2018-11-01 07:46:13 +00:00
# Step Certificates
2019-02-19 00:00:16 +00:00
An online certificate authority and related tools for secure automated certificate management, so you can use TLS everywhere.
2019-08-28 18:58:53 +00:00
This repository is for `step-ca` , a certificate authority that exposes an API for automated certificate management. It also contains a [golang SDK ](https://github.com/smallstep/certificates/tree/master/examples#basic-client-usage ) for interacting with `step-ca` programatically. However, you'll probably want to use the [`step` command-line tool ](https://github.com/smallstep/cli ) to operate `step-ca` and get certificates, instead of using this low-level SDK directly.
**Questions? Find us [on gitter ](https://gitter.im/smallstep/community ).**
2019-02-19 00:00:16 +00:00
[Website ](https://smallstep.com ) |
2019-04-30 00:50:30 +00:00
[Documentation ](#documentation ) |
2019-02-19 00:00:16 +00:00
[Installation Guide ](#installation-guide ) |
[Getting Started ](./docs/GETTING_STARTED.md ) |
[Contribution Guide ](./docs/CONTRIBUTING.md )
[![GitHub release ](https://img.shields.io/github/release/smallstep/certificates.svg )](https://github.com/smallstep/certificates/releases)
2019-02-27 20:10:38 +00:00
[![Join the chat at https://gitter.im/smallstep/community ](https://badges.gitter.im/Join%20Chat.svg )](https://gitter.im/smallstep/community)
2019-02-19 00:00:16 +00:00
[![CA Image ](https://images.microbadger.com/badges/image/smallstep/step-ca.svg )](https://microbadger.com/images/smallstep/step-ca)
[![Go Report Card ](https://goreportcard.com/badge/github.com/smallstep/certificates )](https://goreportcard.com/report/github.com/smallstep/certificates)
[![Build Status ](https://travis-ci.com/smallstep/certificates.svg?branch=master )](https://travis-ci.com/smallstep/certificates)
[![License ](https://img.shields.io/badge/License-Apache%202.0-blue.svg )](https://opensource.org/licenses/Apache-2.0)
[![CLA assistant ](https://cla-assistant.io/readme/badge/smallstep/certificates )](https://cla-assistant.io/smallstep/certificates)
2018-11-01 07:46:13 +00:00
2019-02-16 01:47:20 +00:00
[![GitHub stars ](https://img.shields.io/github/stars/smallstep/certificates.svg?style=social )](https://github.com/smallstep/certificates/stargazers)
[![Twitter followers ](https://img.shields.io/twitter/follow/smallsteplabs.svg?label=Follow&style=social )](https://twitter.com/intent/follow?screen_name=smallsteplabs)
2019-05-01 23:00:34 +00:00
![Animated terminal showing step certificates in practice ](https://github.com/smallstep/certificates/raw/master/docs/images/step-ca-2-legged.gif )
2019-02-11 21:00:18 +00:00
2019-08-28 18:58:53 +00:00
## Features
It's super easy to get started and to operate `step-ca` thanks to [streamlined initialization ](https://github.com/smallstep/certificates#lets-get-started ) and [safe, sane defaults ](https://github.com/smallstep/certificates/blob/master/docs/defaults.md ). **Get started in 15 minutes.**
### A private certificate authority you run yourself
- Issue client and server certificates to VMs, containers, devices, and people using internal hostnames and emails
- [RFC5280 ](https://tools.ietf.org/html/rfc5280 ) and [CA/Browser Forum ](https://cabforum.org/baseline-requirements-documents/ ) compliant certificates that work **for TLS and HTTPS** (SSH coming soon!)
