GEODE-10561: Add Documentation for Public CA Client Authentication EKU Migration#7989
Open
JinwooHwang wants to merge 1 commit intoapache:developfrom
Open
GEODE-10561: Add Documentation for Public CA Client Authentication EKU Migration#7989JinwooHwang wants to merge 1 commit intoapache:developfrom
JinwooHwang wants to merge 1 commit intoapache:developfrom
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
This PR adds comprehensive documentation to guide Apache Geode users through the upcoming Public Certificate Authority policy change that removes the
clientAuthExtended Key Usage (EKU) from publicly-issued TLS certificates (effective May 2026).Background
Major public Certificate Authorities (Let's Encrypt, DigiCert, etc.) will stop including the
clientAuthEKU in public TLS certificates starting May 2026. This change impacts Apache Geode deployments using mutual TLS (mTLS) with public-CA-issued client certificates, as the Java TLS stack will reject certificates lacking the requiredclientAuthEKU.Changes Included
New Documentation Pages
Public CA Client Authentication EKU Mitigations (
public_ca_client_auth_eku_mitigations.html.md.erb)Internal/Enterprise CA for mTLS (
ssl_internal_ca_mtls.html.md.erb)Hybrid: Public-CA Server + Private-CA Client (
ssl_hybrid_public_server_private_client.html.md.erb)Server-only TLS + Alternative Client Auth (
ssl_server_only_tls_alt_auth.html.md.erb)Updated Documentation
SSL Overview (
ssl_overview.html.md.erb)Navigation (
geode-subnav.erb)Technical Details
All three mitigation approaches have been:
Documentation Quality
Testing
The documentation has been:
Migration Timeline
Users should begin planning migration well before May 2026 when the public CA policy change takes effect. This documentation provides multiple migration paths to accommodate different operational constraints and security requirements.
Related Issues
Checklist
For all changes, please confirm:
develop)?gradlew buildrun cleanly?