Step Certificates

用于安全自动证书管理的私有证书颁发机构(X.509 和 SSH)和 ACME 服务器,因此您可以在任何地方使用 TLS,并基于 SSH 使用 SSO。「A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.」

Github星跟踪图

Step Certificates

step-ca is an online certificate authority for secure, automated certificate management. It's the server counterpart to the step CLI tool.

You can use it to:

  • Issue X.509 certificates for your internal infrastructure:
    • HTTPS certificates that work in browsers (RFC5280 and CA/Browser Forum compliance)
    • TLS certificates for VMs, containers, APIs, mobile clients, database connections, printers, wifi networks, toaster ovens...
    • Client certificates to enable mutual TLS (mTLS) in your infra. mTLS is an optional feature in TLS where both client and server authenticate each other. Why add the complexity of a VPN when you can safely use mTLS over the public internet?
  • Issue SSH certificates:
    • For people, in exchange for single sign-on ID tokens
    • For hosts, in exchange for cloud instance identity documents
  • Easily automate certificate management:

Whatever your use case, step-ca is easy to use and hard to misuse, thanks to safe, sane defaults.


Don't want to run your own CA?
To get up and running quickly, or as an alternative to running your own step-ca server, consider creating a free hosted smallstep Certificate Manager authority.


Questions? Find us in Discussions or Join our Discord.

Website |
Documentation |
Installation |
Getting Started |
Contributor's Guide

GitHub release
Go Report Card
Build Status
License
CLA assistant

GitHub stars
Twitter followers

star us

Features

🦾 A fast, stable, flexible private CA

Setting up a public key infrastructure (PKI) is out of reach for many small teams. step-ca makes it easier.

⚙️ Many ways to automate

There are several ways to authorize a request with the CA and establish a chain of trust that suits your flow.

You can issue certificates in exchange for:

🏔 Your own private ACME server

ACME is the protocol used by Let's Encrypt to automate the issuance of HTTPS certificates. It's super easy to issue certificates to any ACMEv2 (RFC8555) client.

👩🏽‍💻 An online SSH Certificate Authority

  • Delegate SSH authentication to step-ca by using SSH certificates instead of public keys and authorized_keys files
  • For user certificates, connect SSH to your single sign-on provider, to improve security with short-lived certificates and MFA (or other security policies) via any OAuth OIDC provider.
  • For host certificates, improve security, eliminate TOFU warnings, and set up automated host certificate renewal.

🤓 A general purpose PKI tool, via step CLI integration

Installation

See our installation docs here.

Documentation

  • Official documentation is on smallstep.com
  • The step command reference is available via step help,
    on smallstep.com,
    or by running step help --http=:8080 from the command line
    and visiting http://localhost:8080.

Feedback?

概览

名称与所有者smallstep/certificates
主编程语言Go
编程语言Makefile (语言数: 4)
平台Linux, Mac, Windows
许可证Apache License 2.0
发布数214
最新版本名称v0.26.1 (发布于 )
第一版名称v0.0.1-rc.1 (发布于 )
创建于2018-11-01 03:44:28
推送于2024-04-24 16:33:51
最后一次提交2024-04-25 00:33:51
星数6.2k
关注者数74
派生数407
提交数4.2k
已启用问题?
问题数542
打开的问题数165
拉请求数806
打开的拉请求数23
关闭的拉请求数95
已启用Wiki?
已存档?
是复刻?
已锁定?
是镜像?
是私有?
去到顶部