step ca revoke – revoke a certificate
step ca revoke
step ca revoke command revokes a certificate with the given serial number.
Active Revocation: A certificate is no longer valid from the moment it has been actively revoked. Clients are required to check against centralized sources of certificate validity information (e.g. by using CRLs (Certificate Revocation Lists) or OCSP (Online Certificate Status Protocol)) to verify that certificates have not been revoked. Active Revocation requires clients to take an active role in certificate validation for the benefit of real time revocation.
Passive Revocation: A certificate that has been passively revoked can no longer be renewed. It will still be valid for the remainder of it’s validity period, but cannot be prolonged. The benefit of passive revocation is that clients can verify certificates in a simple, decentralized manner without relying on centralized 3rd parties. Passive revocation works best with short certificate lifetimes.
step ca revoke currently only supports passive revocation. Active revocation is on our roadmap.
- The serial number of the certificate that should be revoked. Can be left blank either to be supplied by prompt or when using –cert and –key flags for revocation over mTLS.
pathto the certificate authority configuration file. Defaults to $STEPPATH/config/ca.json
URIof the targeted Step Certificate Authority.
- Creates a certificate without contacting the certificate authority. Offline mode uses the configuration, certificates, and keys created with step ca init, but can accept a different configuration file using ‘–ca-config`’ flag.
- The path to the PEM
fileused as the root certificate authority.
- The one-time
tokenused to authenticate with the CA in order to create the certificate.
reasonCodespecifies the reason for revocation - chose from a list of common revocation reasons. If unset, the default is Unspecified.
reasonCodecan be a number from 0-9 or a case insensitive string matching one of the following options:
- No reason given (Default – reasonCode=0).
- The key is believed to have been compromised (reasonCode=1).
- The issuing Certificate Authority itself has been compromised (reasonCode=2).
- The certificate contained affiliation information, for example, it may have been an EV certificate and the associated business is no longer owned by the same entity (reasonCode=3).
- The certificate is being replaced (reasonCode=4).
- If a CA is decommissioned, no longer to be used, the CA’s certificate should be revoked with this reason code. Do not revoke the CA’s certificate if the CA no longer issues new certificates, yet still publishes CRLs for the currently issued certificates (reasonCode=5).
- A temporary revocation that indicates that a CA will not vouch for a certificate at a specific point in time. Once a certificate is revoked with a CertificateHold reason code, the certificate can then be revoked with another Reason Code, or unrevoked and returned to use (reasonCode=6).
- If a certificate is revoked with the CertificateHold reason code, it is possible to “unrevoke” a certificate. The unrevoking process still lists the certificate in the CRL, but with the reason code set to RemoveFromCRL. Note: This is specific to the CertificateHold reason and is only used in DeltaCRLs (reasonCode=8).
- The right to represent the given entity was revoked for some reason (reasonCode=9).
- It is known or suspected that aspects of the AA validated in the attribute certificate have been compromised (reasonCode=10).
stringrepresenting the reason for which the cert is being revoked.
The path to the
certthat should be revoked.
pathto the key corresponding to the cert that should be revoked.
Revoke a certificate using a transparently generated API token and the default ‘unspecified’ reason:
$ step ca revoke 308893286343609293989051180431574390766
Revoke a certificate using a transparently generated token and configured reason and reasonCode:
$ step ca revoke --reason "laptop compromised" --reasonCode 1 308893286343609293989051180431574390766
Revoke a certificate using a transparently generated token and configured reason and stringified reasonCode:
$ step ca revoke --reason "laptop compromised" --reasonCode "key compromise" 308893286343609293989051180431574390766
Revoke a certificate using that same certificate to validate and authorize the request (rather than a token) over mTLS:
$ step ca revoke --cert mike.cert --key mike.key
Revoke a certificate using a token, generated by a provisioner, to authorize the request with the CA:
$ TOKEN=$(step ca token --revoke 308893286343609293989051180431574390766) $ step ca revoke --token $TOKEN 308893286343609293989051180431574390766
Revoke a certificate in offline mode:
$ step ca revoke --offline 308893286343609293989051180431574390766
Revoke a certificate in offline mode using –cert and –key (the cert/key pair will be validated against the root and intermediate certifcates configured in the step CA):
$ step ca revoke --offline --cert foo.crt --key foo.key