Genesys Cloud - Main

 View Only

Sign Up

Expand all | Collapse all

BYOC Cloud Client Authentication EKU Removal Announcement - 2026

  • 1.  BYOC Cloud Client Authentication EKU Removal Announcement - 2026

    Posted 01-05-2026 09:23

    Genesys recently announced the removal of the Client Authentication Extended Key Usage (EKU) from BYOC Cloud SIP TLS X.509 certificates.  This discussion will be for sharing more information and allowing users to ask questions regarding this announcement. Client authentication EKU support removed from Genesys Cloud certificate

    Public Certificate Authorities, such as DigiCert and Amazon Trust Services, which are used to sign BYOC Cloud SIP endpoints announced they are removing the Client Authentication EKU from issued X.509 certificates in alignment with Google Chrome's root program requirements. DigiCert Announcement

    Genesys Cloud will be renewing the server certificates for the BYOC Cloud SIP endpoints the week of March 9, 2026, which will remove the Client Authentication EKU from those certificates.  Depending on the configuration of your remote SIP endpoints, this could cause disruption if not validated in advance.  

    More details about BYOC Cloud TLS capabilities are listed on this page: TLS trunk transport protocol specification

    Remote SIP Endpoints

    In this discussion a "remote SIP endpoint" represents a device external from the Genesys platform that communicates with Genesys Cloud using BYOC Cloud with the SIP protocol.  This device is usually controlled and managed by telephony or network administrators or one of their partners, such as a carrier or service provider.  These devices are not controlled or managed within Genesys Cloud.

    BYOC Cloud SIP Endpoints

    In this discussion, a "BYOC Cloud SIP Endpoint" represents the public SIP endpoints for Genesys Cloud listed on this page: BYOC Cloud Public SIP IP Addresses.  These devices are controlled and managed by Genesys and there is no Genesys Cloud configuration required for this deprecation.  

    GC External Trunk

    In this discussion the "GC External Trunk" represents the Genesys Cloud SIP trunk configuration for the BYOC Cloud trunk.  This is the Genesys Cloud configuration where the details for the communication between the BYOC Cloud SIP Endpoints and the remote SIP endpoints is defined.  

    Nothing needs to be changed in your Genesys Cloud configuration - the use of client authentication is determined by your remote SIP endpoint; most likely a Session Border Controller (SBC), SIP Trunk, or carrier configuration, or carrier device.  

    Mutual TLS is initiated by the Server via a "Certificate Request" during the TLS handshake. 

    Inbound Calls (Carrier or SBC to Genesys Cloud)

    For inbound calls the BYOC SIP endpoints act as the Server and they never request client certificates, so there is no risk with this change for inbound.

    Outbound Calls  (Genesys Cloud to Carrier or SBC)

    For outbound calls, the customer remote SIP endpoints act as the Server and they may request a client certificate, based on configuration, from the BYOC SIP endpoints and those endpoints would respond with their server certificate which currently includes the Client Authentication EKU. Because of this, customer endpoints could be incorrectly configured to initiate or require mutual TLS and satisfy that requirement with the certificate Genesys provides; however, that is not a valid form of authentication and does not provide any security improvements.

    If customer endpoints are configured this way, they will continue to work for now, but when Genesys renews certificates after March 9, 2026 new certificates will not include this usage and although these endpoints will continue to provide a response in the TLS handshake, the server certificate will no longer contain the client authentication EKU and those connections may be rejected by the remote SIP endpoints. Customers should ensure that they are not configured for client authentication or mutual TLS. 

    How to determine the if Client Authentication is being used

    The best way to review the TLS handshake is to review a packet capture of the SIP communication.  Although with TLS trunks the SIP communication will be encrypted and not visible in the capture, the TLS handshake process provides details that can be derived from the capture.  It is important to look at outbound calls specifically.

