step-ca
step-ca
step-ca
in a Docker containerstep-ca
step-ca
step-ca
in a Docker containerstep beta ca provisioner update
step beta ca provisioner update -- update a provisioner
step beta ca provisioner update <name> [--public-key=<file>]
[--private-key=<file>] [--create] [--password-file=<file>]
[--admin-cert=<file>] [--admin-key=<file>] [--admin-provisioner=<name>]
[--admin-subject=<subject>] [--password-file=<file>] [--ca-url=<uri>]
[--root=<file>] [--context=<name>]
ACME
step beta ca provisioner update <name> [--force-cn] [--require-eab] [--disable-eab]
[--admin-cert=<file>] [--admin-key=<file>] [--admin-provisioner=<name>]
[--admin-subject=<subject>] [--password-file=<file>] [--ca-url=<uri>]
[--root=<file>] [--context=<name>]
OIDC
step beta ca provisioner update <name>
[--client-id=<id>] [--client-secret=<secret>]
[--configuration-endpoint=<url>] [--listen-address=<address>]
[--domain=<domain>] [--remove-domain=<domain>]
[--group=<group>] [--remove-group=<group>]
[--admin=<email>]... [--remove-admin=<email>]...
[--admin-cert=<file>] [--admin-key=<file>] [--admin-provisioner=<name>]
[--admin-subject=<subject>] [--password-file=<file>] [--ca-url=<uri>]
[--root=<file>] [--context=<name>]
X5C
step beta ca provisioner update <name> --x5c-root=<file>
[--admin-cert=<file>] [--admin-key=<file>] [--admin-provisioner=<name>]
[--admin-subject=<subject>] [--password-file=<file>] [--ca-url=<uri>]
[--root=<file>] [--context=<name>]
Kubernetes Service Account
step beta ca provisioner update <name> [--public-key=<file>]
[--admin-cert=<file>] [--admin-key=<file>] [--admin-provisioner=<name>]
[--admin-subject=<subject>] [--password-file=<file>] [--ca-url=<uri>]
[--root=<file>] [--context=<name>]
IID (AWS/GCP/Azure)
step beta ca provisioner update <name>
[--aws-account=<id>]... [--remove-aws-account=<id>]...
[--gcp-service-account=<name>]... [--remove-gcp-service-account=<name>]...
[--gcp-project=<name>]... [--remove-gcp-project=<name>]...
[--azure-tenant=<id>] [--azure-resource-group=<name>] [--azure-subscription-id=<id>] [--azure-object-id=<id>]
[--instance-age=<duration>] [--iid-roots=<file>]
[--disable-custom-sans] [--disable-trust-on-first-use]
[--admin-cert=<file>] [--admin-key=<file>] [--admin-provisioner=<name>]
[--admin-subject=<subject>] [--password-file=<file>] [--ca-url=<uri>]
[--root=<file>] [--context=<name>]
step ca provisioner update updates a provisioner in the CA configuration.
WARNING: The 'beta' prefix is deprecated and will be removed in a future release. Please use 'step ca admin ...' going forwards.
name
The name of the provisioner.
--name=name
The new name
for the provisioner.
--x509-template=file
The x509 certificate template file
, a JSON representation of the certificate to create.
--x509-template-data=file
The x509 certificate template data file
, a JSON map of data that can be used by the certificate template.
--ssh-template=file
The x509 certificate template file
, a JSON representation of the certificate to create.
--ssh-template-data=file
The ssh certificate template data file
, a JSON map of data that can be used by the certificate template.
--x509-min-dur=duration
The minimum duration
for an x509 certificate generated by this provisioner.
--x509-max-dur=duration
The maximum duration
for an x509 certificate generated by this provisioner.
--x509-default-dur=duration
The default duration
for an x509 certificate generated by this provisioner.
--ssh-user-min-dur=duration
The minimum duration
for an ssh user certificate generated by this provisioner.
