Smallstep: End-to-end encryption for distributed applications and the people who manage them. (we’re on Pacific Time)
step ca revoke
is tied to step ca renew
. What I mean by that is, if you use a different method to renew the cert then it doesn’t actually go through the same processes. For example, regular ACME client renewal does not work the same way that step ca renew
works. In the ACME protocol when you renew a cert you don’t send in the old cert. You just go through the ACME protocol once more with the same information.
step ca revoke
only works if you plan to use step ca renew
for renewals. For other clients it “probably” will not work because other clients do not send in the old certificate as part of the renewal flow.
step ca renew
. It has all sorts of useful flags that allow it to run as a daemon, periodically attempt renewal, etc.
Hello,
In my GCP account, I have distributed an instance of Smallstep ACME Registration Authority for CAS to test the product. The sensations are very good; the deploy has been very fast and easy. Congratulations on the product. One question, can an ACME smallstep server only issue final certificates from a subCA generated in Google CAS? In other words, is the caCAS value unique? Can't it have several values? I mention this because if an enterprise's PKI infrastructure is generated in Google, it is very likely that it is made up of several SubCA's ( my on-premise PKI is made up of four SubCA's, for example, for compliance needs among others... ) Thank you.
step ca token
to work out the sort of token you'd want your server to generate.
step ca certificate
using --token
to request a certificate from the CA using a token)
step-ca
be an intermediate in that sort of setup.
error validating ACME Challenge at https://tinyca.lan/acme/acme/challenge/Rrk1iKFeEjDRkFu0w025Ogty17RsL2R0: client GET https://tinyca.lan/acme/acme/new-order failed: Post "https://tinyca.lan/acme/acme/challenge/Rrk1iKFeEjDRkFu0w025Ogty17RsL2R0": stream error: stream ID 17; INTERNAL_ERROR