Hey everyone! Our root CA certificate is set to expire in the first half of 2026, and I'm planning to renew it next month. However, I'm curious about any potential issues I should consider during this process. Just for some context:
- The root CA is expiring soon.
- We're using it in an Active Directory environment as an enterprise CA.
- We've got over 30 certificates that were created using this CA, and they will all expire alongside the root.
I understand the renewal process and plan to go ahead with the existing key. I know I shouldn't stress too much, but I'm still left with a few questions:
1. If I choose to renew with the existing key, will the current certificates continue to be recognized as valid by everyone in the organization until they naturally expire?
2. Are there known issues with this approach? If anyone has done this before, did you encounter any problems?
3. I'm aware that renewing with a new key pair aligns better with best practices, but doesn't that also invalidate the current certificates? Is that a fair assessment?
4. Any tips or advice you can share about this whole process? Thanks a ton!
5 Answers
Be cautious with services that depend on the old CA cert, like RADIUS setups. If any services, such as AoVPN or Wi-Fi with 802.1X authentication, are locked to that CA, they could fail after renewal.
If there are no resource or licensing hurdles, starting with a totally new root CA could save you a lot of headaches. Especially with enterprise setups. Just be aware you'll have to manage both CAs for a while, which can complicate things in AD.
While sticking with the same private key across renewals may not be the best practice, it should generally work. Just remember, every intermediate and leaf certificate should ideally not outlive the root cert. Did you issue these correctly?
Yeah, they all expire with the root. I have a bit over six months to get this all sorted.
Evaluate how many things outside your AD-integrated clients rely on the current CA. If you've had this CA for a while and it's tangled in many systems, a fresh CA might be easier to manage. Still, if you keep the old root certificate in your trusted certs, the issued certs should stay valid. Just be sure about your CRL setup too.
Technically, creating a new root CA with a fresh key doesn't automatically break existing certs. The previous certificates remain valid if they were issued before the CA expired, as long as they’re still within their validity. But misconfigurations can lead to issues during transitions between certs. You might find situations where you have to update things to recognize the new CA while the old is still present.
Thanks for the insight! I'm really leaning towards the new key pair option now.

So you're suggesting I set up a new server with the AD-CS role? And I will have two roots running at the same time? How does that play out in an Active Directory environment?