<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Public certs removing client authentication breaking Expressway in Collaboration Applications</title>
    <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5341942#M51252</link>
    <description>&lt;P&gt;Thanks, Roger.&amp;nbsp; &amp;nbsp;I just opened a case with Sectigo, and I'm crossing my fingers that they don't push back too hard on it.&lt;/P&gt;
&lt;P&gt;When will a solution be available on the expressway side?&amp;nbsp; &amp;nbsp;Any idea what a solution would look like?&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 24 Oct 2025 13:47:01 GMT</pubDate>
    <dc:creator>mhurley131</dc:creator>
    <dc:date>2025-10-24T13:47:01Z</dc:date>
    <item>
      <title>Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5341917#M51250</link>
      <description>&lt;P&gt;I just received my first publicly signed certificate that does not include the client authentication key usage.&amp;nbsp; &amp;nbsp; Apparently this is an industry change happening:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.sectigo.com/resource-library/tls-client-authentication-public-ca-end-2026#:~:text=Sectigo%20announced%20that%20starting%20September,no%20exceptions%20will%20be%20granted" target="_blank" rel="noopener"&gt;https://www.sectigo.com/resource-library/tls-client-authentication-public-ca-end-2026#:~:text=Sectigo%20announced%20that%20starting%20September,no%20exceptions%20will%20be%20granted&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Expressway requires this attribute for the mutual authentication between C &amp;amp; E, and will not accept the certificate.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mhurley131_0-1761307327517.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/254171i46C85DA02F041791/image-size/medium?v=v2&amp;amp;px=400" role="button" title="mhurley131_0-1761307327517.png" alt="mhurley131_0-1761307327517.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If we use a certificate signed by a private certificate, non-IT controlled devices will get a warning and/or fail when trying to use MRA.&amp;nbsp; &amp;nbsp;Also, my understanding is that physical phones have a trust list which can not be added to, so they will stop working.&lt;/P&gt;
&lt;P&gt;Is Cisco aware of this change and is there a recommended path forward?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2025 12:06:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5341917#M51250</guid>
      <dc:creator>mhurley131</dc:creator>
      <dc:date>2025-10-24T12:06:35Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5341930#M51251</link>
      <description>&lt;P&gt;Cisco is aware of this. Until May 2026 all the major public CA's should have the option to include the client EKU. This is from the FAQ on Sectigo.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 593px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/254177i1D82F4F8D32F5186/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Found here&amp;nbsp;&lt;A href="https://www.sectigo.com/faq-client-authentication-eku-deprecation" target="_blank" rel="noopener"&gt;Deprecation of Client Authentication EKU from Sectigo SSL/TLS Certificates&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2025 12:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5341930#M51251</guid>
      <dc:creator>Roger Kallberg</dc:creator>
      <dc:date>2025-10-24T12:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5341942#M51252</link>
      <description>&lt;P&gt;Thanks, Roger.&amp;nbsp; &amp;nbsp;I just opened a case with Sectigo, and I'm crossing my fingers that they don't push back too hard on it.&lt;/P&gt;
&lt;P&gt;When will a solution be available on the expressway side?&amp;nbsp; &amp;nbsp;Any idea what a solution would look like?&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2025 13:47:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5341942#M51252</guid>
      <dc:creator>mhurley131</dc:creator>
      <dc:date>2025-10-24T13:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5341964#M51253</link>
      <description>&lt;P&gt;Sorry, but no idea on timeline or any details on what this will entail.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2025 15:28:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5341964#M51253</guid>
      <dc:creator>Roger Kallberg</dc:creator>
      <dc:date>2025-10-24T15:28:09Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5342015#M51254</link>
      <description>&lt;P&gt;Whelp, Sectigo isn't budging.&amp;nbsp; &amp;nbsp;Their response was:&lt;/P&gt;
&lt;P&gt;"We can confirm that SSL/TLS certificates issued or renewed through Sectigo no longer include the Client Authentication EKU, as per their recent deprecation announcement. This change does affect current and future certificate orders, and unfortunately, we are unable to issue SSL certificates with the Client Authentication EKU."&lt;/P&gt;
&lt;P&gt;I am going to open a TAC case to have the issue tracked.&amp;nbsp; &amp;nbsp;Any other recommendations people have on a resolution would be appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2025 20:09:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5342015#M51254</guid>
