10-24-2025 05:06 AM
I just received my first publicly signed certificate that does not include the client authentication key usage. Apparently this is an industry change happening:
Expressway requires this attribute for the mutual authentication between C & E, and will not accept the certificate.
If we use a certificate signed by a private certificate, non-IT controlled devices will get a warning and/or fail when trying to use MRA. Also, my understanding is that physical phones have a trust list which can not be added to, so they will stop working.
Is Cisco aware of this change and is there a recommended path forward?
11-06-2025 06:12 AM - edited 11-06-2025 06:13 AM
FYI 2 days ago I tried to get a new certificate with Gandi (which relies on Digicert or Sectigo). In both case I get only a certificate with "TLS Server authentication" EKU. From what I see with Gandi you don't have the possibily to request "TLS client authentication" EKU.
According to Digicert KB it is still possible to request a certificate with "TLS client authentication" EKU: https://knowledge.digicert.com/alerts/sunsetting-client-authentication-eku-from-digicert-public-tls-certificates#october.
11-10-2025 08:41 AM
Did you try Digicert and did they provide you with a cert in the end that had the EKU?
11-06-2025 02:01 PM
Checking back to see if anyone has successfully received a certificate from a CA with the client EKU. I know many people were trying other providers but I have yet to hear of anyone actually receiving a cert.
11-11-2025 12:59 AM
I guess it's time for ExpressWay decomm.
11-11-2025 04:18 AM
There will be an update of the operating system in Expressway that handles certificates not having the EKU. In this thread it’s been referred to two times.
11-11-2025 07:00 AM
I saw that, but it doesn't help our customer whose system is already dead in the water or any customers whose certs expire before whatever future date the non-EKU version is released.
11-11-2025 07:23 AM
dear @krcollab
Here in cisco forum, peoples work & post voluntarily..
and they have no responsibility at Cisco..
We are also involved in this issue and have many problems..
11-11-2025 07:49 AM
I didn't think anyone in the conversation was from Cisco or in any way responsible for the issue. The issue itself isn't Cisco's fault, it's a change pushed by the CAs. I was just pointing out, because of the statement "In this thread it’s been referred to two times" that I am aware that Cisco is planning on releasing an Expressway version with a workaround. However, that doesn't fix currently-broken or soon-to-be-broken systems so I've been asking in the thread whether anyone has been successful in actually receiving a cert with the EKU from any CA, as that is currently the only way to get things working again.
11-11-2025 08:11 AM
We just got Sectigo to issue us new certificates that includes EKU. So it is possible to get the public CAs to live up to what they states in their FAQs that between October 7 through May next year it should be possible to get a certificate that includes EKU.
11-12-2025 12:55 AM
Faced the same issue with Sectigo, exceptions only supports if you have enterprise certificate manager.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide