Certificate Issuance Policies

Administrators can create a certificate issuance policy to configure which certificate names the CA is allowed to sign. A policy consists of one or more rules that are all evaluated just before a new certificate is signed. Upon evaluation of the rules all names in a certificate request are checked to be allowed. If one of the names is not allowed, the certificate will not be signed. An error will be reported to the client indicating why the certificate wasn't created.

You can configure a policy for X.509 certificates, SSH user certificates and SSH host certificates. The CA will evaluate only the policy corresponding to the type of certificate that is requested. This means that rules for X.509 certificates will not be evaluated when an SSH user or host certificate is requested.

Policy Evaluation

Policies consist of one or more rules, each resulting in a (range of) names to be allowed or denied. A rule is applied to a single name type, like X.509 DNS domains or IP addresses. You'll need to configure multiple rules if you want the policy to apply to multiple types of names.

If a rule is configured to allow a certain type of name, all other types of names are automatically denied. If a rule is configured to deny a certain type of name, all other types of names are still allowed. Generally a policy will contain a set of allowed names and can contain a number of exclusions.

A rule can be configured to allow a range of names using a wildcard notation corresponding to the type of name. Another rule can be configured that denies a subset of the allowed range of names. Creating the opposite set of rules, denying a certain range and allowing a subset of that range, however, will not result in the names to be allowed.

The semantics used for evaluating rules and matching requested certificate names is described in the following sections.

X.509 Policies

A policy for X.509 certificates can have rules for the following types of names:

  • Domain Names
  • IP Addresses
  • Email Addresses
  • URIs
  • Subject Common Names

The following subsections describe the specifics for each of those.

Domain Names

Rules for DNS domains are evaluated to match largely according to how Name Constraints (RFC 5280) are evaluated, but applied to leaf certificates instead of CA certificates:

  • Requested domain names as well as the rules for domain names are normalized into their internationalized representation (RFC 5890).
  • The domain to be evaluated must have the same number of labels, demarcated by periods, as the rule has.
  • Each domain label is compared using a string comparison.

The rules for domain names allow a wildcard (*) to be specified as the first label. This allows (strictly) the first label to be filled freely. For example, the rule *.example.com allows any subdomain of example.com, such as www.example.com. It doesn't allow the domain example.com itself, though.

A rule for *.éxàmplê.com will internally be represented using its internationalized form: *.xn–xmpl-0na6cm.com. This rule will match www.éxàmplê.com as well as its internationalized representation www.xn–xmpl-0na6cm.com (and other subdomains).

By default it is not possible to request a certificate with a literal wildcard character in the domain, like *.example.com. It is possible to configure the policy to allow this.

Examples

TypeRuleMatchesNon-Matches
dnshost.example.comhost.example.comdifferenthost.example.com, sub.host.example.com
dns*.example.comhost.example.com, www.example.comexample.com, sub.host.example.com

IP Addresses

Rules for evaluating IP addresses are evaluated as follows:

  • A single IP rule (e.g. 192.168.0.30, ::1) will match exactly that IP address.
  • A CIDR rule (e.g. 192.168.0.0/24, 2001:0db8:85a3::8a2e:0370:7334/120) matches all IP addresses included in the range.
  • So-called IPv4-in-IPv6 addresses will be matched using rules for either IPv6 or IPv4. This is because Go doesn't distinguish these.

Examples

TypeRuleMatchesNon-Matches
ip192.168.0.1192.168.0.1192.168.0.30, 10.0.0.1
ip192.168.0.0/24192.168.0.1, 192.168.0.10192.168.20.1, 10.0.0.1
ip::1::1::2
ip2001:0db8:85a3::8a2e:0370:7334/1202001:0db8:85a3::8a2e:0370:73343001:0db8:85a3::8a2e:0370:7334

Email Addresses

Rules for evaluating email addresses are evaluated as follows:

  • Email domain names are normalized into their internationalized representation (RFC 5890).
  • A specific email address (e.g. jdoe@example.com) will match exactly that email address.
  • A rule without a specific local part (e.g. @example.com) will match any email address ending in @example.com.

It is not possible to configure a wildcard subdomain. You'll need to configure multiple email rules in case you need to match email addresses using different subdomains.

Examples

URIs

Rules for evaluating URIs are evaluated as follows:

  • URI domains are normalized into their internationalized representation (RFC 5890).
  • URI rules must contain an authority part and cannot contain IP addresses, in correspondence with RFC 5280.
  • Matching URI domains is performed by matching URI domain labels, similar as what's done for DNS domains.

Wildcards in URI rules are evaluated similar to wildcards for domain names. URIs cannot contain literal wildcards, unlike DNS domains.

☠️ URI schemes, paths, queries and fragments are (currently) not matched. When configuring an URI rule, these parts are ignored. This could lead to certificates being signed with URI schemes you didn't anticipate, so please take note of this if your application or environment relies on these parts of the URI.

Examples

Subject Common Name

The Subject Common Name is a bit of a special case. When no rules are configured specifically for the Common Name, the Common Name in an X.509 certificate will be evaluated against the rules and evaluation logic for the other name types, according to what type it is. For example, if the Common Name has a value of www.example.com, it will be evaluated against the rules for DNS domains.

TypeRuleMatchesNon-Matches
dns*.localca.localca.example.com
ip192.168.0.0/24192.168.0.110.0.0.1
email@localca@localca@example.com
uri*.localhttps://ca.localhttps://ca.example.com

Not every Common Name is a valid DNS domain, IP, email address or URI, however, so that's why it's also possible to provide rules specifically for Common Names. Rules for Common Names are evaluated using a strict string comparison.

TypeRuleMatchesNon-Matches
cnCustom CA NameCustom CA NameDifferent CA Name

SSH Policies

Policies for SSH certificates consist of rules for user and host certificates. A policy for SSH user certificates can have rules for the following:

  • Email address domains
  • Principals

A policy for SSH host certificates can have rules for the following:

  • DNS domains
  • IP ranges and addresses

When an SSH certificate is requested the policy to be evaluated will be based on the certificate type. Then the appropriate policy is evaluated for every principal in the certificate.

For SSH host certificates, every principal is matched against dns or ip rules. Evaluation of the dns and ip rules is the same as for X.509 certificates.

For SSH user certificates, every principal is parsed to check if it's a valid email address and will then be matched against email rules. Evaluation of email rules is performed like those for X.509 certificates. If a principal is not a valid email address, it will be matched against principal rules. Principals are matched using a strict string comparison and it is possible to configure a wildcard to allow any principal name.

If a policy has rules for user certificates and no rule for host certificates, host certificates will be denied. The same is true in case there are rules for host certificates and none for user certificates: a user certificate will then always be denied.

TypeRuleMatchesNon-Matches
dns*.localhost.localhost.example.com
ip192.168.0.0/24192.168.0.110.0.0.1
email@devopsjane@devopsjohn@finance
principal*johndoe, john, janedoe, jane
principaljohndoejohndoejanedoe

Policy Configuration

Policies can be administered using the step CLI application. The commands are part of the step ca policy namespace. In a self-hosted step-ca, policies can be configured on the authority level.

Examples

Allow all DNS subdomains of "local" in X.509 certificates on authority level:

$ step ca policy authority x509 allow dns "*.local"

Allow IP range 10.0.0.0/24 in X.509 certificates on authority level:

$ step ca policy authority x509 allow ip 10.0.0.0/24

Allow all devops principals in SSH user certificates on authority level:

$ step ca policy authority ssh user allow email "@devops"

Allow all DNS subdomains of "local" in SSH host certificates on authority level:

$ step ca policy authority ssh host allow dns "*.local"

You can find more examples in the step CLI command reference for the step ca policy namespace.

Policy in Configuration File

When running a self-hosted step-ca it is also possible to configure the authority policy in the ca.json CA configuration file. It has to be embedded in the "authority" object. An example is shown below:

"policy": { "x509": { "allow": { "dns": ["*.local"], "ip": ["192.168.0.0/24"] }, "deny": { "dns": ["forbidden.local"], "ip": ["192.168.0.1"] }, "allowWildcardNames": false, }, "ssh": { "user": { "allow": { "email": ["@local"] }, "deny": { "email": ["root@local"] } }, "host": { "allow": { "dns": ["*.local"], "ip": ["192.168.0.0/24"] }, "deny": { "dns": ["forbidden.local"], "ip": ["192.168.0.1"] } } } }

Make step-ca reload its configuration by sending it a SIGHUP:

killall -i -s SIGHUP step-ca

Alternatively, you can restart step-ca manually.

It is not required to add rules for every type of certificate. If you run a CA intended just for X.509 certificates, you don't need to provide rules for SSH certificates and can omit the corresponding keys.