Published on
April 15, 2026
Microsoft Active Directory Certificate Services still matters. Microsoft defines ADCS as a Windows Server role for issuing and managing PKI certificates used in secure communication and authentication, and that is exactly why it remains deeply embedded in enterprise infrastructure.
For many organisations, ADCS is not a historical footnote; it is the trust anchor behind internal TLS, user and device authentication, Wi-Fi, VPN, and other established Microsoft-centric workflows. The mistake is not keeping ADCS. The mistake is expecting ADCS, by itself, to solve a problem that has outgrown certificate issuance.
That distinction matters because the centre of gravity in enterprise PKI has shifted. The hard part is no longer just issuing certificates. It is discovering them, governing them, renewing them on time, proving policy compliance, understanding ownership, and extending trust operations across Windows, Linux, cloud workloads, APIs, containers, network devices, and managed endpoints. In other words, enterprises no longer need only a certificate authority. They need a certificate operating model. NCSC’s guidance makes that clear in the way it frames private PKI: high availability, robust registration, authenticated and authorised requests, short certificate lifetimes, automated renewal, monitoring, revocation, and planning for new cryptographic algorithms are all presented as core design principles, not optional extras.
That is why the more useful question in 2026 is not “Should we replace ADCS?” It is “What has to sit above ADCS so it can support modern use cases?” The answer, increasingly, is a Certificate Lifecycle Manager: not as a cosmetic add-on, but as the operational layer that turns a CA into a governable trust service. That is an inference from where PKI requirements have moved: the issuing engine remains important, but more of the risk now sits in lifecycle operations around it.
ADCS was built for issuance. Modern PKI is about operations.
Microsoft’s own documentation is revealing here. ADCS is about certificate issuance and management as a Windows Server role. NDES extends that by acting as a registration authority so routers and other network devices without domain credentials can obtain certificates over SCEP. That is useful, and it shows Microsoft has long recognised the need to reach beyond classic domain-joined systems. But it also highlights the boundary: these services are primarily about enabling enrolment and issuance paths. They are not, by themselves, a full answer to estate-wide discovery, lifecycle orchestration, cross-platform governance, or machine-identity visibility.
That boundary used to be easier to ignore. In a slower, more centralised environment, human process could compensate for missing lifecycle controls. Teams could keep local spreadsheets, rely on a few specialists, and treat renewal as an occasional administrative event. That model is now breaking down. In the public Web PKI, the CA/Browser Forum is already reducing maximum subscriber certificate validity to 200 days on March 15, 2026, 100 days on March 15, 2027, and 47 days on March 15, 2029. Even where those specific rules do not directly govern internal issuance, they signal the market’s direction of travel: shorter lifecycles, more frequent renewals, and less tolerance for manual certificate operations.
Ready to secure your PKI infrastructure?
Discover how Evertrust can help you manage your certificates efficiently and securely.
At the same time, post-quantum planning is turning certificate governance into a strategic issue rather than a purely operational one. NIST finalised its first principal post-quantum standards in August 2024, and the UK NCSC now says organisations should, by 2028, define migration goals, carry out full discovery of services and infrastructure that depend on cryptography, and build an initial migration plan; by 2031, execute early high-priority migration work; and by 2035, complete migration. That timeline matters because it makes one thing unavoidably clear: if you cannot see your certificates and cryptographic dependencies, you cannot realistically plan for algorithm change.
What a Certificate Lifecycle Manager adds above ADCS
The first thing a lifecycle layer adds is visibility. ADCS can tell you what it has issued. That is not the same as knowing what is actually deployed, still trusted, still used, duplicated, forgotten, or sitting outside the clean line of CA records. A CLM extends ADCS by building the operational inventory that the CA alone does not provide: discovery, ownership mapping, expiry visibility, and the ability to see trust as it exists in the environment rather than only in the issuing console. NCSC’s PQC guidance is a strong external validation of that need, because it starts the migration journey with discovery rather than with algorithms. That is not accidental. Discovery is now a prerequisite for trust governance.
The second thing it adds is automation. RFC 8555 defines ACME as a protocol that automates verification, certificate issuance, and related functions such as revocation. NCSC’s private PKI principles separately call for frictionless and automated certificate renewal, without impacting security. Taken together, those sources tell a consistent story: certificate operations are moving from ticket-driven administration toward policy-driven automation. A CLM extends ADCS by supplying that orchestration layer across renewal, alerts, approvals, and protocol diversity, so that certificate management becomes a repeatable process instead of a recurring fire drill.
Want to learn more about certificate management?
Discover our resources on PKI best practices and implementation strategies.
The third thing it adds is governance. NCSC emphasises robust registration, authenticated and authorised requests to certificate authorities, central monitoring, revocation, and strong cryptography planning. CISA and NSA, meanwhile, explicitly listed insecure Active Directory Certificate Services among the top misconfigurations their assessment teams regularly find. The lesson is not that ADCS is uniquely flawed. The lesson is that certificate infrastructure becomes risky when registration, permissions, visibility, and policy are not managed as an integrated discipline. A CLM extends ADCS by centralising the controls around the CA: who can request what, under which policy, with which approval path, with what monitoring, and with what evidence for audit or incident response.
The fourth thing it adds is architectural breathing room. Most enterprises do not want a binary choice between “leave ADCS alone” and “rip it out.” Nor should they. The more pragmatic model is to preserve ADCS where it still adds value, especially in Microsoft-native workflows, while introducing a lifecycle layer that abstracts certificate operations across heterogeneous environments. That approach acknowledges a truth that many PKI programmes miss: the CA may not be the immediate bottleneck. The bottleneck is often everything around it. A CLM gives organisations a way to modernise trust operations without forcing a disruptive trust-anchor replacement on day one. That is an inference, but it follows directly from the gap between what ADCS is designed to do and what modern PKI teams are now expected to operate.
The strategic takeaway
The future of enterprise PKI is not just better certificate authorities. It is better certificate operations.
That is why the ADCS conversation needs to mature. ADCS still has a legitimate role as an internal CA. What it no longer has, on its own, is enough operational reach to govern machine identity at modern enterprise scale. Shorter lifecycles, more distributed infrastructure, protocol diversity, higher resilience expectations, and post-quantum preparation are all pushing organisations toward the same conclusion: issuance is necessary, but it is no longer sufficient.
So the real question is not whether ADCS should stay or go. The real question is what must sit above it so trust can be run as a modern operational discipline. For many organisations, that missing layer is certificate lifecycle management: the visibility, automation, and governance plane that lets ADCS continue doing what it does well, while extending it into the realities of hybrid infrastructure, machine identity growth, and crypto-agility. That is the stronger, more credible modernisation story, because it starts from how enterprises actually evolve their trust infrastructure rather than how vendors wish they would.