain or endpoint, the platform automatically verifies:

  • Certificate chain integrity and issuer correctness;
  • Expiration dates and days-remaining countdown;
  • SAN and hostname alignment;
  • Any potential mismatches, invalid responses, or untrusted issuers;
  • Configuration health across all monitored devices.

All results are surfaced in a real-time, centralized dashboard with intelligent sorting and filtering — so teams can spot issues before they escalate, whether managing a handful of domains or hundreds.

Automation Risks in a 45-Day World

Shorter certificate lifetimes increase the frequency of renewal events, and with that, the probability of automation failure. In a 45-day cycle, even small operational weaknesses surface faster and more often.

Why Automation Alone Will Break More Often in a 45-Day World

The most common failure points include:

  • DNS-01 records propagating slower than expected;
  • HTTP-01 challenges intercepted by CDN or WAF layers;
  • Misconfigured firewall policies blocking validation;
  • ACME rate limits triggered during retries;
  • Containers dropping certificate directories during restarts;
  • Systemd timers failing silently;
  • Load balancers never reloading the updated certificate.

Important:

These issues didn’t become new problems — they became urgent problems. When renewals run twice as often, the probability of encountering one of these conditions increases proportionally. Automation remains essential, but without external detection it operates blind to the deployment side of the lifecycle.

🔍  How Dotcom-Monitor Detects Renewal Failures

When ACME automation fails silently — a systemd timer that didn’t fire, a DNS challenge that timed out, a load balancer that never reloaded — Dotcom-Monitor catches it through continuous outside-in validation. The platform sends instant notifications the moment it detects a certificate that is approaching expiry or has already entered an invalid state, regardless of what your internal automation logs report.

Alerts are delivered through the channels your team already uses:

  • Email
  • SMS
  • Slack
  • Microsoft Teams
  • PagerDuty
  • Webhooks

Customizable alert thresholds mean you receive warnings at exactly the right time — not too early to cause alert fatigue, and not too late to prevent an outage. Every alert clearly identifies the certificate, domain, and recommended action.

The Hidden Risk: Deployment Drift After Renewal

Renewal success is not deployment success. In distributed environments, those two states frequently diverge. This divergence is called deployment drift — and it is one of the most underestimated TLS failure modes. Common causes include:

  • CDNs continuing to serve cached certificate chains after origin updates;
  • Multi-region load balancers updating in one region but not another;
  • Kubernetes pods failing to reload updated TLS secrets;
  • Reverse proxies requiring full restarts to pick up new keypairs;
  • Edge nodes lagging behind during rolling infrastructure updates.

Key Takeaway

Under a 90-day cycle, drift was an occasional incident. Under a 45-day cycle, drift becomes statistically more likely unless explicitly monitored. Shorter lifetimes don’t just increase renewal frequency — they increase propagation risk across distributed systems.

Why External Certificate Monitoring Is the Most Reliable Independent Check

Internal systems observe the renewal pipeline. External systems observe the user experience. These perspectives diverge in many cases. Internal monitoring can confirm the ACME client ran, the certificate was issued, and the file was written to disk — but it often cannot confirm that the correct certificate is being served at the edge, that every region is updated, or that the trust chain is complete.

External monitoring validates certificates the way clients do:

  • Performs a full TLS handshake;
  • Inspects chain integrity;
  • Verifies SAN and hostname alignment;
  • Detects unexpected issuer/chain shifts;
  • Confirms expiration dates in production

Key Takeaway

Most importantly, external monitoring can run from distributed geographic locations, which helps detect region-level drift and CDN edge inconsistencies that a single internal vantage point will miss. Outside-in checks are the most dependable way to validate that renewal success translated into correct production delivery.

🔍  Why Dotcom-Monitor Is the Independent Check Your Automation Stack Needs

Dotcom-Monitor checks your certificates on servers worldwide, providing accurate results for international traffic and ensuring continuous SSL monitoring regardless of where your certificates are hosted. This global reach is particularly important for websites with distributed infrastructure — CDN edges, multi-region load balancers, and Kubernetes clusters — where a certificate may be correctly renewed at the origin but not yet propagated to every edge node.

The platform supports monitoring across edge networks, load balancers, and CDNs — the exact layers where deployment drift most commonly occurs. It also supports scheduled global reports (daily, weekly, or monthly) that compile timelines, status updates, and certificate health across all monitored devices, reducing manual work and supporting cross-team visibility.

For compliance-focused organizations, Dotcom-Monitor generates exportable audit reports that include certificate details, issuer information, chain-of-trust records, and error logs — everything auditors typically require, in one place.

Building a Monitoring Strategy for Short-Lived Certificates

A 45-day certificate lifecycle requires more than a basic expiration alert. Monitoring must evolve from “remind me before it expires” to “continuously verify correct deployment.”

Start With Complete Inventory

Most outages originate from blind spots. Ensure monitoring includes all public websites and subdomains, APIs and partner-facing endpoints, CDN edges and origin servers, internal gateways exposed externally, and legacy infrastructure and appliances. Unmonitored endpoints are unmanaged risk.

1

Monitor From Multiple Global Locations

A single probe cannot detect regional drift, CDN edge inconsistencies, or ISP-specific trust chain issues. Global validation ensures chain correctness everywhere, region-to-region consistency, and edge propagation success. Dotcom-Monitor checks from 30+ global locations, making these multi-location checks repeatable and consistent on a schedule — without any manual effort after initial setup.

2

Validate More Than Expiration

Expiration is only one failure mode. Monitoring should also verify:

  • Complete trust chain and correct intermediate CA;
  • SAN/hostname accuracy;
  • Cipher and protocol compatibility;
  • Unexpected issuer changes.
3

Trigger Post-Renewal Validation

Renewal events should automatically initiate immediate production validation, multi-region certificate comparison, and chain verification checks. Drift most often appears immediately after renewal — not before expiration.

4

Use Tiered Alerting for a 45-Day Lifecycle

With compressed lifetimes, alert timing matters more. Dotcom-Monitor allows fully customizable alert thresholds, so you can configure a structured escalation model tailored to a 45-day certificate lifecycle:
20
DAYS REMAINING
Informational
10
DAYS REMAINING
Warning
5
DAYS REMAINING
Critical
0
HANDSHAKE FAILURE
Immediate
5

Final Thoughts: Monitoring & Detection in the 45-Day Era

Short-lived certificates improve security posture. They also compress operational tolerance and reduce the window for detecting configuration or deployment errors. Automation remains mandatory — but automation without verification becomes fragile at scale.

The real operational shift in the 45-day era is this:

  • Renewal is continuous;
  • Validation reuse windows are shrinking;
  • Deployment drift becomes statistically more frequent;
  • External verification becomes mandatory

Dotcom-Monitor’s SSL Certificate Monitoring is purpose-built for exactly this environment. It provides outside-in validation of chain correctness, hostname alignment, expiration status, and global deployment consistency — from 30+ locations worldwide, with real-time alerts delivered to Slack, Teams, email, SMS, and PagerDuty. Whether you manage a single domain or hundreds, the platform keeps every certificate organized, tracked, and verified automatically.

🔍  What Makes Dotcom-Monitor the Right Choice for the 45-Day Era

As TLS lifetimes shorten across the industry, detection and verification become foundational controls rather than optional safeguards. Here is what Dotcom-Monitor delivers that internal automation alone cannot:

Capability
What It Solves
30+ global monitoring locations
Detects regional drift and CDN edge inconsistencies
Full TLS handshake validation
Confirms what real users receive, not just what internal logs report
Chain & issuer verification
Catches incomplete chains, wrong intermediates, and unexpected issuer changes
Customizable expiry alert thresholds
Tiered warnings at 20, 10, 5 days — calibrated for 45-day lifecycles
Slack, Teams, PagerDuty, SMS alerts
Reaches the right person through the right channel, instantly
Automated scheduled reports
Audit-ready exports with issuer, chain, algorithm, and error details
Edge, CDN & load balancer support
Monitors the exact layers where deployment drift occurs most often
Centralized multi-domain dashboard
Single pane of glass for teams managing dozens or hundreds of certificates

FAQ: Let's Encrypt 45-Day Certificate Expiration

When will Let's Encrypt start issuing 45-day certificates?
Let's Encrypt introduces 45-day certificates in stages: an opt-in tlsserver ACME profile starts May 13, 2026, and the default classic profile reaches 45 days on February 16, 2028. Changes will be deployed to the staging environment approximately one month before each production date.
Is the new standard 45 days or 47 days?
The CA/Browser Forum's Ballot SC-081v3 caps public TLS certificates at 47 days starting March 15, 2029. Let's Encrypt plans to issue 45-day certificates earlier (by February 2028), which fits under that industry maximum. Both figures describe the same end state — Let's Encrypt simply reaches it one year ahead of the CA/B Forum deadline.
How often will certificates need to be renewed with 45-day validity?
Most teams renew at approximately two-thirds of the certificate's lifetime — meaning roughly every 30 days with 45-day certificates. Let's Encrypt explicitly warns that hardcoded renewal intervals such as "every 60 days" will fail in a 45-day world. Using ACME Renewal Information (ARI) is the recommended approach.
What happens if an SSL/TLS certificate expires?
Users see browser security warnings or hard connection failures, which blocks access and disrupts transactions. Expired certificates can also disrupt search engine crawling and uptime monitoring. With 45-day certificates, the window between a missed renewal and a user-visible outage is significantly shorter than with 90-day certificates.
Does the CA/Browser Forum reduction affect DV, OV, and EV certificates?
Yes. The CA/Browser Forum Ballot SC-081v3 schedule applies to all publicly trusted TLS certificate types — DV, OV, and EV — and also reduces how long domain and IP validation data can be reused (down to 10 days by March 2029).
What is the "authorization reuse period," and why does it matter?
The authorization reuse period is the time window during which prior domain-control validation can be reused to issue additional certificates without re-proving control. Let's Encrypt will reduce this from 30 days to just 7 hours by February 2028. This makes reliable automation of DNS and HTTP challenges mandatory — manual or infrequent validation processes will not be viable.
What is ARI (ACME Renewal Information)?
ACME Renewal Information (ARI) is a protocol extension that lets Let's Encrypt signal to ACME clients exactly when they should renew a certificate. Let's Encrypt recommends enabling ARI to ensure renewals stay on schedule as lifetimes shrink, rather than relying on hardcoded intervals.
How can Dotcom-Monitor help prevent certificate-expiration outages?
Dotcom-Monitor's SSL Certificate Monitoring performs outside-in checks of certificate validity, chain correctness, and hostname alignment from multiple global locations, with tiered alerting via email, SMS, Slack, and Teams. This helps teams detect renewal failures, deployment drift, and regional inconsistencies before users are affected.

Latest Web Performance Articles​

What is SSL Certificate Monitoring?

Prevent service interruptions and browser security warnings through automated SSL/TLS validation. Maintain certificate chains and ensure continuous uptime.

What Is Web Transaction Monitoring?

A comprehensive guide to web transaction monitoring. Learn how it works, why it matters for revenue and user experience, and how to choose the right tools to monitor critical user workflows.

Start Dotcom-Monitor for free today​

No Credit Card Required