With this item you specify additional designated purposes for the key usage. The extended key usage consists of a comma-separated list of key usages. These indicate the purposes for which the certificate's public key may be used.
The purposes are entered either as their abbreviations or the dot-separated form of the OIDs. Although any OID can be used, only a few of them are meaningful (see below). Specifically the following PKIX, NS and MS values are significant and can be entered in any combination:
| Value | Meaning |
|---|---|
| serverAuth | SSL/TLS Web server authentication |
| clientAuth | SSL/TLS Web client authentication |
| codeSigning | Code signing |
| emailProtection | E-mail protection (S/MIME) |
| timeStamping | Trusted time stamping |
| msCodeInd | Microsoft personal code signing (Authenticode) |
| msCodeCom | Microsoft commercial code signing (Authenticode) |
| msCTLSign | Microsoft trust list signing |
| msSGC | Microsoft server gated crypto |
| msEFS | Microsoft encrypted file system |
| nsSGC | Netscape server gated crypto |
| critical | By setting this restriction, the key usage extension must always be observed. If the extension is not supported, the certificate is rejected as invalid. |
| Device | OID |
|---|---|
| WLC | 1.3.6.1.5.5.7.3.18 |
| Managed AP | 1.3.6.1.5.5.7.3.19 |
Sample input: critical,clientAuth,1.3.6.1.5.5.7.3.19
- SNMP ID:
- 2.39.2.13.4
- Console path:
- Setup > Certificates > SCEP-CA > Sub-CA
- Possible values:
Comma separated list of the abbreviations and/or OIDs listed above. Max. 100 characters from #[A-Z][a-z][0-9]@{|}~!$%&'()+-,/:;<=>?[\]^_. `
- Default:
- empty