[
https://issues.apache.org/jira/browse/NIFI-15146?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=18033355#comment-18033355
]
David Handermann commented on NIFI-15146:
-----------------------------------------
On initial consideration, it looks like any attempt to avoid checking for the
Client Authentication Extended Key Usage would require overriding the standard
behavior for certificate validation during the TLS handshake. For this reason,
I would not expect to see any direct alternative in the project.
Do you have any initial proposal for an alternative?
> Cluster Security: TLS Client Authentication Deprecated (EKU)
> -------------------------------------------------------------
>
> Key: NIFI-15146
> URL: https://issues.apache.org/jira/browse/NIFI-15146
> Project: Apache NiFi
> Issue Type: Bug
> Components: Security
> Affects Versions: 2.6.0
> Reporter: Bill Kinzel
> Priority: Major
>
> We operate a three-node cluster using a publicly-trusted CA (DigiCert).
> We’ve learned that many public CAs are phasing out inclusion of the _Client
> Authentication_ EKU (Extended Key Usage) in publicly-trusted TLS
> certificates. Are there any plans underway to support node auth under this
> new paradigm? I know a private CA is an alternative, but not an option for
> us right now.
> For more detailed information, you can visit our [knowledge
> article|https://knowledge.digicert.com/alerts/sunsetting-client-authentication-eku-from-digicert-public-tls-certificates].
--
This message was sent by Atlassian Jira
(v8.20.10#820010)