All Projects → smallstep → Certificates

smallstep / Certificates

Licence: apache-2.0
🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.

Programming Languages

go
31211 projects - #10 most used programming language

Projects that are alternatives of or similar to Certificates

labca
A private Certificate Authority for internal (lab) use, based on the open source ACME Automated Certificate Management Environment implementation from Let's Encrypt (tm).
Stars: ✭ 126 (-96.59%)
Mutual labels:  tls, acme, pki, certificate-authority, ca
Boulder
An ACME-based certificate authority, written in Go.
Stars: ✭ 4,091 (+10.78%)
Mutual labels:  tls, acme, pki, certificate-authority, ca
Pebble
A miniature version of Boulder, Pebble is a small RFC 8555 ACME test server not suited for a production certificate authority. Let's Encrypt is hiring! Work on Pebble with us.
Stars: ✭ 359 (-90.28%)
Mutual labels:  acme, x509, pki, certificate-authority
Cli
🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.
Stars: ✭ 2,151 (-41.75%)
Mutual labels:  security-tools, ssh, tls, x509
Acmetool
🔒 acmetool, an automatic certificate acquisition tool for ACME (Let's Encrypt)
Stars: ✭ 1,882 (-49.04%)
Mutual labels:  tls, acme, x509, acme-server
acme2certifier
library implementing ACME server functionality
Stars: ✭ 62 (-98.32%)
Mutual labels:  acme, certificate-authority, acme-server
x509sak
X.509 Swiss Army Knife is a toolkit atop OpenSSL to ease generation of CAs and aid white-hat pentesting
Stars: ✭ 23 (-99.38%)
Mutual labels:  x509, pki, ca
openssl-ca
Shell scripts to manage a private Certificate Authority using OpenSSL
Stars: ✭ 38 (-98.97%)
Mutual labels:  tls, x509, certificate-authority
kmgm
🔐🔗 Generate certs for your cluster, easy way
Stars: ✭ 22 (-99.4%)
Mutual labels:  x509, pki, certificate-authority
Aspnetcorecertificates
Certificate Manager in .NET Core for creating and using X509 certificates
Stars: ✭ 135 (-96.34%)
Mutual labels:  tls, x509, pki
diyca
Do-It-Yourself Certificate Authority
Stars: ✭ 18 (-99.51%)
Mutual labels:  tls, pki, certificate-authority
Getssl
obtain free SSL certificates from letsencrypt ACME server Suitable for automating the process on remote servers.
Stars: ✭ 1,687 (-54.32%)
Mutual labels:  ssh, acme, acme-server
win-ca
Get Windows System Root certificates
Stars: ✭ 78 (-97.89%)
Mutual labels:  tls, x509, certificate-authority
Acme Client
Let's Encrypt / ACME client written in PHP for the CLI.
Stars: ✭ 337 (-90.87%)
Mutual labels:  tls, acme, certificates
pki
Certificate Authority management suite
Stars: ✭ 23 (-99.38%)
Mutual labels:  x509, pki, certificate-authority
Pki
The Dogtag Certificate System is an enterprise-class Certificate Authority (CA) which supports all aspects of certificate lifecycle management, including key archival, OCSP and smartcard management.
Stars: ✭ 97 (-97.37%)
Mutual labels:  acme, pki, certificate-authority
Django X509
Reusable django app implementing x509 PKI certificates management
Stars: ✭ 326 (-91.17%)
Mutual labels:  x509, pki, certificate-authority
Xca
X Certificate and Key management
Stars: ✭ 574 (-84.46%)
Mutual labels:  x509, certificates, certificate-authority
Sharkey
Sharkey is a service for managing certificates for use by OpenSSH
Stars: ✭ 360 (-90.25%)
Mutual labels:  ssh, pki, certificates
azure-iiot-opc-vault-service
Azure Industrial IoT OPC Vault Service
Stars: ✭ 15 (-99.59%)
Mutual labels:  certificates, pki, ca

Step Certificates

step-ca is an online certificate authority for secure, automated certificate management. It's the server counterpart to the step CLI tool.

You can use it to:

  • Issue X.509 certificates for your internal infrastructure:
    • HTTPS certificates that work in browsers (RFC5280 and CA/Browser Forum compliance)
    • TLS certificates for VMs, containers, APIs, mobile clients, database connections, printers, wifi networks, toaster ovens...
    • Client certificates to enable mutual TLS (mTLS) in your infra. mTLS is an optional feature in TLS where both client and server authenticate each other. Why add the complexity of a VPN when you can safely use mTLS over the public internet?
  • Issue SSH certificates:
    • For people, in exchange for single sign-on ID tokens
    • For hosts, in exchange for cloud instance identity documents
  • Easily automate certificate management:

Whatever your use case, step-ca is easy to use and hard to misuse, thanks to safe, sane defaults.


Don't want to run your own CA? To get up and running quickly, or as an alternative to running your own step-ca server, consider creating a free hosted smallstep Certificate Manager authority.


Questions? Find us in Discussions or Join our Discord.

Website | Documentation | Installation | Getting Started | Contributor's Guide

GitHub release Go Report Card Build Status License CLA assistant

GitHub stars Twitter followers

star us

Features

🦾 A fast, stable, flexible private CA

Setting up a public key infrastructure (PKI) is out of reach for many small teams. step-ca makes it easier.

⚙️ Many ways to automate

There are several ways to authorize a request with the CA and establish a chain of trust that suits your flow.

You can issue certificates in exchange for:

🏔 Your own private ACME server

ACME is the protocol used by Let's Encrypt to automate the issuance of HTTPS certificates. It's super easy to issue certificates to any ACMEv2 (RFC8555) client.

👩🏽‍💻 An online SSH Certificate Authority

  • Delegate SSH authentication to step-ca by using SSH certificates instead of public keys and authorized_keys files
  • For user certificates, connect SSH to your single sign-on provider, to improve security with short-lived certificates and MFA (or other security policies) via any OAuth OIDC provider.
  • For host certificates, improve security, eliminate TOFU warnings, and set up automated host certificate renewal.

🤓 A general purpose PKI tool, via step CLI integration

Installation

See our installation docs here.

Documentation

Documentation can be found in a handful of different places:

  1. On the web at https://smallstep.com/docs/step-ca.

  2. On the command line with step help ca xxx where xxx is the subcommand you are interested in. Ex: step help ca provisioner list.

  3. In your browser, by running step help --http=:8080 ca from the command line and visiting http://localhost:8080.

  4. The docs folder is being deprecated, but it still has some documentation and tutorials.

Feedback?

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].