- Choose key types (RSA, ECDSA, EdDSA) & lifetimes to suit your needs
- [Short-lived certificates ](https://smallstep.com/blog/passive-revocation.html ) with **fully automated** enrollment, renewal, and revocation
- Fast, stable, and capable of high availability deployment using [root federation ](https://smallstep.com/blog/step-v0.8.3-federation-root-rotation.html ) and/or multiple intermediaries
- Operate as an online intermediate for an existing root CA
- [Pluggable database backends ](https://github.com/smallstep/certificates/blob/master/docs/database.md ) for persistence
- [Helm charts ](https://hub.helm.sh/charts/smallstep/step-certificates ), [autocert ](https://github.com/smallstep/autocert ), and [cert-manager integration ](https://github.com/smallstep/step-issuer ) for kubernetes
### Lots of (automatable) ways to get certificates
- [Single sign-on ](https://smallstep.com/blog/easily-curl-services-secured-by-https-tls.html ) using Okta, GSuite, Active Directory, or any other OAuth OIDC identity provider
2019-09-05 21:15:32 +00:00
- [Instance identity documents ](https://smallstep.com/blog/embarrassingly-easy-certificates-on-aws-azure-gcp/ ) for VMs on AWS, GCP, and Azure
2019-08-28 18:58:53 +00:00
- [Single-use short-lived tokens ](https://smallstep.com/docs/design-doc.html#jwk-provisioner ) issued by your CD tool — Puppet, Chef, Ansible, Terraform, etc.
- Use an existing certificate from another CA (e.g., using a device certificate like [Twilio's Trust OnBoard ](https://www.twilio.com/wireless/trust-onboard )) *coming soon*
- ACMEv2 (RFC8555) support so you can **run your own private ACME server** *[coming soon](https://github.com/smallstep/certificates/tree/acme)*
### Easy certificate management and automation via [`step` CLI](https://github.com/smallstep/cli) [integration](https://smallstep.com/docs/cli/ca/)
- Generate key pairs where they're needed so private keys are never transmitted across the network
- [Authenticate and obtain a certificate ](https://smallstep.com/docs/cli/ca/certificate/ ) using any enrollment mechanism supported by `step-ca`
- Securely [distribute root certificates ](https://smallstep.com/docs/cli/ca/root/ ) and [bootstrap ](https://smallstep.com/docs/cli/ca/bootstrap/ ) PKI relying parties
- [Renew ](https://smallstep.com/docs/cli/ca/renew/ ) and [revoke ](https://smallstep.com/docs/cli/ca/revoke/ ) certificates issued by `step-ca`
- [Install root certificates ](https://smallstep.com/docs/cli/certificate/install/ ) so your CA is trusted by default (issue development certificates **that [work in browsers](https://smallstep.com/blog/step-v0-8-6-valid-HTTPS-certificates-for-dev-pre-prod.html)** )
- [Inspect ](https://smallstep.com/docs/cli/certificate/inspect/ ) and [lint ](https://smallstep.com/docs/cli/certificate/lint/ ) certificates
2019-02-19 00:00:16 +00:00
## Motivation
2018-11-13 20:47:07 +00:00
Managing your own *public key infrastructure* (PKI) can be tedious and error
prone. Good security hygiene is hard. Setting up simple PKI is out of reach for
2019-02-19 00:00:16 +00:00
many small teams, and following best practices like proper certificate
revocation and rolling is challenging even for experts.
Amongst numerous use cases, proper PKI makes it easy to use mTLS (mutual TLS)
to improve security and to make it possible to connect services across the
public internet. Unlike VPNs & SDNs, deploying and scaling mTLS is pretty
easy. You're (hopefully) already using TLS, and your existing tools and
standard libraries will provide most of what you need. If you know how to
operate DNS and reverse proxies, you know how to operate mTLS
infrastructure.
2019-02-12 20:09:55 +00:00
2019-02-19 00:00:16 +00:00
![Connect it all with
2019-05-01 23:00:34 +00:00
mTLS](https://raw.githubusercontent.com/smallstep/certificates/master/docs/images/connect-with-mtls-2.png)
2019-02-12 20:09:55 +00:00
2019-02-19 00:00:16 +00:00
There's just one problem: **you need certificates issued by your own
certificate authority (CA)**. Building and operating a CA, issuing
certificates, and making sure they're renewed before they expire is tricky.
2019-03-28 18:00:30 +00:00
This project provides the infrastructure, automations, and workflows you'll
2019-02-19 00:00:16 +00:00
need.
