10-24-2025 05:06 AM
I just received my first publicly signed certificate that does not include the client authentication key usage. Apparently this is an industry change happening:
Expressway requires this attribute for the mutual authentication between C & E, and will not accept the certificate.
If we use a certificate signed by a private certificate, non-IT controlled devices will get a warning and/or fail when trying to use MRA. Also, my understanding is that physical phones have a trust list which can not be added to, so they will stop working.
Is Cisco aware of this change and is there a recommended path forward?
10-24-2025 05:30 AM
Cisco is aware of this. Until May 2026 all the major public CA's should have the option to include the client EKU. This is from the FAQ on Sectigo.
Found here Deprecation of Client Authentication EKU from Sectigo SSL/TLS Certificates
10-24-2025 06:47 AM
Thanks, Roger. I just opened a case with Sectigo, and I'm crossing my fingers that they don't push back too hard on it.
When will a solution be available on the expressway side? Any idea what a solution would look like?
10-24-2025 08:28 AM
Sorry, but no idea on timeline or any details on what this will entail.
10-28-2025 10:47 AM
10-24-2025 01:09 PM
Whelp, Sectigo isn't budging. Their response was:
"We can confirm that SSL/TLS certificates issued or renewed through Sectigo no longer include the Client Authentication EKU, as per their recent deprecation announcement. This change does affect current and future certificate orders, and unfortunately, we are unable to issue SSL certificates with the Client Authentication EKU."
I am going to open a TAC case to have the issue tracked. Any other recommendations people have on a resolution would be appreciated.
10-24-2025 11:00 PM
That suprisingly bad. One might wonder then why they have that kind of wording in their FAQ as that gives the impression that it would be possible to get it included up until the hard stop stated to be May next year.
10-24-2025 11:23 PM
Yeah this actually happened to me too. When the public certs stopped using client authentication, Expressway started rejecting connections. I fixed it by reissuing the certs with client auth enabled again after that everything synced fine. Might be worth checking if your cert chain still has that flag included.
 
					
				
				
			
		
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide