{"id":13467205,"url":"https://github.com/smallstep/certificates","last_synced_at":"2026-01-16T12:43:52.168Z","repository":{"id":37788281,"uuid":"155658556","full_name":"smallstep/certificates","owner":"smallstep","description":"🛡️ A private certificate authority (X.509 \u0026 SSH) \u0026 ACME server for secure automated certificate management, so you can use TLS everywhere \u0026 SSO for SSH.","archived":false,"fork":false,"pushed_at":"2026-01-13T12:58:35.000Z","size":44780,"stargazers_count":8021,"open_issues_count":259,"forks_count":519,"subscribers_count":76,"default_branch":"master","last_synced_at":"2026-01-13T15:43:40.775Z","etag":null,"topics":["acme","acme-server","ca","certificate-authority","certificates","go","pki","security","security-tools","ssh","tls","x509"],"latest_commit_sha":null,"homepage":"https://smallstep.com/certificates","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/smallstep.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":"SECURITY.md","support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2018-11-01T03:44:28.000Z","updated_at":"2026-01-13T12:57:44.000Z","dependencies_parsed_at":"2023-12-27T13:26:24.017Z","dependency_job_id":"1b63a58c-1389-43ca-899c-0f81c7ffa4b9","html_url":"https://github.com/smallstep/certificates","commit_stats":{"total_commits":3372,"total_committers":84,"mean_commits":"40.142857142857146","dds":0.7310201660735469,"last_synced_commit":"669d992d59e2c7ba2d737165f71b5c647b629928"},"previous_names":[],"tags_count":236,"template":false,"template_full_name":null,"purl":"pkg:github/smallstep/certificates","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/smallstep%2Fcertificates","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/smallstep%2Fcertificates/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/smallstep%2Fcertificates/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/smallstep%2Fcertificates/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/smallstep","download_url":"https://codeload.github.com/smallstep/certificates/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/smallstep%2Fcertificates/sbom","scorecard":{"id":589905,"data":{"date":"2025-08-11","repo":{"name":"github.com/smallstep/certificates","commit":"9c485c5e9dcbc7c5c7bac2ceca2ef943518a7b02"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":7.1,"checks":[{"name":"Code-Review","score":10,"reason":"all changesets reviewed","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"Maintained","score":10,"reason":"30 commit(s) and 10 issue activity found in the last 90 days -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Security-Policy","score":10,"reason":"security policy file detected","details":["Info: security policy file detected: SECURITY.md:1","Info: Found linked content: SECURITY.md:1","Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1","Info: Found text in security policy: SECURITY.md:1"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Warn: jobLevel 'contents' permission set to 'write': .github/workflows/release.yml:61","Warn: jobLevel 'packages' permission set to 'write': .github/workflows/release.yml:62","Warn: jobLevel 'contents' permission set to 'write': .github/workflows/release.yml:74","Warn: jobLevel 'contents' permission set to 'write': .github/workflows/release.yml:88","Warn: topLevel 'contents' permission set to 'write': .github/workflows/actionlint.yml:11","Warn: no topLevel permission defined: .github/workflows/ci.yml:1","Warn: no topLevel permission defined: .github/workflows/code-scan-cron.yml:1","Warn: topLevel 'contents' permission set to 'write': .github/workflows/dependabot-auto-merge.yml:5","Warn: no topLevel permission defined: .github/workflows/release.yml:1","Warn: no topLevel permission defined: .github/workflows/triage.yml:1"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"Pinned-Dependencies","score":0,"reason":"dependency not pinned by hash detected -- score normalized to 0","details":["Warn: third-party GitHubAction not pinned by hash: .github/workflows/actionlint.yml:16: update your workflow using https://app.stepsecurity.io/secureworkflow/smallstep/certificates/actionlint.