JamesBowen
19+ years progress programming and still learning.
This isn't an OpenEdge-specific issue, but rather a broader web security concern.
We currently use Let's Encrypt certificates for mutual TLS (mTLS) connections with external APIs. Starting 15 September, Let's Encrypt will no longer include the EKU Client Authentication attribute in its certificates. While a temporary workaround will be available, full support ends in May 2026.
As we require certificates signed by a public CA (self-signed is not an option), this change poses a challenge. Moreover, this shift isn’t limited to Let's Encrypt—most major certificate authorities are aligning with stricter requirements driven by Google Chrome’s security policies.
One potential solution is adopting a managed PKI service, but the cost is prohibitive for our use case.
I’m interested to know if this change will affect your organization, and what approach you're planning to take in response.
We currently use Let's Encrypt certificates for mutual TLS (mTLS) connections with external APIs. Starting 15 September, Let's Encrypt will no longer include the EKU Client Authentication attribute in its certificates. While a temporary workaround will be available, full support ends in May 2026.
As we require certificates signed by a public CA (self-signed is not an option), this change poses a challenge. Moreover, this shift isn’t limited to Let's Encrypt—most major certificate authorities are aligning with stricter requirements driven by Google Chrome’s security policies.
One potential solution is adopting a managed PKI service, but the cost is prohibitive for our use case.
I’m interested to know if this change will affect your organization, and what approach you're planning to take in response.