{"version":3,"file":"component---src-pages-docs-certificate-manager-basic-ops-mdx-c1cb77a150d6f5e5ccd8.js","mappings":"mPAQaA,EAAe,GAEtBC,EAAgB,SAAAC,GAAI,OAAI,SAA6BC,GAEzD,OADAC,QAAQC,KAAK,aAAeH,EAAO,4EAC5B,eAASC,KAGZG,EAAQL,EAAc,SACtBM,EAAYN,EAAc,aAC1BO,EAAc,CAClBR,aAAAA,GAEIS,EAAYC,EAAAA,EACH,SAASC,EAAT,GAGZ,IAFDC,EAEC,EAFDA,WACGT,GACF,YACD,OAAO,SAACM,EAAD,iBAAeD,EAAiBL,EAAhC,CAAuCS,WAAYA,EAAYC,QAAQ,eAG5E,oGAAqF,cAAGC,WAAW,IAC/F,KAAQ,wCACP,uBAAYA,WAAW,KAAvB,SAFL,yBAGF,uBAAYA,WAAW,KAAvB,QAHE,0IAKA,oBACE,eAAIA,WAAW,MAAf,2BACA,eAAIA,WAAW,MAAf,6BACA,eAAIA,WAAW,MAAf,2BACA,eAAIA,WAAW,MAAf,4BAEF,SAACR,EAAD,CAAOS,SAAS,OAAOF,QAAQ,UACjC,+EACyD,cAAGG,KAAK,iDAAR,6CADzD,OAIE,wCACA,qIAAsH,cAAGF,WAAW,IAChI,KAAQ,4EAD0G,mBAAtH,MAGA,0DACA,oIAC+C,uBAAYA,WAAW,KAAvB,uBAD/C,mCAGA,SAACP,EAAD,CAAWU,SAAS,gBAAgBC,SAAS,mHAAmHL,QAAQ,aAAxK,uHAGA,kHACA,oBACE,eAAIC,WAAW,OAAK,uBAAYA,WAAW,MAAvB,aAApB,iCACA,eAAIA,WAAW,OAAK,uBAAYA,WAAW,MAAvB,iBAApB,qDACA,eAAIA,WAAW,OAAK,uBAAYA,WAAW,MAAvB,iBAApB,6CACA,eAAIA,WAAW,OAAK,uBAAYA,WAAW,MAAvB,0CAApB,0EACA,eAAIA,WAAW,OAAK,uBAAYA,WAAW,MAAvB,mBAApB,qDAEF,oEAAqD,uBAAYA,WAAW,KAAvB,mBAArD,sJAEA,2DACA,mEACA,SAACP,EAAD,CAAWU,SAAS,gBAAgBC,SAAS,iDAAiDL,QAAQ,aAAtG,qDAGA,sDACA,qBAAK,iBAAMC,WAAW,MAClB,UAAa,iBADZ,8WAWL,oDACA,uSAIA,gGACA,SAACP,EAAD,CAAWU,SAAS,gBAAgBC,SAAS,4CAA4CL,QAAQ,aAAjG,gDAGA,wCAAyB,cAAGC,WAAW,IACnC,KAAQ,oEADa,sBAAzB,UAEyC,uBAAYA,WAAW,KAAvB,iBAFzC,6EAGA,qGACA,SAACP,EAAD,CAAWU,SAAS,gBAAgBC,SAAS,iDAAiDL,QAAQ,aAAtG,6ZAWA,qDACA,ogBAMA,SAACN,EAAD,CAAWU,SAAS,gBAAgBC,SAAS,0DAA0DL,QAAQ,aAA/G,yMAKA,iIAEA,SAACN,EAAD,CAAWU,SAAS,gBAAgBC,SAAS,4CAA4CL,QAAQ,aAAjG,oMAIA,kNAEA,SAACP,EAAD,CAAOS,SAAS,OAAOF,QAAQ,UACjC,+DACyC,cAAGG,KAAK,gCAAR,WADzC,iCAIE,kCACA,oBACE,eAAIF,WAAW,MAAf,sFAA0G,cAAGA,WAAW,KACpH,KAAQ,yEAD8F,4BAA1G,MAGA,eAAIA,WAAW,MAAf,4DAAgF,cAAGA,WAAW,KAC1F,KAAQ,8CADoE,gCAAhF,6HAQNH,EAAWQ,gBAAiB","sources":["webpack://docs/./src/pages/docs/certificate-manager/basic-ops.mdx"],"sourcesContent":["import * as React from 'react'\n /* @jsx mdx */\nimport { mdx } from '@mdx-js/react';\n/* @jsxRuntime classic */\n\n/* @jsx mdx */\n\nimport DefaultLayout from \"/home/runner/work/prof/prof/deps/docs/src/components/DocsLayout.jsx\";\nexport const _frontmatter = {};\n\nconst makeShortcode = name => function MDXDefaultShortcode(props) {\n console.warn(\"Component \" + name + \" was not imported, exported, or provided by MDXProvider as global scope\");\n return
;\n};\n\nconst Alert = makeShortcode(\"Alert\");\nconst CodeBlock = makeShortcode(\"CodeBlock\");\nconst layoutProps = {\n _frontmatter\n};\nconst MDXLayout = DefaultLayout;\nexport default function MDXContent({\n components,\n ...props\n}) {\n return{`In this documentation, we will explore basic certificate operations using the `}
{`This tutorial assumes you have created a Smallstep Team and a Certificate Manager Authority using the steps in `}{`Getting Started`}{`.`}
\n{`With an Authority created and your local client configured,\nyou can create a test certificate by running the `}
{`In this command, we are asking the CA to create a certificate with the following properties`}
\n{`When you run this command, it will envoke the `}
{`You can inspect your certificate by running:`}
\n{`It should look similar to this.`}
\n{`X.509v3 TLS Certificate (ECDSA P-256) [Serial: 2441...2018]\n Subject: myservice\n admin@yourco.com\n https://auth.smallstep.com#98496ed4-7f27-4367-b7a2-ef828e0a4eda\n Issuer: Dev Intermediate CA\n Provisioner: authority-admin [ID: 909d...8521]\n Valid from: 2021-10-04T21:30:12Z\n to: 2021-10-05T21:31:12Z\n`}
\n {`Certificates expire.\nCertificate Manager makes renewing a certificate ahead of expiration easy.\nRenewals are authenticated using your existing certificate and produce an identical certificate with a new serial number and extended lifetime.\nThe private key is unchanged.`}
\n{`In its most primitive form, renewal is a simple single-command operation:`}
\n{`More than a dozen `}{`command-line flags`}{` make `}
{`Inspect your certificate again, and you will see it has an extended lifetime. `}
\n{`Certificate Manager uses passive revocation by default.\nTo passively revoke a certificate means to block its renewal at the CA.\nThis eliminates the additional network request that occurs when using active revocation because the certificate expires by itself.\nWith passive revocation, certificates cannot be immediately revoked.\nTherefore, certificates should have a shorter life to reduce the value of a key that has been exfiltrated.\nTo revoke a certificate, run the following operation.`}
\n{`Upon expiry, this certificate will no longer be valid.\nIf you try to renew the certificate, it will fail.`}
\n{`Passive revocation doesn't use Certificate Revocation List (CRL) and Online Certificate Signing Protocol (OCSP) like Web PKI.\nCertificate Manager support for CRL and OCSP is coming soon.`}
\n