      <dc:creator>mhurley131</dc:creator>
      <dc:date>2025-10-24T20:09:19Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5342127#M51255</link>
      <description>&lt;P&gt;That suprisingly bad. One might wonder then why they have that kind of wording in their FAQ as that gives the impression that it would be possible to get it included up until the hard stop stated to be May next year.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Oct 2025 06:00:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5342127#M51255</guid>
      <dc:creator>Roger Kallberg</dc:creator>
      <dc:date>2025-10-25T06:00:22Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5342129#M51256</link>
      <description>&lt;P&gt;Yeah this actually happened to me too. When the public certs stopped using client authentication, Expressway started rejecting connections. I fixed it by reissuing the certs with client auth enabled again after that everything synced fine. Might be worth checking if your cert chain still has that flag included.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Oct 2025 06:23:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5342129#M51256</guid>
      <dc:creator>Chloeharper</dc:creator>
      <dc:date>2025-10-25T06:23:31Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5342900#M51257</link>
      <description>&lt;P&gt;You can monitor:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwr73373" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwr73373&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 17:47:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5342900#M51257</guid>
      <dc:creator>Alexis Amaro</dc:creator>
      <dc:date>2025-10-28T17:47:04Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5343984#M51263</link>
      <description>&lt;P&gt;It's seems we must wait for expressway version 15.3.2 to this issue been fixing by Cisco..&lt;/P&gt;&lt;P&gt;See this link &amp;gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCwr73373?rfs=qvlogin" target="_blank" rel="noopener"&gt;https://bst.cisco.com/bugsearch/bug/CSCwr73373?rfs=qvlogin&lt;/A&gt;&lt;/P&gt;&lt;P&gt;At the end of it, this text is written:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"..Cisco currently working on code enhancement track by this CDETS (target as X15.3.2).."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Also, this link suggests manually uploading certificate files via winscp, but that doesn't solve the problem with MRA services and phones... because right now this mode requires EKU client authentication mandatory..&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Nov 2025 06:04:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5343984#M51263</guid>
      <dc:creator>Mohammadreza Hadi</dc:creator>
      <dc:date>2025-11-03T06:04:52Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5344190#M51264</link>
      <description>&lt;P&gt;Even though Sectigo's published dates say they are removing it by default starting this month, with a hard stop date of May 2026, they are not making exceptions when requested.&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have had a support case open for over a week with escalations, and the most recent response reiterated that they will not add EKU upon request.&amp;nbsp; &amp;nbsp;Their recommendation is: "We recommend taking proactive steps&amp;nbsp;and contacting Cisco support for guidance"&lt;/P&gt;
&lt;P&gt;My open TAC case doesn't have workable solution other than trying to escalate with Sectigo.&amp;nbsp; &amp;nbsp;They did note that a Field Notice should be released very soon about this issue.&lt;/P&gt;
&lt;P&gt;Has anyone found a Public CA that will still issue a cert with EKU?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Nov 2025 21:41:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5344190#M51264</guid>
      <dc:creator>mhurley131</dc:creator>
      <dc:date>2025-11-03T21:41:57Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5344213#M51265</link>
      <description>&lt;P style="-qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;I believe all Public CAs are following the same procedures. With DigiCert, it may be possible to go through the account manager.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Nov 2025 23:28:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5344213#M51265</guid>
      <dc:creator>Nithin Eluvathingal</dc:creator>
      <dc:date>2025-11-03T23:28:01Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5344271#M51266</link>
      <description>&lt;P&gt;The field note that your reference is very likely the bug note that two people have already mentioned in responses. We also have a support case open with Sectigo, but not for issues related to MRA/Expressway, but a service provider SIP trunk that uses EKU. Will be interesting to see what response we get. TBC&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 06:27:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5344271#M51266</guid>
      <dc:creator>Roger Kallberg</dc:creator>
      <dc:date>2025-11-04T06:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5344524#M51267</link>
