CA/Browser Forum
Home » Resources » Browser/OS Information

Browser/OS Information

Root Store OwnerPrimary LinkOther Links
Adobehttp://www.adobe.com/security/approved-trust-list.htm
MozillaOverview of All CA-Related Mozilla DocumentationMozilla’s CA Certificate Policy, How To Apply
MicrosoftMicrosoft Root ProgramRoot Program Updates
Googlehttps://g.co/chrome/root-policy
Opera*
Applehttps://www.apple.com/certificateauthority/ca_program.htmlhttps://support.apple.com/kb/HT5012http://support.apple.com/kb/HT6005
Oraclehttps://www.oracle.com/technetwork/java/javase/javasecarootcertsprogram-1876540.html

* Opera Software had a root store program until fall 2013. Opera 14+ will use the root store provided by the OS and the list of EV-enabled roots maintained by Google. Opera < 12 use Opera’s online root store, hereafter based on NSS by Mozilla. To get certificates accepted by Opera, apply to the above-mentioned root store programs for the relevant OS. (Based on visit to http://www.opera.com/docs/ca/)

Roots in NSS are listed here – https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/included/ and here: https://docs.google.com/spreadsheet/pub?key=0Ah-tHXMAwqU3dGx0cGFObG9QM192NFM4UWNBMlBaekE&single=true&gid=1&output=html

Latest releases
Server Certificate Requirements
SC095v3: Clean-up 2025 - Apr 2, 2026

Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.14 - Ballot SMC016 - May 5, 2026

This ballot maintains consistency between the S/MIME Baseline Requirements and the TLS Baseline Requirements with changes introduced by Ballots SC096 and SC097. Specifically, this ballot: Creates a carve-out of the logging requirements for DNSSEC specifically, stating these are not in scope. For audit purposes, change management logging is able to confirm if the appropriate controls are in effect or not. Sunsets all remaining use of SHA-1 signatures in Certificates and CRLs. It is noted that most uses of SHA-1 signatures are already deprecated by SC097. With this ballot, all unexpired Subordinate CA Certificates issuing S/MIME containing the SHA-1 signature algorithm must be revoked. This proposal does not prohibit the use of SHA-1 to generate issuerKeyHash or issuerNameHash values as currently required by RFC 5019. Includes minor formatting corrections.

Network and Certificate System Security Requirements
Version 2.0.5 (Ballot NS-008) - Jul 9, 2025

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).