With this item you specify additional designated purposes for the key usage. The extended key usage consists of a comma-separated list of key usages. These indicate the purposes for which the certificate's public key may be used.
The purposes are entered either as their abbreviations or the dot-separated form of the OIDs. Although any OID can be used, only a few of them are meaningful (see below). Specifically the following PKIX, NS and MS values are significant and can be entered in any combination:
| Value | Meaning | 
|---|---|
| serverAuth | SSL/TLS Web server authentication | 
| clientAuth | SSL/TLS Web client authentication | 
| codeSigning | Code signing | 
| emailProtection | E-mail protection (S/MIME) | 
| timeStamping | Trusted time stamping | 
| msCodeInd | Microsoft personal code signing (Authenticode) | 
| msCodeCom | Microsoft commercial code signing (Authenticode) | 
| msCTLSign | Microsoft trust list signing | 
| msSGC | Microsoft server gated crypto | 
| msEFS | Microsoft encrypted file system | 
| nsSGC | Netscape server gated crypto | 
| critical | By setting this restriction, the key usage extension must always be observed. If the extension is not supported, the certificate is rejected as invalid. | 
| Device | OID | 
|---|---|
| WLC | 1.3.6.1.5.5.7.3.18 | 
| Managed AP | 1.3.6.1.5.5.7.3.19 | 
Sample input: critical,clientAuth,1.3.6.1.5.5.7.3.19
- SNMP ID:
 - 2.39.2.13.4
 - Console path:
 - Setup > Certificates > SCEP-CA > Sub-CA
 - Possible values:
 Comma separated list of the abbreviations and/or OIDs listed above. Max. 100 characters from #[A-Z][a-z][0-9]@{|}~!$%&'()+-,/:;<=>?[\]^_. `
- Default:
 - empty