--ssh-user-max-dur=duration
The maximum duration
for an ssh user certificate generated by this provisioner.
--ssh-user-default-dur=duration
The maximum duration
for an ssh user certificate generated by this provisioner.
--ssh-host-min-dur=duration
The minimum duration
for an ssh host certificate generated by this provisioner.
--ssh-host-max-dur=duration
The maximum duration
for an ssh host certificate generated by this provisioner.
--ssh-host-default-dur=duration
The maximum duration
for an ssh host certificate generated by this provisioner.
--disable-renewal Disable renewal for all certificates generated by this provisioner.
--allow-renewal-after-expiry Allow renewals for expired certificates generated by this provisioner.
--x509 Enable provisioning of x509 certificates.
--ssh Enable provisioning of ssh certificates.
--create Create the JWK key pair for the provisioner.
--private-key=file
The file
containing the JWK private key.
--public-key=file
The file
containing the JWK public key.
--client-id=id
The id
used to validate the audience in an OpenID Connect token.
--client-secret=secret
The secret
used to obtain the OpenID Connect tokens.
--listen-address=address
The callback address
used in the OpenID Connect flow (e.g. ":10000")
--configuration-endpoint=url
OpenID Connect configuration url
.
--admin=email
The email
of an admin user in an OpenID Connect provisioner, this user
will not have restrictions in the certificates to sign. Use the
'--admin' flag multiple times to configure multiple administrators.
--remove-admin=email
Remove the email
of an admin user in an OpenID Connect provisioner, this user
will not have restrictions in the certificates to sign. Use the
'--admin' flag multiple times to configure multiple administrators.
--group=group
The group
list used to validate the groups extenstion in an OpenID Connect token.
Use the '--group' flag multiple times to configure multiple groups.
--tenant-id=tenant-id
The tenant-id
used to replace the templatized {tenantid} in the OpenID Configuration.
--x5c-root=file
Root certificate (chain) file
used to validate the signature on X5C
provisioning tokens.
--nebula-root=file
Root certificate (chain) file
used to validate the signature on Nebula
provisioning tokens.
--force-cn Always set the common name in provisioned certificates.
--require-eab Require (and enable) External Account Binding for Account creation.
--disable-eab Disable External Account Binding for Account creation.
--challenge=challenge
The SCEP challenge
to use as a shared secret between a client and the CA
--capabilities=capabilities
The SCEP capabilities
to advertise
--include-root Include the CA root certificate in the SCEP CA certificate chain
--min-public-key-length=length
The minimum public key length
of the SCEP RSA encryption key
--encryption-algorithm-identifier=id
The id
for the SCEP encryption algorithm to use.
Valid values are 0 - 4, inclusive. The values correspond to:
0: DES-CBC,
1: AES-128-CBC,
2: AES-256-CBC,
3: AES-128-GCM,
4: AES-256-GCM.
Defaults to DES-CBC (0) for legacy clients.
--aws-account=id
The AWS account id
used to validate the identity documents.
Use the flag multiple times to configure multiple accounts.
--remove-aws-account=id
Remove an AWS account id
used to validate the identity documents.
Use the flag multiple times to remove multiple accounts.
--azure-tenant=id
The Microsoft Azure tenant id
used to validate the identity tokens.
--azure-resource-group=name
The Microsoft Azure resource group name
used to validate the identity tokens.
Use the flag multiple times to configure multiple resource groups
--remove-azure-resource-group=name
Remove a Microsoft Azure resource group name
used to validate the identity tokens.
Use the flag multiple times to configure multiple resource groups
--azure-subscription-id=id
The Microsoft Azure subscription id
used to validate the identity tokens.
Use the flag multiple times to configure multiple subscription IDs
--remove-azure-subscription-id=id
Remove a Microsoft Azure subscription id
used to validate the identity tokens.
Use the flag multiple times to configure multiple subscription IDs
--azure-object-id=id
The Microsoft Azure AD object id
used to validate the identity tokens.