    Identify if a "Certificate Request" message exists, which could be requested with other messages, such as highlighted below.  The presence of the "Certificate Request" message is an indication that the remote SIP endpoint is configured to attempt mutual TLS.  In this example, the Server provides its Server certificate with the Client Authentication EKU, and the Client validates the certificate and uses it as a valid client certificate.  

    image

    What to expect after the Client Authentication EKU is removed

    In another example, where the Server certificate does not contain the Client Authentication EKU, the same request fails.  The remote SIP endpoint still makes the Certificate Request and the Server still provides its own Server certificate, however, since the Server certificate does not contain the Client Authentication EKU, the remote SIP endpoint rejects the certificate with an "Unsupported Certificate" error and closes the connection.  In this case an Outbound Call would fail.  

    image

    How to Remediate to avoid issues before the certificate renewal

    If inspecting the TLS handshake for an outbound call SIP connection reveals the presence of the "Certificate Request" message sent from your endpoint, remediation is required.  Your remote SIP endpoint is configured for client authentication or mutual TLS and that must be disabled to avoid issue before the BYOC Cloud server certificates are renewed.  Review your device configuration or consult your device vendor or carrier to correct this configuration.  

    From previous experience we anticipate that Cisco CUBE devices enable mutual TLS requests by default, but are not aware if they "attempt" mutual TLS or "require" mutual TLS, so we cannot say how impactful this change will be.  

    Testing connections without Client Authentication EKU

    BYOC Cloud recently launched the Dynamic Cloud Voice Platform to Limited Availability.  This is a new set of BYOC Cloud SIP endpoints, that among other changes use new certificates from Amazon Trust Servers and do not contain the Client Authentication EKU.  Creating a new SIP trunk using the Dynamic Cloud Voice Platform would allow you to build a new BYOC Cloud trunk without impact to your existing trunks and test connectivity from your existing remote SIP endpoint to BYOC Cloud SIP endpoints that have Server certificates that do not have Client Authentication EKU.
    https://help.mypurecloud.com/articles/enable-the-dynamic-cloud-voice-platform/

    Please leave a message on this post if additional clarification is requested. 


    #Telephony

    ------------------------------
    Phil Whitener
    Genesys - Employees
    ------------------------------


  • 2.  RE: BYOC Cloud Client Authentication EKU Removal Announcement - 2026
    Best Answer

    Posted 01-06-2026 14:10

    Thank you for this thorough write up Phil!



    ------------------------------
    Jason Kleitz
    Online Community Manager/Moderator
    ------------------------------



  • 3.  RE: BYOC Cloud Client Authentication EKU Removal Announcement - 2026

    Posted 01-07-2026 10:07

    Hello, thank you for the detailed explanation. 

    Is there a way to test this prior to March 9, 2026 or the only action we can do is to ask the provider to inspect the TLS trace and look for the "Certificate Request"?



    ------------------------------
    Alexandra Manea
    Advanced Technology Senior Consultant
    Indra Italia spa
    ------------------------------



  • 4.  RE: BYOC Cloud Client Authentication EKU Removal Announcement - 2026

    Posted 01-07-2026 10:31

    @Alexandra Manea You can sign up for our Dynamic Cloud Voice Platform limited availability release by commenting on this idea page: https://genesyscloud.ideas.aha.io/ideas/TEL-I-392.  This allows you to setup a new SIP trunk without interrupting your existing trunks.  The new trunk needs to have the "Enable high capacity outbound platform" option set to use the new BYOC Cloud SIP endpoints, and those endpoints already have certificates on them that do not contain the Client Authentication EKU to validate compatibility.  More details on the new platform are available here: https://help.mypurecloud.com/articles/enable-the-dynamic-cloud-voice-platform/



    ------------------------------
    Phil Whitener
    Genesys - Employees
    ------------------------------



  • 5.  RE: BYOC Cloud Client Authentication EKU Removal Announcement - 2026

    Posted 10 days ago

    Hi - can you confirm that this is still going ahead on March 9th?

    We had feedback from Cisco regarding the CUBEs they said that there is no way to prevent them doing mTLS and that the calls will fail. Cisco will release a new firmware to allow TLS to establish in the future prior to May 9th but this is not yet available (see: https://www.cisco.com/c/en/us/support/docs/field-notices/743/fn74350.html).

    Have you checked how many user agents are cisco cubes currently connecting to BYOC because if these certs are replaced then all of those customers will not be able to make outbound calls after this change is completed.

    The other thing i want to point out is that for some reason this specific deprecation was not emailed out so the only way customers would be aware of it is if they read the depreciations page or this forum post.

