DigiCert Secures the Web With TLS Certificates. The Certificate Model Has Structural Limits.
by Nick Clark | Published March 28, 2026
DigiCert operates one of the world's largest commercial certificate authorities, anchoring TLS, code-signing, document-signing, and IoT device identity for a substantial fraction of the public internet. The TrustCore CA backbone, Trust Lifecycle Manager, IoT Trust Manager, and Document Trust product lines each issue X.509 credentials whose validity rests on a hierarchical chain of signatures rooted in CA key material that browsers and operating systems are pre-configured to trust. The model is mature, audited under WebTrust, governed by the CA/Browser Forum Baseline Requirements, and has scaled to billions of active certificates. It is also approaching a structural inflection point. Every link in the WebPKI chain depends on stored asymmetric key material whose security assumptions are being eroded by post-quantum cryptanalytic progress, and whose authority remains concentrated in roots that any browser-trusted CA can use to vouch for any domain. The structural gap this article describes is between certificate-chain identity — a credential issued by a hierarchical authority and bound to a stored private key — and a keyless identity model in which trust derives from post-quantum-by-construction behavioral continuity rather than from possession of long-lived secret material.
Vendor and product reality
DigiCert's footprint spans the full breadth of public-trust certificate issuance. TrustCore CA provides the root and intermediate signing infrastructure; Trust Lifecycle Manager handles enterprise certificate discovery, issuance, renewal, and revocation across hybrid environments; IoT Trust Manager scales device identity issuance to manufacturing-line throughput; Document Trust supports qualified electronic signatures aligned with eIDAS and similar regimes. The catalog includes domain-validated, organization-validated, and extended-validation TLS, plus code-signing certificates that gate Windows kernel modules, Authenticode binaries, and mobile application distribution.
The operational discipline behind these products is genuine. DigiCert publishes Certification Practice Statements, participates in Certificate Transparency logs, undergoes annual WebTrust audits, and has invested visibly in post-quantum readiness research, including hybrid certificate experimentation with NIST-selected lattice schemes. The vendor is not a laggard; it is among the most technically credible CAs in the market. The gap described below is not a critique of DigiCert's execution. It is a structural property of the certificate-chain model that DigiCert and every other public CA implements.
The architectural gap
Certificate-chain identity concentrates authority at the roots. A browser trust store contains hundreds of root CAs, and each one is structurally entitled to vouch for any domain on the public internet. A misissued certificate from any trusted root will validate cleanly for any relying party until that certificate is detected and revoked. Certificate Transparency logs and CT-enforcement policies provide post-hoc detection, not prevention; the trust model permits the misissuance and relies on monitoring to catch it. Concentration is intrinsic to the design.
The dependency on stored key material is the second structural property. Every certificate is a binding between a name and a public key whose corresponding private key must be held somewhere — in an HSM, in a TPM, in a server filesystem, in a code-signing token. The security of the identity reduces to the security of the storage. Key compromise compromises identity. Hardware security modules raise the cost of extraction; they do not change the model. The identity is the key, and the key is a secret that must be defended.
Post-quantum migration sharpens both problems. The CA/Browser Forum and NIST timelines anticipate a multi-year transition during which RSA and ECDSA chains coexist with lattice-based or hash-based alternatives. Hybrid certificates double the certificate size, complicate path validation, and require every relying party — every browser, every embedded TLS stack, every IoT firmware image — to handle dual-algorithm chains correctly. Long-lived roots whose validity extends beyond cryptographically-relevant-quantum-computer estimates inherit forward-secrecy risk against captured ciphertext. Code-signing certificates whose signed artifacts persist for decades are particularly exposed: a signature trusted today must remain trustworthy after the underlying primitive is broken. Short-lived end-entity certificates reduce some operational windows but increase issuance volume and the surface area of the issuance protocol itself. The fundamental model — identity as a credential issued by a hierarchical authority and bound to a stored secret — does not change.