2019-02-12 20:09:55 +00:00
2019-02-19 00:00:16 +00:00
`step certificates` is part of smallstep's broader security architecture, which
makes it much easier to implement good security practices early, and
incrementally improve them as your system matures.
2019-02-12 20:09:55 +00:00
2019-08-28 18:58:53 +00:00
For more information and [docs ](https://smallstep.com/docs ) see [the smallstep
2019-02-19 00:00:16 +00:00
website](https://smallstep.com/certificates) and the [blog
2019-08-28 18:58:53 +00:00
post](https://smallstep.com/blog/step-certificates.html) announcing this project.
2018-11-01 07:46:13 +00:00
2019-02-19 00:00:16 +00:00
## Installation Guide
2018-11-01 07:46:13 +00:00
2019-02-19 00:00:16 +00:00
These instructions will install an OS specific version of the `step-ca` binary on
2018-11-01 07:46:13 +00:00
your local machine.
2019-08-28 18:58:53 +00:00
While `step` is not required to run `step-ca` , it will make your life easier so you'll probably want to [install it ](https://github.com/smallstep/cli#installation-guide ) too.
2018-11-01 07:46:13 +00:00
2019-02-19 00:00:16 +00:00
### Mac OS
2018-11-01 07:46:13 +00:00
2019-08-28 18:58:53 +00:00
Install `step` and `step-ca` together via [Homebrew ](https://brew.sh/ ):
2018-11-01 07:46:13 +00:00
2019-08-31 00:58:52 +00:00
< pre > < code > < b > $ brew install step< / b >
2018-11-01 07:46:13 +00:00
2019-02-19 00:00:16 +00:00
# Test installation ...
< b > $ step certificate inspect https://smallstep.com< / b >
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 326381749415081530968054238478851085504954 (0x3bf265673332db2d0c70e48a163fb7d11ba)
Signature Algorithm: SHA256-RSA
Issuer: C=US,O=Let's Encrypt,CN=Let's Encrypt Authority X3
2019-08-31 00:58:52 +00:00
...< / code > < / pre >
2018-11-01 07:46:13 +00:00
2019-02-19 00:00:16 +00:00
> Note: If you have installed `step` previously through the `smallstep/smallstep`
> tap you will need to run the following commands before installing:
2019-08-31 00:58:52 +00:00
>
> ```
> $ brew untap smallstep/smallstep
> $ brew uninstall step
> ```
2018-11-01 07:46:13 +00:00
2019-02-19 00:00:16 +00:00
### Linux
2018-11-21 03:46:22 +00:00
2019-04-11 23:02:13 +00:00
#### Debian
2019-08-28 18:58:53 +00:00
1. [Optional] Install `step` .
2018-11-21 03:46:22 +00:00
2019-02-19 00:00:16 +00:00
Download the latest Debian package from
2019-08-28 18:58:53 +00:00
[`step` releases ](https://github.com/smallstep/cli/releases ):
2018-11-21 03:46:22 +00:00
2019-02-19 00:00:16 +00:00
```
$ wget https://github.com/smallstep/cli/releases/download/X.Y.Z/step_X.Y.Z_amd64.deb
```
2018-11-21 03:46:22 +00:00
2019-02-19 00:00:16 +00:00
Install the Debian package:
2018-11-21 03:46:22 +00:00
2018-11-21 06:30:13 +00:00
```
2019-02-19 00:00:16 +00:00
$ sudo dpkg -i step_X.Y.Z_amd64.deb
2018-11-21 06:30:13 +00:00
```
2018-11-21 03:46:22 +00:00
2019-08-28 18:58:53 +00:00
2. Install `step-ca` .
2018-11-21 03:46:22 +00:00
2019-08-28 18:58:53 +00:00
Download the latest Debian package from [releases ](https://github.com/smallstep/certificates/releases ):
2018-11-21 03:46:22 +00:00
2018-11-21 06:30:13 +00:00
```
2019-02-19 00:00:16 +00:00
$ wget https://github.com/smallstep/certificates/releases/download/X.Y.Z/step-certificates_X.Y.Z_amd64.deb
2018-11-21 06:30:13 +00:00
```
2018-11-21 03:46:22 +00:00
2019-02-19 00:00:16 +00:00
Install the Debian package:
2018-11-21 03:46:22 +00:00
2018-11-21 06:30:13 +00:00
```
2019-02-19 00:00:16 +00:00
$ sudo dpkg -i step-certificates_X.Y.Z_amd64.deb
2018-11-21 06:30:13 +00:00
```
2018-11-21 03:46:22 +00:00
2019-04-11 23:02:13 +00:00
#### Arch Linux
We are using the [Arch User Repository ](https://aur.archlinux.org ) to distribute
`step` binaries for Arch Linux.