      <description>&lt;P&gt;I have a customer running into the same issue with Sectigo certs.&amp;nbsp; If someone find a way to get Sectigo to issue them certs with the EKU or finds another CA who will provide certificates that include it, please post your findings here.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;Until Cisco puts out a version of Expressway that doesn't require the field for MRA functionality, there are going to be a lot of Cisco customers with broken systems.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 23:08:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5344524#M51267</guid>
      <dc:creator>krcollab</dc:creator>
      <dc:date>2025-11-04T23:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5344577#M51268</link>
      <description>&lt;P style="-qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;If I understood correctly, Cisco will take time to adhere to the new changes in the certs, and they are asking us to talk to the CA provider to provide the certs with Client EKU. &lt;BR /&gt;One suggestion was to renew the certs in March 2026 so that we get a cert for another year.&lt;BR /&gt;If Sectigo doesn't support this, we should talk to other providers like DigiCert, GoDaddy, etc. We are in the process of renewing the certs and have requested GoDaddy to include the Client EKU and are waiting for the new cert.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2025 05:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5344577#M51268</guid>
      <dc:creator>Nithin Eluvathingal</dc:creator>
      <dc:date>2025-11-05T05:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5345022#M51269</link>
      <description>&lt;P&gt;We face the same Problem and now try to buy from DigiCert because Sectigo is not willing to help.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 14:05:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5345022#M51269</guid>
      <dc:creator>Helkmann</dc:creator>
      <dc:date>2025-11-06T14:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5345023#M51270</link>
      <description>&lt;P&gt;FYI 2 days ago I tried to get a new certificate with Gandi (which relies on Digicert or Sectigo). In both case I get only a certificate with "TLS Server authentication" EKU. From what I see with Gandi you don't have the possibily to request "TLS client authentication" EKU.&lt;BR /&gt;&lt;BR /&gt;According to Digicert KB it is still possible to request a certificate with "TLS client authentication" EKU:&amp;nbsp;&lt;A href="https://knowledge.digicert.com/alerts/sunsetting-client-authentication-eku-from-digicert-public-tls-certificates#october" target="_blank" rel="noopener"&gt;https://knowledge.digicert.com/alerts/sunsetting-client-authentication-eku-from-digicert-public-tls-certificates#october&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 790px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/254797i7CFDCDAAFB8806B0/image-dimensions/790x228?v=v2" width="790" height="228" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 14:13:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5345023#M51270</guid>
      <dc:creator>samuel.gay</dc:creator>
      <dc:date>2025-11-06T14:13:42Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5345165#M51271</link>
      <description>&lt;P&gt;Checking back to see if anyone has successfully received a certificate from a CA with the client EKU.&amp;nbsp; I know many people were trying other providers but I have yet to hear of anyone actually receiving a cert.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 22:01:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5345165#M51271</guid>
      <dc:creator>krcollab</dc:creator>
      <dc:date>2025-11-06T22:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5345896#M51282</link>
      <description>&lt;P&gt;Did you try Digicert and did they provide you with a cert in the end that had the EKU?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2025 16:41:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5345896#M51282</guid>
      <dc:creator>krcollab</dc:creator>
      <dc:date>2025-11-10T16:41:35Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5346038#M51288</link>
      <description>&lt;P&gt;I guess it's time for ExpressWay decomm.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 08:59:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5346038#M51288</guid>
      <dc:creator>Manual404</dc:creator>
      <dc:date>2025-11-11T08:59:15Z</dc:date>
    </item>
    <item>
      <title>Re: Public certs removing client authentication breaking Expressway</title>
      <link>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5346084#M51289</link>
      <description>&lt;P&gt;There will be an update of the operating system in Expressway that handles certificates not having the EKU. In this thread it’s been referred to two times.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 12:18:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/public-certs-removing-client-authentication-breaking-expressway/m-p/5346084#M51289</guid>
      <dc:creator>Roger Kallberg</dc:creator>
      <dc:date>2025-11-11T12:18:46Z</dc:date>
    </item>
  </channel>
</rss>