What the keyless-identity primitive provides
The Adaptive Query keyless-identity primitive is post-quantum by construction. It does not derive identity from possession of a long-lived asymmetric private key, and therefore it does not inherit Shor-class vulnerabilities or the migration cliff associated with rotating root CA key material. The identity of a server, a device, or a signing endpoint is established through accumulated behavioral continuity — a trust slope computed over the entity's own interaction history — rather than through a chain of signatures terminating at a hierarchical root.
Three properties follow. First, there is no root whose compromise undermines the identity layer; there is no hierarchical authority to compromise. Second, there is no stored credential whose extraction grants impersonation; an attacker who copies the entity's storage cannot reproduce the entity's accumulated behavioral signature. Third, there is no migration cliff tied to a specific cryptographic primitive; the construction does not depend on the hardness assumptions that quantum cryptanalysis threatens.
The primitive is not a replacement for transport-layer encryption, which remains a separate concern handled by post-quantum key-encapsulation mechanisms at the TLS layer. It is a replacement for the identity-binding function that X.509 certificates currently serve.
Composition pathway
A migration from certificate-chain identity to keyless identity does not require a flag-day cutover. The composition pathway is hybrid and additive. During transition, an endpoint can present both an X.509 certificate chain validating against existing trust stores and a keyless-identity attestation validating against accumulated behavioral continuity. Relying parties that understand only the certificate chain continue to function unchanged; relying parties that understand the keyless attestation gain the post-quantum and authority-decentralization properties without losing backward compatibility.
For DigiCert specifically, the integration surface aligns with existing product boundaries. Trust Lifecycle Manager already orchestrates certificate issuance and renewal across heterogeneous endpoints; the same orchestration layer can manage keyless-identity enrollment and continuity attestation alongside certificate lifecycle. IoT Trust Manager already scales device-identity issuance to manufacturing throughput; the same provisioning pipeline can seed initial behavioral state for keyless identity at the same point in the device lifecycle where the initial certificate is injected. Document Trust already binds signatures to long-lived artifacts; pairing the certificate signature with a keyless continuity proof extends signature trustworthiness across the post-quantum boundary.
The CA itself does not disappear in the hybrid phase. It becomes one of two parallel trust paths, the legacy path, while the keyless path accumulates the operational history that will eventually carry identity on its own. Endpoints whose keyless continuity record is short fall back to the certificate path; endpoints whose continuity record is established carry identity on the keyless path with the certificate as a redundant secondary anchor. The transition is governed by accumulated operational history rather than by a calendar-driven cutover, which matters in environments — industrial IoT, embedded medical, long-lived signed firmware — where calendar-driven primitive rotation is operationally infeasible.
Code-signing and document-signing flows compose particularly cleanly. A signature pairing today's certificate-chain signature with a keyless continuity proof remains verifiable by today's relying parties through the certificate path, and remains verifiable by future relying parties through the keyless path even after the underlying asymmetric primitive is broken. The pairing extends signature trustworthiness across the post-quantum boundary without requiring re-signing of historical artifacts, which for a code-signing CA is the difference between a tractable migration and a non-tractable one.
Commercial and licensing posture
Adoption sequencing favors CAs whose customer base spans both the WebPKI horizon — where browser trust stores and CA/Browser Forum policy set the migration cadence — and the private-PKI horizon, where enterprise and IoT operators set their own cadence under their own root authorities. DigiCert's product line spans both. The keyless-identity primitive is available for licensing into CA and PKI product lines under terms that preserve the licensee's existing customer relationships and revenue model. The intended commercial shape is an enabling layer that DigiCert and similar vendors integrate behind their existing product surfaces — Trust Lifecycle Manager, IoT Trust Manager, Document Trust — rather than a competing identity service sold directly to end customers. License terms accommodate hybrid deployments during the multi-year post-quantum transition window and contemplate the eventual rebalancing of revenue from per-certificate issuance toward continuity-attestation services as the keyless path matures. Adaptive Query's interest is in the primitive being adopted broadly enough to matter; the commercial structure is designed to make adoption straightforward for incumbent CAs whose customer base and operational scale are precisely what the post-quantum identity transition will require.