Skip to content

Update Client Authentication EKU Removal Impact Guide and SFE Desktop App Documentation#325

Draft
jagilber wants to merge 6 commits intoAzure:masterfrom
jagilber:client-eku
Draft

Update Client Authentication EKU Removal Impact Guide and SFE Desktop App Documentation#325
jagilber wants to merge 6 commits intoAzure:masterfrom
jagilber:client-eku

Conversation

@jagilber
Copy link
Copy Markdown
Member

Update Client Authentication EKU Removal Impact Guide and SFE Desktop App Documentation
Summary
Documents the impact of public certificate authorities (Microsoft, DigiCert) removing the Client Authentication EKU (OID: 1.3.6.1.5.5.7.3.2) from public TLS certificates on Service Fabric clusters. Also adds documentation for using Service Fabric Explorer (SFE) desktop application as a workaround.

What Changed

Problem description and timeline (Microsoft: Sep-Nov 2025, DigiCert: ends May 2026)
What works (TCP-based connections on port 19000) vs. what is impacted (HTTP-based connections on port 19080)
SF server-side EKU behavior (SF does not check EKU - the issue is client-side SChannel filtering)
Managed Identity Token Service (MITS) impact and workarounds
Azure API Management (APIM) backend connectivity impact
Recommended mitigations (private PKI certificates, .NET 8+ workarounds, SFE desktop app)
Certificate troubleshooting guidance with screenshots
service-fabric-explorer-desktop-app.md - Guide for the SFE desktop application:

Installation and connection setup
Cluster management features
Comparison with browser-based SFX
New Script:

sf-client-eku-test.csx - C# script to test client certificate EKU behavior and validate SChannel certificate selection
New Media:

Certificate detail screenshots (EKU, subject, certification path, stores)
SFE desktop app screenshots (cluster overview, node views, service/partition/replica management)
Why
Public CAs (Microsoft, DigiCert) are standardizing TLS certificates to Server Authentication EKU only, per Chrome Root Program policy and CA/Browser Forum requirements. This breaks client certificate authentication for Service Fabric clusters that rely on Windows SChannel (browsers, .NET HttpClientHandler, APIM). This documentation helps customers understand the impact and available workarounds.

jagilber and others added 6 commits March 8, 2026 20:10
…, update DigiCert deadline to March 2027, update Chrome Root Program URL
- PowerShell 7.4+ on .NET 8+ uses SocketsHttpHandler internally for
  Invoke-WebRequest/Invoke-RestMethod, bypassing SChannel EKU filtering.
  Both IWR and IRM work with server-only EKU certs on PS 7.5.4/.NET 9.0.10.
  Verified in same-process test: HttpClientHandler returns 403 while
  Invoke-RestMethod returns 200, proving different code paths.

- Updated compatibility matrix, impact lists, key findings, and
  platform-specific behavior sections to reflect PS7/.NET 8+ behavior.

- Added SChannel TLS session caching warning - OS-level cache in
  lsass.exe can cause false positives across processes.

- Fixed Chrome Root Program link (404 -> working URL).

- Fixed sf-client-eku-test.csx ServerCertValidation callback that
  compared server cert thumbprint to client cert thumbprint, causing
  all tests to fail when client cert differs from server cert.

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
…is the single test script

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant