TLS Delegated Credentials (RFC 9345) — Edge Key Isolation Playbook

2026-03-30 · cryptography

TLS Delegated Credentials (RFC 9345) — Edge Key Isolation Playbook

Date: 2026-03-30
Category: knowledge
Audience: security engineering / edge platform / SRE / PKI operators

1) Why this matters

If you terminate TLS across many edge locations, your leaf private key becomes a high-value asset with broad blast radius.

Delegated Credentials (DCs) let you keep the CA-issued certificate model, but delegate short-lived handshake signing authority to ephemeral keys at the edge. In practice, this gives you:


2) Protocol essentials (what to remember)

From RFC 9345:

  1. TLS/DTLS 1.3+ only (not for pre-1.3 handshakes).
  2. Client/server negotiates support using delegated_credential extension (type 34).
  3. A DC contains:
    • delegated public key,
    • validity (valid_time),
    • algorithm metadata,
    • signature by the end-entity certificate private key.
  4. Default max validity is 7 days (unless profile specifies otherwise).
  5. DC validity must not extend past the parent certificate validity.
  6. The end-entity cert must explicitly allow delegation via DelegationUsage extension (OID 1.3.6.1.4.1.44363.44, non-critical).

Operationally: this is a constrained delegation primitive, not a new PKI.


3) Security model: what improves, what does not

Improves

Does not magically improve


4) Architecture pattern that works in production

A. Signer tier (high trust)

B. Distribution tier

C. Edge termination tier


5) Rollout playbook (practical sequence)

Phase 0 — Readiness gates

Phase 1 — Canary with strict TTL

Phase 2 — Expand by client-compatibility data

Phase 3 — Security hardening


6) Policy defaults to set on day 1


7) Observability: minimum dashboard

Track these per region, SNI, and client family:

If you can’t see these, you can’t operate DCs safely.


8) Common failure modes and fast responses

  1. Clock skew causes “expired” DC rejects
    Response: shorten distribution lag, add overlap buffer, verify NTP hygiene, widen alerting on skew-heavy ASNs/regions.

  2. CA issued cert without DelegationUsage extension
    Response: fail closed in preprod checks; never promote certs missing delegation policy bits.

  3. Algorithm mismatch between negotiated schemes and minted DC
    Response: enforce scheme compatibility matrix in mint pipeline before publish.

  4. Signer outage during rotation window
    Response: keep last-known-good DC active until expiry; have tested fallback to non-DC handshake path.


9) Decision rule

Adopt Delegated Credentials if all are true:

Delay adoption if:


10) Bottom line

Delegated Credentials are a high-leverage middle path between “long-lived cert keys everywhere” and “fully remote signing on every handshake.”

Treat DC as an operational security system, not just a TLS checkbox:

That combination gives real blast-radius reduction without sacrificing uptime.


References

  1. RFC 9345 — Delegated Credentials for TLS and DTLS
    https://www.rfc-editor.org/rfc/rfc9345.html
  2. Cloudflare Docs — Keyless delegation
    https://developers.cloudflare.com/ssl/keyless-ssl/reference/keyless-delegation/
  3. Cloudflare Blog — Delegated Credentials for TLS
    https://blog.cloudflare.com/keyless-delegation/
  4. Mozilla Security Blog — Validating Delegated Credentials for TLS in Firefox
    https://blog.mozilla.org/security/2019/11/01/validating-delegated-credentials-for-tls-in-firefox/
  5. Meta Engineering — Delegated credentials: Improving the security of TLS certificates
    https://engineering.fb.com/2019/11/01/security/delegated-credentials/