🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.
You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
Go to file
max furman d6203eb251 [action] use cosign to sign over goreleaser artifacts 3 years ago
.github [action] use cosign to sign over goreleaser artifacts 3 years ago
acme Merge pull request #557 from joejulian/http01-isv 3 years ago
api Clone the certificate in case we need to look at it later. 3 years ago
authority Initialize required variables on GetIdentityToken 3 years ago
autocert Use REAMDE.md suggested in code review. 5 years ago
ca Update test with default tls options. 3 years ago
cas Add an option to avoid password prompts on step cas 3 years ago
cmd Merge pull request #612 from gdbelvin/kmspin 3 years ago
commands Remove extra space. 3 years ago
db Fix typos. 4 years ago
debian [action] debian rules syntax 3 years ago
docker Make the default provisioner name optional; change DNS names variable name 3 years ago
docs Merge pull request #609 from smallstep/discord 3 years ago
errs Fix error message of bad request 4 years ago
examples Fix example and use ClientCAs. 4 years ago
kms Make kms uri compatible with Go 1.17. 3 years ago
logging Log successful /health requests at Trace lvl 3 years ago
make [action] change step-certificates to step-ca where possible 3 years ago
monitoring ca-component -> certificates 6 years ago
pki Fix ssh in helm chart values. 3 years ago
scep Admin level API for provisioner mgmt v1 3 years ago
scripts Just adding a comment to the step-ra install script 3 years ago
server ServetTLS => ServeTLS in function docs 5 years ago
systemd Fix needs-renewal condition and switch to using ExecCondition 3 years ago
templates Update sshd_config.tpl to a Match all block. 3 years ago
.VERSION Added version operability for `git archive` tarball (non git repo) 5 years ago
.dockerignore Remove dockerignore files that are in the repo. 3 years ago
.gitattributes Added version operability for `git archive` tarball (non git repo) 5 years ago
.gitignore Add support for TLS-ALPN-01 challenge. 4 years ago
.golangci.yml Admin level API for provisioner mgmt v1 3 years ago
.goreleaser.yml [action] use cosign to sign over goreleaser artifacts 3 years ago
.version.sh Added version operability for `git archive` tarball (non git repo) 5 years ago
CHANGELOG.md first pass at README 6 years ago
LICENSE Add full version of the license. 4 years ago
Makefile Bump golangci-lint to latest 3 years ago
README.md Add Certificate Manager notice for the pragmatic folks 3 years ago
cosign.pub [action] use cosign to sign over goreleaser artifacts 3 years ago
go.mod Update go.step.sm/crypto 3 years ago
go.sum Update go.step.sm/crypto 3 years ago
icon.png Commit icons. 5 years ago
icon.svg Commit icons. 5 years ago

README.md

Step Certificates

step-ca is an online certificate authority for secure, automated certificate management. It's the server counterpart to the step CLI tool.

You can use it to:

  • Issue X.509 certificates for your internal infrastructure:
    • HTTPS certificates that work in browsers (RFC5280 and CA/Browser Forum compliance)
    • TLS certificates for VMs, containers, APIs, mobile clients, database connections, printers, wifi networks, toaster ovens...
    • Client certificates to enable mutual TLS (mTLS) in your infra. mTLS is an optional feature in TLS where both client and server authenticate each other. Why add the complexity of a VPN when you can safely use mTLS over the public internet?
  • Issue SSH certificates:
    • For people, in exchange for single sign-on ID tokens
    • For hosts, in exchange for cloud instance identity documents
  • Easily automate certificate management:

Whatever your use case, step-ca is easy to use and hard to misuse, thanks to safe, sane defaults.


Don't want to run your own CA? To get up and running quickly, or as an alternative to running your own step-ca server, consider creating a free hosted smallstep Certificate Manager authority.


Questions? Find us in Discussions or Join our Discord.

Website | Documentation | Installation | Getting Started | Contributor's Guide

GitHub release Go Report Card Build Status License CLA assistant

GitHub stars Twitter followers

Features

🦾 A fast, stable, flexible private CA

Setting up a public key infrastructure (PKI) is out of reach for many small teams. step-ca makes it easier.

⚙️ Many ways to automate

There are several ways to authorize a request with the CA and establish a chain of trust that suits your flow.

You can issue certificates in exchange for:

🏔 Your own private ACME server

ACME is the protocol used by Let's Encrypt to automate the issuance of HTTPS certificates. It's super easy to issue certificates to any ACMEv2 (RFC8555) client.

👩🏽‍💻 An online SSH Certificate Authority

  • Delegate SSH authentication to step-ca by using SSH certificates instead of public keys and authorized_keys files
  • For user certificates, connect SSH to your single sign-on provider, to improve security with short-lived certificates and MFA (or other security policies) via any OAuth OIDC provider.
  • For host certificates, improve security, eliminate TOFU warnings, and set up automated host certificate renewal.

🤓 A general purpose PKI tool, via step CLI integration

Installation

See our installation docs here.

Documentation

Documentation can be found in a handful of different places:

  1. On the web at https://smallstep.com/docs/step-ca.

  2. On the command line with step help ca xxx where xxx is the subcommand you are interested in. Ex: step help ca provisioner list.

  3. In your browser, by running step help --http=:8080 ca from the command line and visiting http://localhost:8080.

  4. The docs folder is being deprecated, but it still has some documentation and tutorials.

Feedback?