Contents

Docs

General
Provisioning
Work profile
Fully managed
App management
FAQ

Change log

Share this page

What is the key attestation root certificate change in 2026?

What is the key attestation root certificate change in 2026?

#

Google has transitioned the root certificate used in Android hardware key attestation chains. This affects any organisation or service that validates attestation certificates from Android devices.

Timeline:

  • February 2026: New root certificate introduced alongside the existing root
  • April 10, 2026: RKP-enabled devices (Remote Key Provisioning) now exclusively use the new root certificate. From this date, all attestation chains from RKP-enabled devices are rooted in the new ECDSA P-384 key

Who is affected?

Any system that validates Android key attestation certificates needs to update its trust store to include the new root. This includes:

  • EMM platforms performing device integrity checks via attestation
  • Zero-trust access solutions using hardware-backed key attestation
  • Solutions that verify device attestation as part of compliance
  • Identity providers using Device Trust signals alongside attestation

What should I do?

  1. Check whether your attestation verification system hardcodes the existing root certificate
  2. Ensure the new root certificate is present in your trust store. The April 10 cutover has now passed and chains from RKP-enabled devices will fail validation against trust stores that still only contain the old root
  3. Test attestation validation against both roots, since factory-keyed devices continue to chain to the old root
  4. If you rely on a commercial EMM or identity provider, confirm with your vendor that they have updated their systems

The new root certificate is published in Google's key attestation documentation.

Any attestation verification system that did not add the new root before April 10, 2026 will now reject certificates from RKP-enabled devices, which includes most modern Android devices. Both the old and new root certificates are published at https://android.googleapis.com/attestation/root. Older devices with factory-provisioned keys that do not support key rotation will continue using the previous root indefinitely, so trust stores must retain both roots.

mail Reply by email | edit_note Edit this page | code_blocks Code

Docs

General
Provisioning
Work profile
Fully managed
App management
FAQ
Ask MIKA
MIKA Mobile Intelligence & Knowledge Assistant