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/ci.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/smallstep/certificates/ci.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/code-scan-cron.yml:7: update your workflow using https://app.stepsecurity.io/secureworkflow/smallstep/certificates/code-scan-cron.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/dependabot-auto-merge.yml:10: update your workflow using https://app.stepsecurity.io/secureworkflow/smallstep/certificates/dependabot-auto-merge.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/release.yml:11: update your workflow using https://app.stepsecurity.io/secureworkflow/smallstep/certificates/release.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/release.yml:63: update your workflow using https://app.stepsecurity.io/secureworkflow/smallstep/certificates/release.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/release.yml:75: update your workflow using https://app.stepsecurity.io/secureworkflow/smallstep/certificates/release.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/release.yml:89: update your workflow using https://app.stepsecurity.io/secureworkflow/smallstep/certificates/release.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/triage.yml:15: update your workflow using https://app.stepsecurity.io/secureworkflow/smallstep/certificates/triage.yml/master?enable=pin","Warn: containerImage not pinned by hash: docker/Dockerfile:1","Warn: containerImage not pinned by hash: docker/Dockerfile:10","Warn: containerImage not pinned by hash: docker/Dockerfile:12: pin your Docker image by updating smallstep/step-cli:latest to smallstep/step-cli:latest@sha256:d0f642a9e63d631d50cc92455263c302ffbcf9fb6d421a566e920b9cbeb55703","Warn: containerImage not pinned by hash: docker/Dockerfile.hsm:1","Warn: containerImage not pinned by hash: docker/Dockerfile.hsm:12","Warn: containerImage not pinned by hash: docker/Dockerfile.hsm:14: pin your Docker image by updating smallstep/step-cli:bookworm to smallstep/step-cli:bookworm@sha256:0290929206f9be426d97782ec6b4b566a47cab0a25775f9d99370d4c92f7a2e1","Warn: containerImage not pinned by hash: examples/docker/ca/Dockerfile:1: pin your Docker image by updating alpine to alpine@sha256:4bcff63911fcb4448bd4fdacec207030997caf25e9bea4045fa6c8c44de311d1","Warn: containerImage not pinned by hash: examples/docker/nginx/Dockerfile:1: pin your Docker image by updating nginx:alpine to nginx:alpine@sha256:2459838ed006e699c252db374550c91490068bbf3b35fa8b9d29bfe0e31b8b95","Warn: containerImage not pinned by hash: examples/docker/renewer/Dockerfile:1: pin your Docker image by updating smallstep/step-cli to smallstep/step-cli@sha256:d0f642a9e63d631d50cc92455263c302ffbcf9fb6d421a566e920b9cbeb55703","Info:   1 out of  10 third-party GitHubAction dependencies pinned","Info:   0 out of   9 containerImage dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"SAST","score":10,"reason":"SAST tool is run on all commits","details":["Info: all commits (30) are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}},{"name":"Signed-Releases","score":8,"reason":"5 out of the last 5 releases have a total of 5 signed artifacts.","details":["Info: signed release artifact: checksums.txt.sig: https://github.com/smallstep/certificates/releases/tag/v0.28.4","Info: signed release artifact: checksums.txt.sig: https://github.com/smallstep/certificates/releases/tag/v0.28.4-rc2","Info: signed release artifact: checksums.txt.sig: https://github.com/smallstep/certificates/releases/tag/v0.28.4-rc1","Info: signed release artifact: checksums.txt.sig: https://github.com/smallstep/certificates/releases/tag/v0.28.3-rc2","Info: signed release artifact: checksums.txt.sig: https://github.com/smallstep/certificates/releases/tag/v0.28.3","Warn: release artifact v0.28.4 does not have provenance: https://api.github.com/repos/smallstep/certificates/releases/232239543","Warn: release artifact v0.28.4-rc2 does not have provenance: https://api.github.com/repos/smallstep/certificates/releases/232077129","Warn: release artifact v0.28.4-rc1 does not have provenance: https://api.github.com/repos/smallstep/certificates/releases/231315495","Warn: