The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes Chrome Root Program Policy changes on Cisco Expressway and Client Authentication EKU sunset in public CA certificates after 6/26.
Digital certificates are electronic credentials issued by trusted Certificate Authorities (CAs) that secure communication between servers and clients by ensuring authentication, data integrity, and confidentiality. These certificates contain Extended Key Usage (EKU) fields that define their purpose:
Traditionally, a single certificate could contain both Server and Client Authentication EKUs, allowing it to serve dual purposes. This is particularly important for products like Cisco Expressway that act as both server and client in different connection scenarios.

Effective June 2026, the Chrome Root Program Policy restricts Root Certificate Authority (CA) certificates included in the Chrome Root Store, phasing out multi-purpose roots to align all public-key infrastructure (PKI) hierarchies to serve only TLS server authentication use cases.
Note: This policy applies only to certificates issued by public CAs. Private PKI and self-signed certificates are not affected by this policy.
Per Field Notice FN74362, all Cisco Expressway versions are affected:
|
Product |
Affected Releases |
Impact |
|
Expressway Core and Edge |
X14 (All versions) |
X14.0.0 through X14.3.7 - All releases affected |
|
Expressway Core and Edge |
X15 (Versions before X15.4) |
X15.0.0 through X15.3.2 - All releases affected |
Cisco Expressway products (Expressway-C and Expressway-E) act as both server and client in various connection scenarios, requiring certificates with both Server and Client Authentication EKUs.
Expressway E as Server (Server Authentication EKU required):
Expressway E as Client (Client Authentication EKU required):
The Public CA-signed certificate with Client Authentication EKU currently used for mTLS connections in Cisco Expressway is the Expressway Server Certificate. This certificate is used for the these mTLS connections:
Per Field Notice FN74362, before considering workaround and solution options:
Administrators can choose from one of these workaround options:
Some Public Root CAs (such as DigiCert and IdenTrust) issue certificates with combined EKU from an alternative root, which can not be included in the Chrome browser trust store.
Examples of Public Root CAs and EKU Types (per FN74362):
|
CA Vendor |
EKU Type |
Root CA |
Issuing/Sub CA |
|
IdenTrust |
clientAuth + serverAuth |
IdenTrust Public Sector Root CA 1 |
IdenTrust Public Sector Server CA 1 |
|
DigiCert |
clientAuth + serverAuth |
DigiCert Assured ID Root G2 |
DigiCert Assured ID CA G2 |
Prerequisites for this approach:
Certificate Management References:

Certificates issued by Public Root CAs before May 2026 that have both Server and Client Authentication EKU continue to be honored until their term expires.
General recommendations are:
Per FN74362, if you use Let's Encrypt certificates:

This option is applicable to: Expressway C only; NOT applicable to Expressway E.
Caution: This option is not viable for Expressway-E, which requires public CA certificates for external-facing services and browser trust.
Per Field Notice FN74362, Cisco is implementing product enhancements in fixed releases to address this issue comprehensively.
Fixed release schedule:
|
Product |
Affected Release |
Fixed Release |
Purpose of Fix |
Availability |
|
Cisco Expressway |
X14.x (All releases)<br>X15.x (Earlier than X15.4) |
X15.4 |
Intermittent solution: Allows additional upload of ServerAuth EKU-only signed certificate on Expressway E and certificate verification adjustment for MRA SIP signal between Expressway E and Expressway C |
February 2026 |
|
Cisco Expressway |
X14.x (All releases)<br>X15.x (Earlier than X15.5) |
X15.5 |
Comprehensive solution: Provides UI enhancement for segregating client and server certificates and provides options to administrators to disable EKU checking |
May 2026 |
Note: Both Cisco Expressway E and Expressway C must be upgraded to the same version.
Purpose: Intermittent solution to accommodate certificates with ServerAuth EKU only and to enable MRA registrations
Key enhancements are:
Who can upgrade to X15.4:
Important requirements for X15.4:
Limitations of X15.4 are:
Purpose: Comprehensive solution to meet global Google Chrome Root Program requirements
Key Product Enhancements:
Note: In this case, the remote peer also has to support a similar Ignore Client Authentication EKU model