Use the flag multiple times to configure multiple object IDs
--remove-azure-object-id=id
Remove a Microsoft Azure AD object id
used to validate the identity tokens.
Use the flag multiple times to configure multiple object IDs
--gcp-service-account=email
The Google service account email
or id
used to validate the identity tokens.
Use the flag multiple times to configure multiple service accounts.
--remove-gcp-service-account=email
Remove a Google service account email
or id
used to validate the identity tokens.
Use the flag multiple times to configure multiple service accounts.
--gcp-project=id
The Google project id
used to validate the identity tokens.
Use the flag multiple times to configure multiple projects
--remove-gcp-project=id
Remove a Google project id
used to validate the identity tokens.
Use the flag multiple times to configure multiple projects
--instance-age=duration
The maximum duration
to grant a certificate in AWS and GCP provisioners.
A duration
is sequence of decimal numbers, each with optional fraction and a
unit suffix, such as "300ms", "-1.5h" or "2h45m". Valid time units are "ns",
"us" (or "µs"), "ms", "s", "m", "h".
--iid-roots=file
The file
containing the certificates used to validate the
instance identity documents in AWS.
--disable-custom-sans On cloud provisioners, if enabled only the internal DNS and IP will be added as a SAN. By default it will accept any SAN in the CSR.
--disable-trust-on-first-use, --disable-tofu On cloud provisioners, if enabled multiple sign request for this provisioner with the same instance will be accepted. By default only the first request will be accepted.
--admin-cert=chain
Admin certificate (chain
) in PEM format to store in the 'x5c' header of a JWT.
--admin-key=file
Private key file
, used to sign a JWT, corresponding to the admin certificate that will
be stored in the 'x5c' header.
--admin-provisioner=name
, --admin-issuer=name
The provisioner name
to use for generating admin credentials.
--admin-subject=subject
, --admin-name=subject
The admin subject
to use for generating admin credentials.
--password-file=file
The path to the file
containing the password to encrypt or decrypt the private key.
--ca-url=URI
URI
of the targeted Step Certificate Authority.
--root=file
The path to the PEM file
used as the root certificate authority.
--context=name
The context name
to apply for the given command.
Update a JWK provisioner with newly generated keys and a template for x509 certificates:
step beta ca provisioner update cicd --create --x509-template ./templates/example.tpl
Update a JWK provisioner with duration claims:
step beta ca provisioner update cicd --create --x509-min-dur 20m --x509-default-dur 48h --ssh-user-min-dur 17m --ssh-host-default-dur 16h
Update a JWK provisioner with existing keys:
step beta ca provisioner update jane@doe.com --public-key jwk.pub --private-key jwk.priv
Update a JWK provisioner to disable ssh provisioning:
step beta ca provisioner update cicd --ssh=false
Update an OIDC provisioner:
step beta ca provisioner update Google \
--configuration-endpoint https://accounts.google.com/.well-known/openid-configuration
Update an X5C provisioner:
step beta ca provisioner update x5c --x5c-root x5c_ca.crt
Update an ACME provisioner:
step beta ca provisioner update acme --force-cn --require-eab
Update an K8SSA provisioner:
step beta ca provisioner update kube --public-key key.pub --x509-min-duration 30m
Update an Azure provisioner:
$ step beta ca provisioner update Azure \
--azure-resource-group identity --azure-resource-group accounting
Update a GCP provisioner:
$ step beta ca provisioner update Google \
--disable-custom-sans --gcp-project internal --remove-gcp-project public
Update an AWS provisioner:
$ step beta ca provisioner update Amazon --disable-custom-sans --disable-trust-on-first-use
Update a SCEP provisioner:
step beta ca provisioner update my_scep_provisioner --force-cn
Unsubscribe anytime. See our privacy policy.
© 2023 Smallstep Labs, Inc. All rights reserved.