release artifact v0.28.3-rc2 does not have provenance: https://api.github.com/repos/smallstep/certificates/releases/230559967","Warn: release artifact v0.28.3 does not have provenance: https://api.github.com/repos/smallstep/certificates/releases/206602304"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Vulnerabilities","score":8,"reason":"2 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GO-2022-0635","Warn: Project is vulnerable to: GO-2022-0646"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}}]},"last_synced_at":"2025-08-20T21:35:42.604Z","repository_id":37788281,"created_at":"2025-08-20T21:35:42.604Z","updated_at":"2025-08-20T21:35:42.604Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28478731,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-16T11:59:17.896Z","status":"ssl_error","status_checked_at":"2026-01-16T11:55:55.838Z","response_time":107,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["acme","acme-server","ca","certificate-authority","certificates","go","pki","security","security-tools","ssh","tls","x509"],"created_at":"2024-07-31T15:00:54.062Z","updated_at":"2026-01-16T12:43:52.135Z","avatar_url":"https://github.com/smallstep.png","language":"Go","readme":"# step-ca\n\n[![GitHub release](https://img.shields.io/github/release/smallstep/certificates.svg)](https://github.com/smallstep/certificates/releases/latest)\n[![Go Report Card](https://goreportcard.com/badge/github.com/smallstep/certificates)](https://goreportcard.com/report/github.com/smallstep/certificates)\n[![Build Status](https://github.com/smallstep/certificates/actions/workflows/test.yml/badge.svg)](https://github.com/smallstep/certificates)\n[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://opensource.org/licenses/Apache-2.0)\n[![CLA assistant](https://cla-assistant.io/readme/badge/smallstep/certificates)](https://cla-assistant.io/smallstep/certificates)\n\n`step-ca` is an online certificate authority for secure, automated certificate management for DevOps.\nIt's the server counterpart to the [`step` CLI tool](https://github.com/smallstep/cli) for working with certificates and keys.\nBoth projects are maintained by [Smallstep Labs](https://smallstep.com).\n\nYou can use `step-ca` to:\n- Issue HTTPS server and client certificates that [work in browsers](https://smallstep.com/blog/step-v0-8-6-valid-HTTPS-certificates-for-dev-pre-prod.html) ([RFC5280](https://tools.ietf.org/html/rfc5280) and [CA/Browser Forum](https://cabforum.org/baseline-requirements-documents/) compliance)\n- Issue TLS certificates for DevOps: VMs, containers, APIs, database connections, Kubernetes pods...\n- Issue SSH certificates:\n  - For people, in exchange for single sign-on identity tokens\n  - For hosts, in exchange for cloud instance identity documents\n- Easily automate certificate management:\n  - It's an [ACME server](https://smallstep.com/docs/step-ca/acme-basics/) that supports all [popular ACME challenge types](https://smallstep.com/docs/step-ca/acme-basics/#acme-challenge-types)\n  - It comes with a [Go wrapper](./examples#user-content-basic-client-usage)\n  - ... and there's a [command-line client](https://github.com/smallstep/cli) you can use in scripts!\n\n---\n\n### Comparison with Smallstep's commercial product\n\n`step-ca` is optimized for a two-tier PKI serving common DevOps use cases.\n\nAs you design your PKI, if you need any of the following, [consider our commerical CA](http://smallstep.com):\n- Multiple certificate authorities\n- Active revocation (CRL, OSCP)\n- Turnkey high-volume, high availability CA\n- An API for seamless IaC management of your PKI\n- Integrated support for SCEP \u0026 NDES, for migrating from legacy Active Directory Certificate Services deployments\n- Device identity — cross-platform device inventory and attestation using Secure Enclave \u0026 TPM 2.0\n- Highly automated PKI — managed certificate renewal, monitoring, TPM-based attested enrollment\n- Seamless client deployments of EAP-TLS Wi-Fi, VPN, SSH, and browser certificates\n- Jamf, Intune, or other MDM for root distribution and client enrollment\n- Web Admin UI — history, issuance, and metrics\n- ACME External Account Binding (EAB)\n- Deep integration with an identity provider\n- Fine-grained, role-based access control\n- FIPS-compliant software\n- HSM-bound private keys\n\nSee our [full feature comparison](https://smallstep.com/step-ca-vs-smallstep-certificate-manager/) for more.