START: Do you use Public CA certificates on Expressway?
│
├─ NO: Private PKI or Self-Signed
│ └─ No action required - Not affected by policy
│
└─ YES: Public CA certificates in use
│
├─ Are they used for mTLS connections? (Check use cases in Specific Affected Use Cases section)
│ │
│ ├─ NO: Only server authentication
│ │ └─ Minimal impact - Monitor for future changes
│ │
│ └─ YES: mTLS connections with Client Auth EKU
│ │
│ └─ Choose YOUR approach:
│ │
│ ├─ Option A: Switch to Alternative Root CA
│ │ ├─ Contact CA provider for combined EKU from alternative root
│ │ ├─ Ensure all peers trust new root
│ │ └─ No immediate software upgrade needed
│ │
│ ├─ Option B: Renew Certificates Before Deadlines
│ │ ├─ If Let's Encrypt: Renew before Feb 11, 2026
│ │ │ └─ Disable ACME scheduler after renewal
│ │ ├─ For maximum validity: Renew before Mar 15, 2026
│ │ └─ Buys time until certificate expiry
│ │
│ ├─ Option C: Migrate to Private PKI (Expressway-C only)
│ │ ├─ Set up private CA infrastructure
│ │ ├─ Issue combined EKU certificates
│ │ ├─ Distribute root to all peers
│ │ └─ Long-term control, NOT for Expressway-E
│ │
│ └─ Option D : Plan Software Upgrade
│ ├─ Urgent need? → Upgrade to X15.4 (Feb 2026)
│ └─ Comprehensive solution → Upgrade to X15.5 (May 2026)
│ └─ Then obtain separate server/client certificates

