Salesforce, Salesforce Admin, Security
18 May 2026
Estimated reading time: 7 minutes
Recent Salesforce security guidance has highlighted upcoming changes to Salesforce certificate architecture that may affect organisations using mutual TLS (mTLS), certificate-based authentication, middleware platforms, or connected integration ecosystems.
At the centre of the change is Chrome’s planned deprecation of dual-use certificates from 15th June 2026, part of a broader industry shift towards stricter separation between public web trust and private authentication systems.
For many Salesforce organisations, this may never become a direct operational issue. However, environments with older integration patterns, inherited authentication models, or complex trust relationships should review their certificate usage proactively now rather than waiting for future connectivity or authentication problems to emerge unexpectedly.
This article explains:
Not every Salesforce customer will be affected directly. However, organisations operating more complex integration, authentication, or middleware environments should review certificate trust dependencies early to reduce the risk of future operational disruption. You can read Salesforce’s advisory here
Chrome’s planned deprecation of dual-use certificates is part of a wider industry move towards clearer separation between:
For organisations operating complex Salesforce certificate architecture environments which rely on:
Most organisations will not require immediate remediation work. However, Salesforce environments using older trust models or complex integration ecosystems should begin reviewing certificate dependencies proactively before June 2026.
Historically, some certificate authorities (CAs) issued certificates that could be trusted for both public-facing website encryption and private client authentication purposes. These became commonly known as “dual-use” certificates because they operated across both trust domains simultaneously.
The wider security industry is now steadily moving away from this model in favour of clearer separation between public web trust and private authentication trust. The objective is to reduce ambiguity in certificate trust chains and strengthen the integrity of authentication ecosystems over time.
In practical terms, organisations may increasingly need to separate certificates used for public-facing encryption from those used internally for machine identity, integration authentication, or mTLS communication.
| Traditional Approach | Emerging Direction |
| Public and private trust combined | Public and private trust seperated |
| Broader certificate reuse | Purpose-specific trust |
| Shared authentication assumptions | Clearer trust boundaries |
| Simpler historic architectures | More explicit identity governance |
For many Salesforce customers, this change may remain largely invisible. However, organisations with extensive integrations, enterprise middleware, or certificate-based authentication workflows should understand where these dependencies currently exist within their environments.
Google’s Chrome Root Program has steadily tightened certificate trust expectations over recent years as part of broader industry efforts to improve internet security and reduce abuse of publicly trusted certificate authorities.
From June 2026, Chrome intends to stop accepting certain certificate models that combine public TLS trust with client authentication purposes. Although this initially appears browser-specific, the implications extend further into wider enterprise authentication and integration architectures.
Modern Salesforce environments increasingly depend on interconnected trust relationships between:
Changes to certificate trust expectations can therefore have downstream operational effects that organisations may not immediately associate with browser policy updates.
This is why Salesforce has begun encouraging customers to review certificate authority dependencies and authentication models now, particularly where certificate-based authentication or mTLS is involved.
Not every Salesforce organisation will be impacted directly. In many standard CRM environments, there may be little or no operational consequence at all.
The organisations most likely to require closer review are those operating larger or more interconnected Salesforce ecosystems, particularly where integrations have evolved organically over several years.
| Area | Why It Matters |
| Middleware platforms | Integration hubs and API gateways may rely on older certificate trust assumptions |
| mTLS authentication | Certificate-based machine authentication may require clearer trust separation |
| Connected applications | Older integrations may use inherited trust relationships that are no longer ideal |
| Enterprise identity systems | SSO and identity providers may interact with evolving certificate expectations |
| Supplier integrations | External trust relationships can become difficult to fully map operationally |
For many organisations, the challenge is not that systems are insecure today. Rather, operational visibility across authentication and integration ecosystems often becomes fragmented gradually over time as environments evolve.
Infrastructure-level security changes rarely arrive as dramatic failures overnight. More often, operational friction accumulates gradually as legacy assumptions collide with newer security expectations.
This is particularly true within Salesforce environments that sit at the centre of broader operational ecosystems involving middleware services, external suppliers, authentication providers, and customer-facing platforms.
When certificate trust relationships begin failing, the symptoms are not always immediately obvious. Organisations may instead encounter:
One of the more important themes emerging across recent Salesforce security guidance is the growing expectation that organisations maintain clearer operational oversight of their authentication, integration, and trust architectures over time.
In many cases, the issue is not that systems are insecure today. Rather, trust expectations across the wider technology ecosystem are continuing to mature.
For most organisations, this is not a reason for alarm and does not require immediate large-scale remediation work.
However, it is a sensible opportunity to review how certificate-based authentication is currently being used across the wider Salesforce ecosystem.
Organisations should begin by identifying where mTLS or certificate-based authentication already exists across integrations, middleware platforms, APIs, and connected enterprise systems. Many businesses discover during this process that trust dependencies are spread across multiple suppliers, operational teams, and inherited configurations that are not centrally documented.
As part of that review, organisations should consider:
Finally, organisations operating complex enterprise integrations should ensure security, infrastructure, and integration teams are discussing these changes early. Visibility and planning now are significantly less disruptive than reactive troubleshooting later.
This change is part of a much broader industry trend towards:
Across recent Salesforce releases and platform guidance, there has been increasing emphasis on authentication hardening, connected app governance, email trust verification, operational visibility, and proactive security management.
For many organisations, the challenge is no longer simply implementing security controls. It is maintaining operational clarity as Salesforce environments become increasingly interconnected through integrations, automation, AI tooling, middleware platforms, and external services.
In that sense, the dual-use certificate change is less an isolated technical update and more another signal that enterprise trust and authentication expectations are continuing to mature.
Many of the changes introduced across recent Salesforce releases are incremental rather than dramatic, which makes them easy to overlook until they begin affecting integrations, authentication, or operational workflows.
If your organisation operates older integrations, inherited authentication flows, multiple connected applications, or evolving enterprise trust relationships, a focused operational review can often identify issues early before they become disruptive.
Cognition24 works with organisations to review Salesforce environments, assess operational risk, and help modernise security, identity, and integration architecture without unnecessary complexity or rework.
If you would like a pragmatic second opinion on your current setup, get in touch.
Alternatively, if you would prefer to start with a lighter-touch assessment, you can complete our free Salesforce Security Health Check questionnaire to receive an immediate operational overview of your current security posture and areas worth reviewing next.
Both approaches are designed to provide practical, operational insight rather than generic security scoring.
Dual-use certificates are certificates that historically combined public website encryption trust with private client authentication purposes. Security standards are increasingly moving towards clearer separation between these trust models.
Chrome is tightening certificate trust expectations as part of wider industry efforts to improve internet security and strengthen authentication trust boundaries.
Potentially, yes. Organisations using certificate-based authentication, mTLS, middleware platforms, or older integration architectures should review their certificate trust dependencies proactively.
Most organisations will not require urgent remediation work. However, reviewing authentication models and certificate trust dependencies early may reduce future operational disruption.
Organisations should begin by identifying where certificate-based authentication or mTLS is currently used across integrations, APIs, middleware platforms, and connected enterprise systems.