2019-08-28 18:58:53 +00:00
* [Optional] The `step` binary tarball can be found [here ](https://aur.archlinux.org/packages/step-cli-bin/ ).
2019-04-11 23:02:13 +00:00
* The `step-ca` binary tarball can be found [here ](https://aur.archlinux.org/packages/step-ca-bin/ ).
You can use [pacman ](https://www.archlinux.org/pacman/ ) to install the packages.
2019-08-28 18:58:53 +00:00
### Kubernetes
We publish [helm charts ](https://hub.helm.sh/charts/smallstep/step-certificates ) for easy installation on kubernetes:
```
helm install step-certificates
```
> <a href="https://github.com/smallstep/autocert"><img width="25%" src="https://raw.githubusercontent.com/smallstep/autocert/master/autocert-logo.png"></a>
>
> If you're using Kubernetes, make sure you [check out
> autocert](https://github.com/smallstep/autocert): a kubernetes add-on that builds on `step
> certificates` to automatically inject TLS/HTTPS certificates into your containers.
2019-04-11 23:02:13 +00:00
### Test
2018-11-01 07:46:13 +00:00
2019-08-31 00:58:52 +00:00
< pre > < code > < b > $ step version< / b >
2019-08-28 18:58:53 +00:00
Smallstep CLI/0.10.0 (darwin/amd64)
Release Date: 2019-04-30 19:01 UTC
2019-04-11 23:04:40 +00:00
< b > $ step-ca version< / b >
2019-08-28 18:58:53 +00:00
Smallstep CA/0.10.0 (darwin/amd64)
2019-08-31 00:58:52 +00:00
Release Date: 2019-04-30 19:02 UTC< / code > < / pre >
2018-11-13 20:47:07 +00:00
2019-02-19 00:00:16 +00:00
## Quickstart
2018-11-13 20:47:07 +00:00
2019-02-19 00:00:16 +00:00
In the following guide we'll run a simple `hello` server that requires clients
2019-08-28 18:58:53 +00:00
to connect over an authorized and encrypted channel using HTTPS. `step-ca`
will issue certificates to our server, allowing it to authenticate and encrypt
communication. Let's get started!
2018-11-12 22:19:30 +00:00
2019-02-19 00:00:16 +00:00
### Prerequisites
2018-11-12 22:19:30 +00:00
2019-02-19 00:00:16 +00:00
* [`step` ](#installation-guide )
* [golang ](https://golang.org/doc/install )
2018-11-12 22:19:30 +00:00
2019-02-19 00:00:16 +00:00
### Let's get started!
2018-11-12 22:19:30 +00:00
2019-08-28 18:58:53 +00:00
#### 1. Run `step ca init` to create your CA's keys & certificates and configure `step-ca`:
2019-08-31 00:58:52 +00:00
< pre > < code > < b > $ step ca init< / b >
2019-08-28 18:58:53 +00:00
✔ What would you like to name your new PKI? (e.g. Smallstep): < b > Example Inc.< / b >
✔ What DNS names or IP addresses would you like to add to your new CA? (e.g. ca.smallstep.com[,1.1.1.1,etc.]): < b > localhost< / b >
✔ What address will your new CA listen at? (e.g. :443): < b > 127.0.0.1:8080< / b >
✔ What would you like to name the first provisioner for your new CA? (e.g. you@smallstep.com): < b > bob@example.com< / b >
✔ What do you want your password to be? [leave empty and we'll generate one]: < b > abc123< / b >
Generating root certificate...
all done!
Generating intermediate certificate...
all done!
✔ Root certificate: /Users/bob/src/github.com/smallstep/step/.step/certs/root_ca.crt
✔ Root private key: /Users/bob/src/github.com/smallstep/step/.step/secrets/root_ca_key
✔ Root fingerprint: 702a094e239c9eec6f0dcd0a5f65e595bf7ed6614012825c5fe3d1ae1b2fd6ee
✔ Intermediate certificate: /Users/bob/src/github.com/smallstep/step/.step/certs/intermediate_ca.crt
✔ Intermediate private key: /Users/bob/src/github.com/smallstep/step/.step/secrets/intermediate_ca_key
✔ Default configuration: /Users/bob/src/github.com/smallstep/step/.step/config/defaults.json
✔ Certificate Authority configuration: /Users/bob/src/github.com/smallstep/step/.step/config/ca.json
2019-08-31 00:58:52 +00:00
Your PKI is ready to go. To generate certificates for individual services see 'step help ca'.< / code > < / pre >
2018-11-13 20:47:07 +00:00
2019-08-28 18:58:53 +00:00
This command will:
2018-11-12 22:19:30 +00:00
2019-08-28 18:58:53 +00:00
- Generate [password protected ](https://github.com/smallstep/certificates/blob/master/docs/GETTING_STARTED.md#passwords ) private keys for your CA to sign certificates
- Generate a root and [intermediate signing certificate ](https://security.stackexchange.com/questions/128779/why-is-it-more-secure-to-use-intermediate-ca-certificates ) for your CA
- Create a JSON configuration file for `step-ca` (see [getting started ](./docs/GETTING_STARTED.md ) for details)
2018-11-12 22:19:30 +00:00
2019-08-28 18:58:53 +00:00
You can find these artifacts in `$STEPPATH` (or `~/.step` by default).
2018-11-12 22:19:30 +00:00
2019-08-28 18:58:53 +00:00
#### 2. Start `step-ca`:
2018-11-12 22:19:30 +00:00
2019-08-28 18:58:53 +00:00
You'll be prompted for your password from the previous step, to decrypt the CA's private signing key:
2018-11-12 22:19:30 +00:00
2019-08-31 00:58:52 +00:00
< pre > < code > < b > $ step-ca $(step path)/config/ca.json< / b >
2019-08-28 18:58:53 +00:00
Please enter the password to decrypt /Users/bob/src/github.com/smallstep/step/.step/secrets/intermediate_ca_key: < b > abc123< / b >
2019-08-31 00:58:52 +00:00
2019/02/18 13:28:58 Serving HTTPS on 127.0.0.1:8080 ...< / code > < / pre >
2018-11-01 07:46:13 +00:00
2019-08-28 18:58:53 +00:00
#### 3. Copy our `hello world` golang server.
2018-11-13 20:47:07 +00:00
2019-08-28 18:58:53 +00:00
```
$ cat > srv.go < < EOF
package main
import (
"net/http"
"log"
)
func HiHandler(w http.ResponseWriter, req *http.Request) {
w.Header().Set("Content-Type", "text/plain")
w.Write([]byte("Hello, world!\n"))
}
func main() {
http.HandleFunc("/hi", HiHandler)
err := http.ListenAndServeTLS(":8443", "srv.crt", "srv.key", nil)
if err != nil {
log.Fatal(err)
}
}
EOF
```
2018-11-13 20:47:07 +00:00
2019-08-28 18:58:53 +00:00
#### 4. Get an identity for your server from the Step CA.
2018-11-13 20:47:07 +00:00
2019-08-31 00:58:52 +00:00
< pre > < code > < b > $ step ca certificate localhost srv.crt srv.key< / b >
2019-08-28 18:58:53 +00:00
✔ Key ID: rQxROEr7Kx9TNjSQBTETtsu3GKmuW9zm02dMXZ8GUEk (bob@example.com)
✔ Please enter the password to decrypt the provisioner key: abc123
✔ CA: https://localhost:8080/1.0/sign
✔ Certificate: srv.crt
✔ Private Key: srv.key
< b > $ step certificate inspect --bundle srv.crt< / b >
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 140439335711218707689123407681832384336 (0x69a7a1d7f6f22f68059d2d9088307750)
Signature Algorithm: ECDSA-SHA256
Issuer: CN=Example Inc. Intermediate CA
Validity
Not Before: Feb 18 21:32:35 2019 UTC
Not After : Feb 19 21:32:35 2019 UTC
Subject: CN=localhost
...
