An extension of Azure for running apps in an on-premises environment and delivering Azure services in a datacenter.
Hello Bak,
Yep, certificates with just Server Authentication (serverAuth) EKU are good to go for Azure Stack Hub external certificate rotation.
- All Azure Stack Hub needs is the Server Authentication EKU (OID 1.3.6.1.5.5.7.3.1) in the Enhanced Key Usage field for external endpoint certs—no need for Client Authentication (clientAuth) EKU.
- Public CAs have stopped adding Client Authentication by default to new TLS server certs (thanks to Chrome Root Program and CA/Browser Forum policies), but this doesn’t mess with Azure Stack Hub external certs.
- If your new certs pass the Azure Stack Hub Readiness Checker or validation (including the right Key Usage: Digital Signature + Key Encipherment), you’re all set for rotation.
- The validation output you saw is normal, so your certs meet all the requirements.
https://learn.microsoft.com/en-us/azure-stack/operator/azure-stack-pki-certs?view=azs-2601
This article clearly states the mandatory EKU: “The certificate pfx files must have the values Server Authentication (1.3.6.1.5.5.7.3.1) in the Enhanced Key Usage field.”
You can confidently use the newly issued certificates for external secret rotation. Here are the focused steps to complete the process safely:
- Confirm validation success Ensure the full Readiness Checker output (or Test-AzureStack) shows Pass for all external certificates. If any other issues appear, address them first.
- Prepare the certificates Package the new .pfx files with the correct folder structure as described in the documentation.
- Perform external certificate rotation Use the Privileged Endpoint (PEP) and the Start-SecretRotation cmdlet to rotate only the external certificates.
- Post-rotation verification After rotation, run validation again to confirm the new certificates are active and all endpoints are healthy.
Note : proceeding with the rotation using your current certificates — they fully comply with Azure Stack Hub requirements. This industry shift to Server Auth only actually aligns better with standard TLS server certificate best practices for external endpoints
Thanks,
Manish.