With all the conflicts happening around the world, the last thing an IT admin expects is "friendly fire" between their web browser and the collaboration servers they manage. But big changes are coming to Google Chrome and they’re coming fast.If you manage Cisco Collaboration, the "standard" way you’ve handled certificates for the last decade is about to break. Here’s what you need to know to keep the lights on.
What is Chrome actually doing?
Google is fundamentally changing how it treats Public Certificate Authorities (CAs). There are three major "shocks" to the system:
Why Chrome Policies are Redefining Public Trust
To understand why Google Chrome’s recent policy shifts are so impactful, we must first examine the fundamental role of a Public Certificate Authority (CA).
Originally, Public CAs were established to solve a single, critical problem: Authenticating websites for the general public. When a user navigates to a sensitive domain, such as webex.com , through a browser, they need a guarantee that they are communicating with the legitimate service rather than a malicious interceptor. Chrome facilitates this trust by validating the website's digital certificate against its internal Root Store.
The Mechanics of Browser Trust
Chrome is shipped with a pre-vetted list of "Trusted Roots." For a CA like DigiCert, Sectigo, or IdenTrust to remain on this list, they must strictly adhere to the Chrome Root Program Policy. This is not a formal government regulation, but a technical requirement for market viability; if a CA fails to comply, Chrome will revoke its trust.
For the end-user, a "distrusted" CA results in a "Your connection is not private" warning page. For an organization, it means a total loss of accessibility for customers and employees.
The Shift Toward "Purpose-Driven" PKI
Historically, the industry has treated certificates as "all-purpose" tools. However, Google is now enforcing a strict separation of concerns. Chrome’s vision is that Public CAs should exist exclusively for public website identity (Server Authentication).
By June 2026, Chrome will no longer trust public certificates that attempt to handle both server and client authentication. This shift is designed to reduce the "blast radius" of a potential CA compromise and force internal application-to-application security into more appropriate, private environments.
What is Chrome trying to achieve through those Changes?
What do Cisco Admins need to do?
Many on Premises communications products and deployments have been designed around a single certificate being reused across multiple roles:
Now that Chrome will be rejecting certs that contain both Server and Client certificates, its imperative to do the following steps:
Cisco On premises calling products can be affected by potential authentication issues and impacted functionality due to broken certificate validity that is caused by using Server-Authentication only certs provided by Public Root CAs.
The following list shows examples of certificates that are used for mTLS connections in these Cisco on premises calling products:
The following are examples of certificates that are used for different mTLS connections:
Interim Solutions
Option 1: Switch to Public Root CAs that provide combined EKU certificates
There are still Public CAs out there that can still issue Web Server + Client certificates, (DigiCert and IdenTrust) from an alternate root which will not be included in the Chrome browser’s trust store.
This approach alleviates the need to upgrade server software to mitigate sunsetting of Client Authentication EKU enforced by the Google Chrome Root Program Policy.
Downside is you will get a warning of website not trusted before logging into it.
Option 2: Switch to Private CA Roots
If you do move to a Private Root CA, you will have the ability to generate Web Server and Client certificates for dual use and maintain service operations.
Same downside as option 1, you will get a warning of website not trusted before logging in.
Cisco Expressway Fix
Cisco Expressway is probably the most vulnerable to this change. They require a Web server and client certificate because Expressway nodes need to authenticate themselves to each other and to other Collaboration nodes.
Also, they need to authenticate remote clients that are attempting to register to On Prem Call Manager.
Cisco released Expressway x15.4 which includes a commands that will allow admins to upload Server Only EKU certificates and it uses this Server only certificate to maintain services.
The command is: xConfiguration XCP TLS Certificate CVS EnableServerEkuUpload: On
Long-Term Solutions
Moving forward, Cisco will be segregating certificates. There will be a TOMCAT Server Certificate and a Tomcat Client certificate, and admins will need to renew both or upload both or have a self-signed cert for both.
Future releases by Cisco will include this segregation.
When you upgrade, your Tomcat Cert will be copied once into the Tomcat Server Certificate and once into the Client Server certificate.
If you need any assistance staying in operation during these certificate turbulence times, feel free to reach to us at LookingPoint, please reach out to us at sales@lookingpoint.com and we’ll be happy to help!