Q: Do I need to worry about this if I use private PKI?
A: No. This policy only affects certificates issued by Public Root CAs. Private PKI and self-signed certificates are not impacted.
Q: What if I do not use mTLS connections?
A: If you only use standard TLS (server authentication), you are not affected by this policy. Your server-only certificates continue to work. However, verify your use cases against the list in Specific Affected Use Cases section as some of use cases default uses mTLS.
Q: Will my standard HTTPS web connections to Expressway stop working?
A: No. Standard TLS connections are not affected. Web browser access to Expressway continues to work normally even with server-only EKU certificates.
Q: Can I continue using my existing certificates?
A: Yes, existing certificates with combined EKU remain valid until they expire. The issue arises when you need to renew. They work for both TLS and mTLS connections until expiry.
Q: How do I know if I am using mTLS or standard TLS?
A: ReviewSpecific Affected Use Casessection.
Q. What can I do right now?
A: Cisco strongly recommends these immediate actions:
Identify public TLS certificates used for mTLS
Renew before March 15, 2026 to maximize validity
Disable automated renewals that can replace certificates unexpectedly
Some CAs offer temporary or alternative certificate profiles
Q: Is CUCM SU3(a) compatible with X15.4 and X15.5
A: Yes
Q: Is there a security vulnerability with disabling Client EKU check in Cisco Expressway E (with X15.5 release)
A: Certificate still check CN/SAN to verify connection source is valid, only bypass EKU validation (certificate for client role purpose) which was included by default till Google raise security concern, therefore must not have security issue compare to before.
Q: I use Let's Encrypt with ACME on Expressway. What can I do?
A:
Q: Can I modify the ACME profile to continue getting combined EKU certificates?
A: No. Currently, Expressway uses a hardcoded "classic" ACME profile that cannot be modified by users, please contact Cisco TAC for ACME certificate profile support.
Q: Do I need to upgrade both Expressway-E and Expressway-C?
A: Yes, absolutely. Both must be upgraded to the same version (X15.4 or X15.5) for proper operation.
Q: can I upgrade to X15.4 or wait for X15.5?
A:
Q: My cluster replication is broken after certificate renewal. What happened?
A: Most likely your new certificate only has Server Authentication EKU, but:
Set TLS verification mode to "Permissive" (less secure)
Obtain certificates with combined EKU from alternative CA root
Upgrade to X15.4 or later, which bypasses Client Auth EKU verification for ClusterDB
Q: After upgrading to X15.4, can I use Enforcing mode with server-only certificates in my cluster?
A: Yes. Starting from X15.4, Expressway bypasses Client Auth EKU verification for mTLS ClusterDB connections. Therefore, TLS Verify can be set to "Enforcing" even if one or more cluster nodes only have Server Auth EKU.
Q: Why can't I upload my certificate through the Expressway Web GUI?
A: Before X15.4, the Web GUI enforces a hardcoded validation that requires certificates to have Client Authentication EKU. If your certificate only has Server Authentication EKU, you have two options:
Q: After upgrading to X15.4, I still cannot upload server-only certificates to Expressway-E
A: Once upgraded, ensure that this command is enabled
xConfiguration XCP TLS Certificate CVS EnableServerEkuUpload: On
Q: I upgraded to X15.4. Can I now upload server-only certificates on both Expressway-E and Expressway-C?
A: No. X15.4 only removes the upload restriction for Expressway-E. Expressway-C still requires combined EKU certificates for upload via Web GUI. This is because Expressway-C frequently acts as a TLS client in UC Traversal Zones and requires Client Authentication EKU. Ensure that you run this command on Expressway-E. This command does not run on Expressway-C
xConfiguration XCP TLS Certificate CVS EnableServerEkuUpload: On
Q: I can not register Smart License after certificate renewal. Why?
A: Smart Licensing failure after certificate renewal is usually NOT related to EKU:
Q: Does MRA require Client Authentication EKU on Expressway-E?
A: It depends on the Expressway version:
During MRA SIP signaling, Expressway-E sends its signed certificate in a SIP SERVICE message to Expressway-C
Expressway-C validates the certificate, requiring both Client Authentication and Server Authentication EKUs
Without combined EKU, MRA SIP registration fails
Expressway-C no longer validates Client Authentication EKU in the SIP SERVICE message
Expressway-E only needs Server Authentication EKU for MRA
UC Traversal Zone operates unidirectionally (Expressway-C validates Expressway-E server certificate only)
Q: Why my Neighbor Zones are failing after uploading theServer Authentication EKU on Expresswayx15.4
A: If you set the TLS verification mode to “on”, it requires to have a client authentication EKU. So You can disable TLS verification in the Neighbor Zone configuration
Q: What certificates are needed for MRA to work properly?
A: For a typical MRA deployment:
|
Component |
Certificate Requirements |
EKU Required |
Notes |
|
Expressway-E (before X15.4) |
serverAuth + clientAuth |
Both |
For SIP SERVICE validation by Exp-C |
|
Expressway-E (X15.4+) |
serverAuth only |
Server only |
Client EKU check bypassed |
|
Expressway-C |
clientAuth + serverAuth |
Both |
Always acts as client in UC Traversal |
|
UC Traversal Zone |
Unidirectional validation |
Exp-E: serverAuth Exp-C: clientAuth |
Exp-C validates Exp-E server cert |
Q: My MRA was working fine, but after renewing my Expressway-E certificate with server-only EKU, SIP registration fails. What is wrong?
A: If you are running a version before X15.4, MRA SIP signaling requires Expressway-E to present both Server and Client Authentication EKUs in the SIP SERVICE message. Your options:
Q: How do I get a certificate with combined EKU from DigiCert or IdenTrust?
A: Contact your CA provider and request a certificate from their alternative root that still issues combined EKU.
Q: My CA says they can only provide server-only certificates. What can I do?
A: You have several options:
Q: What happens on June 15, 2026?
A: Chrome stops trusting public TLS certificates containing both Server and Client Authentication EKUs. Services using such certificates can fail.
Q: Why do I have to I renew before March 15, 2026?
A: After March 15, 2026, certificate validity is reduced from 398 days to 200 days. Renewing before this date gives you maximum certificate lifetime.
Q: What is the deadline for action?
A: There are multiple deadlines:

: Support for separate server and client Certificate for Expressway
The sunsetting of Client Authentication EKU in public CA certificates represent a significant security policy shift that impacts Cisco Expressway deployments using mTLS connections. While this is an industry-wide change, the impact rating is CRITICAL per Field Notice FN74362, and immediate action is required to prevent service disruptions.
| Revision | Publish Date | Comments |
|---|---|---|
1.0 |
13-Feb-2026
|
Initial Release |
Feedback