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 207035091234452090159026162349261226844 (0x9bc18217bd560cf07db23178ed90835c)
Signature Algorithm: ECDSA-SHA256
Issuer: CN=Example Inc. Root CA
Validity
Not Before: Feb 18 21:27:21 2019 UTC
Not After : Feb 15 21:27:21 2029 UTC
Subject: CN=Example Inc. Intermediate CA
2019-08-31 00:58:52 +00:00
...< / code > < / pre >
2018-11-13 20:47:07 +00:00
2019-08-28 18:58:53 +00:00
Note that `step` and `step-ca` handle details like [certificate bundling ](https://smallstep.com/blog/everything-pki.html#intermediates-chains-and-bundling ) for you.
2018-11-01 07:46:13 +00:00
2019-08-28 18:58:53 +00:00
#### 5. Run the simple server.
2018-11-01 07:46:13 +00:00
2019-08-31 00:58:52 +00:00
< pre > < code > < b > $ go run srv.go & < / b > < / code > < / pre >
2018-11-21 06:30:13 +00:00
2019-08-28 18:58:53 +00:00
#### 6. Get the root certificate from the Step CA.
2019-02-19 00:00:16 +00:00
2019-08-28 18:58:53 +00:00
In a new Terminal window:
2019-02-19 00:00:16 +00:00
2019-08-31 00:58:52 +00:00
< pre > < code > < b > $ step ca root root.crt< / b >
The root certificate has been saved in root.crt.< / code > < / pre >
2019-02-19 00:00:16 +00:00
2019-08-28 18:58:53 +00:00
#### 7. Make an authenticated, encrypted curl request to your server using HTTP over TLS.
2018-11-21 06:30:13 +00:00
2019-08-31 00:58:52 +00:00
< pre > < code > < b > $ curl --cacert root.crt https://localhost:8443/hi< / b >
Hello, world!< / code > < / pre >
2019-02-19 00:00:16 +00:00
*All Done!*
Check out the [Getting Started ](./docs/GETTING_STARTED.md ) guide for more examples
and best practices on running Step CA in production.
2018-11-21 06:30:13 +00:00
2019-02-19 00:00:16 +00:00
## Documentation
2018-11-21 06:30:13 +00:00
2019-04-30 00:50:30 +00:00
Documentation can be found in a handful of different places:
2018-11-21 06:30:13 +00:00
2019-04-30 00:51:35 +00:00
1. The [docs ](./docs/README.md ) sub-repo has an index of documentation and tutorials.
2018-11-21 06:30:13 +00:00
2019-04-30 00:50:30 +00:00
2. On the command line with `step ca help xxx` where `xxx` is the subcommand
you are interested in. Ex: `step help ca provisioners list` .
2018-11-21 06:30:13 +00:00
2019-04-30 00:50:30 +00:00
3. On the web at https://smallstep.com/docs/certificates.
2019-06-11 15:28:43 +00:00
4. On your browser by running `step help --http=:8080 ca` from the command line
2019-04-30 00:50:30 +00:00
and visiting http://localhost:8080.
2018-11-21 06:30:13 +00:00
2019-06-11 15:28:43 +00:00
2018-11-21 06:30:13 +00:00
## The Future
We plan to build more tools that facilitate the use and management of zero trust
networks.
* Tell us what you like and don't like about managing your PKI - we're eager to
help solve problems in this space.
* Tell us what features you'd like to see - open issues or hit us on
[Twitter ](https://twitter.com/smallsteplabs ).
2019-02-19 00:00:16 +00:00
## Further Reading
2018-11-14 05:37:06 +00:00
2019-09-03 22:59:21 +00:00
Check out the [Getting Started ](https://smallstep.com/docs/getting-started/ ) guide for more examples
2019-02-19 00:00:16 +00:00
and best practices on running Step CA in production.