\n\nYou can [start a free trial](https://smallstep.com/signup) or [set up a call with us](https://go.smallstep.com/request-demo) to learn more.\n\n---\n\n**Questions? Find us in [Discussions](https://github.com/smallstep/certificates/discussions) or [Join our Discord](https://u.step.sm/discord).**\n\n[Website](https://smallstep.com/certificates) |\n[Documentation](https://smallstep.com/docs/step-ca) |\n[Installation](https://smallstep.com/docs/step-ca/installation) |\n[Contributor's Guide](./CONTRIBUTING.md)\n\n## Features\n\n### 🦾 A fast, stable, flexible private CA\n\nSetting up a *public key infrastructure* (PKI) is out of reach for many small teams. `step-ca` makes it easier.\n\n- Choose key types (RSA, ECDSA, EdDSA) and lifetimes to suit your needs\n- [Short-lived certificates](https://smallstep.com/blog/passive-revocation.html) with automated enrollment, renewal, and passive revocation\n- Can operate as [an online intermediate CA for an existing root CA](https://smallstep.com/docs/tutorials/intermediate-ca-new-ca)\n- [Badger, BoltDB, Postgres, and MySQL database backends](https://smallstep.com/docs/step-ca/configuration#databases)\n\n### ⚙️ Many ways to automate\n\nThere are several ways to authorize a request with the CA and establish a chain of trust that suits your flow.\n\nYou can issue certificates in exchange for:\n- [ACME challenge responses](#your-own-private-acme-server) from any ACMEv2 client\n- [OAuth OIDC single sign-on tokens](https://smallstep.com/blog/easily-curl-services-secured-by-https-tls.html), eg:\n  - ID tokens from Okta, GSuite, Azure AD, Auth0.\n  - ID tokens from an OAuth OIDC service that you host, like [Keycloak](https://www.keycloak.org/) or [Dex](https://github.com/dexidp/dex)\n- [Cloud instance identity documents](https://smallstep.com/blog/embarrassingly-easy-certificates-on-aws-azure-gcp/), for VMs on AWS, GCP, and Azure\n- [Single-use, short-lived JWK tokens](https://smallstep.com/docs/step-ca/provisioners#jwk) issued by your CD tool — Puppet, Chef, Ansible, Terraform, etc.\n- A trusted X.509 certificate (X5C provisioner)\n- A host certificate from your Nebula network\n- A SCEP challenge (SCEP provisioner)\n- An SSH host certificates needing renewal (the SSHPOP provisioner)\n- Learn more in our [provisioner documentation](https://smallstep.com/docs/step-ca/provisioners)\n\n### 🏔 Your own private ACME server\n\nACME is the protocol used by Let's Encrypt to automate the issuance of HTTPS certificates. It's _super easy_ to issue certificates to any ACMEv2 ([RFC8555](https://tools.ietf.org/html/rfc8555)) client.\n\n- [Use ACME in development \u0026 pre-production](https://smallstep.com/blog/private-acme-server/#local-development--pre-production)\n- Supports the most popular [ACME challenge types](https://letsencrypt.org/docs/challenge-types/):\n  - For `http-01`, place a token at a well-known URL to prove that you control the web server\n  - For `dns-01`, add a `TXT` record to prove that you control the DNS record set\n  - For `tls-alpn-01`, respond to the challenge at the TLS layer ([as Caddy does](https://caddy.community/t/caddy-supports-the-acme-tls-alpn-challenge/4860)) to prove that you control the web server\n\n- Works with any ACME client. We've written examples for:\n  - [certbot](https://smallstep.com/docs/tutorials/acme-protocol-acme-clients#certbot)\n  - [acme.sh](https://smallstep.com/docs/tutorials/acme-protocol-acme-clients#acmesh)\n  - [win-acme](https://smallstep.com/docs/tutorials/acme-protocol-acme-clients#win-acme)\n  - [Caddy](https://smallstep.com/docs/tutorials/acme-protocol-acme-clients#caddy-v2)\n  - [Traefik](https://smallstep.com/docs/tutorials/acme-protocol-acme-clients#traefik)\n  - [Apache](https://smallstep.com/docs/tutorials/acme-protocol-acme-clients#apache)\n  - [nginx](https://smallstep.com/docs/tutorials/acme-protocol-acme-clients#nginx)\n- Get certificates programmatically using ACME, using these libraries:\n  - [`lego`](https://github.com/go-acme/lego) for Golang ([example usage](https://smallstep.com/docs/tutorials/acme-protocol-acme-clients#golang))\n  - certbot's [`acme` module](https://github.com/certbot/certbot/tree/master/acme) for Python ([example usage](https://smallstep.com/docs/tutorials/acme-protocol-acme-clients#python))\n  - [`acme-client`](https://github.com/publishlab/node-acme-client) for Node.js ([example usage](https://smallstep.com/docs/tutorials/acme-protocol-acme-clients#node))\n- Our own [`step` CLI tool](https://github.com/smallstep/cli) is also an ACME client!\n- See our [ACME tutorial](https://smallstep.com/docs/tutorials/acme-challenge) for more\n\n### 👩🏽‍💻 An online SSH Certificate Authority\n\n- Delegate SSH authentication to `step-ca` by using [SSH certificates](https://smallstep.com/blog/use-ssh-certificates/) instead of public keys and `authorized_keys` files\n- For user certificates, [connect SSH to your single sign-on provider](https://smallstep.com/blog/diy-single-sign-on-for-ssh/), to improve security with short-lived certificates and MFA (or other security policies) via any OAuth OIDC provider.\n- For host certificates, improve security, [eliminate TOFU warnings](https://smallstep.com/blog/use-ssh-certificates/), and set up automated host certificate renewal.\n\n### 🤓 A general purpose PKI tool, via [`step` CLI](https://github.com/smallstep/cli) [integration](https://smallstep.com/docs/step-cli/reference/ca/)\n\n- Generate key pairs where they're needed so private keys are never transmitted across the network\n- [Authenticate and obtain a certificate](https://smallstep.com/docs/step-cli/reference/ca/certificate/) using any provisioner supported by `step-ca`\n- Securely [distribute root certificates](https://smallstep.com/docs/step-cli/reference/ca/root/) and [bootstrap](https://smallstep.com/docs/step-cli/reference/ca/bootstrap/) PKI relying parties\n- [Renew](https://smallstep.com/docs/step-cli/reference/ca/renew/) and [revoke](https://smallstep.com/docs/step-cli/reference/ca/revoke/) certificates issued by `step-ca`\n- [Install root certificates](https://smallstep.com/docs/step-cli/reference/certificate/install/) on your machine and browsers, so your CA is trusted\n- [Inspect](https://smallstep.com/docs/step-cli/reference/certificate/inspect/) and [lint](https://smallstep.com/docs/step-cli/reference/certificate/lint/) certificates\n\n## Installation\n\nSee our installation docs [here](https://smallstep.com/docs/step-ca/installation).\n\n## Documentation\n\n* [Official documentation](https://smallstep.com/docs/step-ca) is on smallstep.com\n* The `step` command reference is available via `step help`,\n[on smallstep.com](https://smallstep.com/docs/step-cli/reference/),\nor by running `step help --http=:8080` from the command line\nand visiting http://localhost:8080.\n\n## Feedback?\n\n* Tell us what you like and don't like about managing your PKI - we're eager to help solve problems in this space. [Join our Discord](https://u.step.sm/discord) or [GitHub Discussions](https://github.com/smallstep/certificates/discussions)\n* Tell us about a feature you'd like to see! [Request a Feature](https://github.com/smallstep/certificates/issues/new?assignees=\u0026labels=enhancement%2C+needs+triage\u0026template=enhancement.md\u0026title=)\n","funding_links":[],"categories":["Go","\u003ca id=\"86d5daccb4ed597e85a0ec9c87f3c66f\"\u003e\u003c/a\u003eTLS\u0026\u0026SSL\u0026\u0026HTTPS","\u003ca id=\"43b0310ac54c147a62c545a2b0f4bce2\"\u003e\u003c/a\u003e辅助周边","security-tools","加密_密码破解_字典","Repositories"],"sub_categories":["\u003ca id=\"776c034543a65be69c061d1aafce3127\"\u003e\u003c/a\u003e新添加的","\u003ca id=\"86d5daccb4ed597e85a0ec9c87f3c66f\"\u003e\u003c/a\u003eTLS\u0026\u0026SSL\u0026\u0026HTTPS","资源传输下载"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsmallstep%2Fcertificates","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fsmallstep%2Fcertificates","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsmallstep%2Fcertificates/lists"}