    It would be good if you renewed the cert with client EKU for this year and sent out the deprecation to all customers otherwise you will potentially have a lot of support cases on the 9th



    ------------------------------
    David Mackill
    Senior Systems Engineer
    ------------------------------



  • 6.  RE: BYOC Cloud Client Authentication EKU Removal Announcement - 2026

    Posted 10 days ago

    Thanks David for your response and details from Cisco.  This is the type of engagement I hoped for with this thread.  We do plan to renew our certs with the client authentication EKU in this cycle, the updated notification shoukd be published soon.  We will update when the plan is final but the renewal, with the client authentication EKU, is tentatively planned for early April. I was not aware that the deprecation announcement was communicated differently and with inquire about that as well.  



    ------------------------------
    Phil Whitener
    Genesys - Employees
    ------------------------------



  • 7.  RE: BYOC Cloud Client Authentication EKU Removal Announcement - 2026

    Posted 10 days ago

    Thanks for your prompt reply Phil im glad and relieved this is the case. 



    ------------------------------
    David Mackill
    Senior Systems Engineer
    ------------------------------



  • 8.  RE: BYOC Cloud Client Authentication EKU Removal Announcement - 2026

    Posted 10 days ago

    David, on another note I would be interested in finding a partner that can test this configuration with our Dynamic Cloud Voice Platform endpoints both prior to the Cisco fix and after.  If you have an environment, I would like to get a test trunk setup to capture results.  You can reach out to me at my Genesys email.  (First.Last@)



    ------------------------------
    Phil Whitener
    Genesys - Employees
    ------------------------------



  • 9.  RE: BYOC Cloud Client Authentication EKU Removal Announcement - 2026

    Posted 10 days ago
    Hi David,
    This is interesting and also somewhat disturbing news.

    I have verified this behavior with Cisco and received confirmation that they do enforce mTLS on CUBE for the client side (Genesys‑initiated communication), but they do not require a clientAuth EKU in the client certificate in order to successfully complete the TLS handshake.
    So we effectively have two contradictory statements coming from Cisco.


    Below are the answers I received from the TAC engineer:

    I understand that you have an inquiry regarding:
    "CUBE TLS behavior when the client certificate lacks clientAuth EKU."
    Please see the answers to your questions below.

    1. When CUBE issues a TLS CertificateRequest and the client presents a certificate without ExtendedKeyUsage = clientAuth, will CUBE:
    • continue the TLS handshake successfully, or
    • terminate the handshake due to EKU validation failure?
    Answer: When CUBE acts as a TLS server and requests a client certificate, the TLS handshake completes successfully even if the client certificate does not include the clientAuth EKU, as long as the certificate chain is valid, trusted, and within its validity period.

    2. Does CUBE explicitly validate the presence of clientAuth EKU in the client certificate during the TLS handshake?
    Answer: The presence of EKU is not a hard validation requirement. CUBE does not explicitly enforce or require the clientAuth EKU in the client certificate during the TLS handshake on IOS‑XE 17.09.04a.

    3. If EKU validation is performed:
    • Is it mandatory or best‑effort?
    • Is there any configuration option to disable or relax EKU enforcement?
    Answer: EKU validation is best‑effort (non‑mandatory). The absence of clientAuth EKU does not cause a handshake failure. There is no configuration option on IOS‑XE 17.09.04a to enable, disable, or modify EKU enforcement for client certificates.


    ------------------------------
    Roman Vondracek
    Technical Architect
    ------------------------------



  • 10.  RE: BYOC Cloud Client Authentication EKU Removal Announcement - 2026

    Posted 10 days ago

    For anyone who is using Ribbon SBCs:

    Ribbon have confirmed that the Ribbon SBC1K/2K/SWE Edge will accept certs without client EKU

    For the SBC SWE/Core series you can configure your TLS profile towards BYOC as follows:

    1. Under Acceptable Cert Validation Errors set Invalid Purpose to checked - this will still perform a cert request but will not terminate the TLS connection if the returned certificate does not contain client EKU
    2. Turn off mTLS entirely by setting Auth Client = False (this is probably more preferred since BYOC does not support mtls)


    ------------------------------
    David Mackill
    Senior Systems Engineer
    ------------------------------



  • 11.  RE: BYOC Cloud Client Authentication EKU Removal Announcement - 2026

    Posted 10 days ago

    Show de bola!



    ------------------------------
    Andre Costa
    ------------------------------