Your Teams Direct Routing SBC Has a Deadline. Here’s What to Do Before March Ends.

Microsoft is replacing the Certificate Authority (CA) root chain it uses for Teams Direct Routing. Every SBC connected to your deployment needs its trust store updated before the end of March 2026. Miss that window, and when Microsoft starts rotating its server-side certificates in April, your SBC will fail the TLS handshake and calls will stop connecting.
The failure mode is a hard stop, not a gradual degradation, and nothing in the Teams interface points back to the certificate mismatch as the cause.
The June 2026 date you may have seen in advisories is full enforcement. March 31 is the operational deadline for SBC-side updates. This guide covers exactly what’s changing, the specific certificates you need to install, and how to verify your SBC is ready.
Why This Is Happening
This change doesn’t originate with Teams. It starts in the trust stores.
In February 2025, Google updated its Chrome Root Program Policy (v1.6), deprecating the Client Authentication Extended Key Usage (EKU) in TLS server certificates trusted by Chrome and Mozilla. Starting June 2026, certificates must use Server Authentication EKU exclusively.
Microsoft Teams uses mutual TLS (mTLS) for SIP signaling between its infrastructure and your SBC. Both sides present and validate certificates. Microsoft’s existing CA chain included the Client Authentication EKU, exactly what the browser policy targets. To stay aligned with browser trust stores, Microsoft is moving to a DigiCert-rooted chain and its own Microsoft 2017 Root CAs.
This doesn’t change anything about the Teams user experience. Voice quality, call routing, and meeting features are unaffected. What changes is the certificate chain your SBC validates when it receives a TLS handshake from Microsoft’s SIP endpoint.
The Timeline
| Date | Event |
|---|---|
| February 2026 (passed) | SBCs should already trust the new DigiCert and Microsoft 2017 Root CAs |
| End of March 2026 | Hard deadline: SBC trust stores must be updated; Microsoft provides a test SIP endpoint to validate |
| April 2026 | Microsoft begins deploying new server-side certificates on the Teams SIP interface |
| June 2026 | Full enforcement: old CA chain retired; non-updated SBCs lose connectivity |
If your SBC hasn’t been updated, you’re already past the recommended window.
After April, connections that fail due to certificate mismatch produce TLS handshake errors rather than graceful SIP responses. For organizations using Direct Routing for PSTN calls, that means calls stop connecting across your entire SBC deployment.
The 7 Root CAs You Need to Add
Microsoft’s updated requirements specify seven root CAs. All seven must be present and trusted in your SBC’s TLS configuration; each covers a different part of Microsoft’s certificate issuance infrastructure.
| Root CA Name | Thumbprint (SHA-1) |
|---|---|
| DigiCert Global Root CA | A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 |
| DigiCert Global Root G2 | DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 |
| DigiCert Global Root G3 | 7E04DE896A3E666D00E687D33FFAD93BE83D349E |
| DigiCert TLS ECC P384 Root G5 | 17F3DE5E9F0F19E98EF61F32266E20C407AE30EE |
| DigiCert TLS RSA 4096 Root G5 | A78849DC5D7C758C8CDE399856B3AAD0B2A57135 |
| Microsoft ECC Root Certificate Authority 2017 | 999A64C37FF47D9FAB95F14769891460EEC4C3C5 |
| Microsoft RSA Root Certificate Authority 2017 | 73A5E64A3BFF8316FF0EDCCC618A906E4EAE4D74 |
Two operations are involved here, and they’re distinct. What you’re updating is the list of CAs your SBC trusts when validating the certificate Microsoft presents during the mTLS handshake. Your SBC’s own certificate (the one it presents to Teams) is not changing; it still needs to be issued by a CA on Microsoft’s approved SBC certificate issuers list.
How to Verify the Update Worked
Microsoft has published a dedicated test SIP endpoint for validating TLS connectivity against the new CA chain. It accepts SIP OPTIONS only and is designed exclusively for connectivity testing; don’t route voice traffic through it.
A successful TLS handshake with the test endpoint confirms your SBC trusts certificates issued by the new chain. A handshake failure means you have missing or untrusted root CAs.
Watch for these failure indicators if the Microsoft CA change has already taken effect for your deployment:
- SIP OPTIONS not received from Microsoft: usually the first sign of a TLS handshake failure
- “Certificate validation failed” errors in the SIP trace
- Direct Routing domain deactivation in the Teams admin center (Teams reads sustained SIP OPTIONS failure as an SBC outage)
If you’re seeing any of these and your trust store hasn’t been updated, adding the seven root CAs above resolves them.
Where ProSBC Comes In
ProSBC is TelcoBridges’ software-based, carrier-grade SBC. Here’s how it maps to everything covered in this article:
- Supports SIP over TLS natively: TLS is mandatory for Teams Direct Routing and ProSBC enforces it at the NAP level
- TLS trust store updates are applied at the Network Access Point (SIP Trunk) level: import the PEM text-based content of the seven root CAs into the TLS profile assigned to your Microsoft Teams NAP, save, and apply
- PEM text-based content can be found here: DigiCert Trusted Root Authority Certificates
- SRTP for media encryption is configured as a separate layer and is unaffected by this CA root change
- Built-in call trace captures SIP signaling at the NAP level, showing TLS session establishment and SIP OPTIONS exchange
- Live Wireshark capture provides packet-level visibility into the TLS handshake, useful for pinpointing exactly which certificate step is failing
No hardware changes, no software upgrades, no re-certification with Microsoft. The update is a configuration task.

