CA/Browser Forum

Server Certificate Working Group Ballots

Ballots by Status

Voting Period

There are no ballots with the status "Voting Period" in the Server Certificate Working Group

Review Period

  • SC79v2: Allow more than one Certificate Policy in a Cross-Certified Subordinate CA Certificate
  • SC76v2: Clarify and Improve OCSP Requirements

Discussion Period

There are no ballots with the status "Discussion Period" in the Server Certificate Working Group

Draft / Under Consideration

There are no ballots with the status "New" in the Server Certificate Working Group
There are no ballots with the status "Pre-Ballot" in the Server Certificate Working Group

Passed

  • SC78: Subject organizationName alignment for DBA / Assumed Name
  • SC77: Update WebTrust Audit name in Section 8.4 and References
  • SC75: Pre-sign linting
  • SC73: Compromised and Weak Keys
  • SC68: Allow VATEL and VATXI for organizationIdentifier
  • SC67: Require Multi-Perspective Issuance Corroboration
  • SC69: Clarify router and firewall logging requirements
  • SC70: Clarify the use of DTPs for Domain Control Validation
  • SC65: Convert EVGs into RFC3647 format
  • SC-63: Make OCSP optional, require CRLs and incentivize automation
  • SC-64: Temporary Moratorium on New Certificate Consumer Memberships
  • SC-66: Fall 2023 clean-up v4
  • SC62: Certificate profiles update
  • SC61: New CRL Entries must have a Revocation Reason Code
  • SC58: require distributionPoint in sharded CRLs
  • SC-56: 2022 Cleanup

Cancelled

  • SC76: Clarify and Improve OCSP Requirements

Failed

  • SC74: Clarify CP/CPS structure according to RFC 3647
  • SC-59: Weak key guidance
  • SC60: Membership of ZT Browser

Information about Ballots

Latest releases
Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.6 - Ballot SMC08 - Aug 29, 2024

This ballot sets a date by which issuance of certificates following the Legacy generation profiles must cease. It also includes the following minor updates: Pins the domain validation procedures to v 2.0.5 of the TLS Baseline Requirements while the ballot activity for multi-perspective validation is concluded, and the SMCWG determines its corresponding course of action; Updates the reference for SmtpUTF8Mailbox from RFC 8398 to RFC 9598; and Small text corrections in the Reference section

Network and Certificate System Security Requirements
v2.0 - Ballot NS-003 - Jun 26, 2024

Ballot NS-003: Restructure the NCSSRs in https://github.com/cabforum/netsec/pull/35

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).