Open lainosantos opened 4 years ago
Hi @lainosantos . This definitely makes sense to me as an optimization. Thanks for filing the issue!
I'm having the same exact issue with timestamp certificates, would be nice to be able to mark the extension as critical. Thanks.
Is your feature request related to a problem? Please describe. There is no way to mark the Extended Key Usage as critical in Vault.
Describe the solution you'd like An option to mark Extended Key Usage as critical
Describe alternatives you've considered Now the only way is sign (verbatim) CSR. May be a checkbox in UI or a param in API.
Explain any additional use-cases In some cases, like timestamping server (https://www.ietf.org/rfc/rfc3161.txt, topic 2.3), this extesnsion should be marked as critical.