|
1 | 1 | --- |
2 | | -updated_at: September 18, 2025 |
| 2 | +updated_at: November 03, 2025 |
3 | 3 | title: Configuring step-ca |
4 | 4 | html_title: Configuring open source step-ca |
5 | 5 | description: Learn how to configure step-ca |
@@ -256,31 +256,31 @@ the `--password-file` flag accepts |
256 | 256 |
|
257 | 257 | - **policy**: authority-wide policy for certificate identifiers. See [Policies](./policies.mdx). |
258 | 258 |
|
259 | | - - **disableIssuedAtCheck**: ☠️ disable a check verifying that provisioning tokens must be issued after the CA has booted. This claim is one prevention against token reuse. The default value is false. Do not change this unless you know what you are doing. |
| 259 | + - **disableIssuedAtCheck**: ☠️ disable a check verifying that provisioning tokens must be issued after the CA has booted. This claim is one prevention against token reuse. The default value is false. Do not change this unless you know what you are doing. All time duration values follow [Go's `time.Duration` string format](https://pkg.go.dev/time#ParseDuration). |
260 | 260 |
|
261 | 261 | - **claims**: default validation for requested attributes in the certificate request. Can be overridden by similar claims objects defined by individual provisioners. |
262 | 262 |
|
263 | | - - **minTLSCertDuration**: do not allow certificates with a duration less than this value. |
| 263 | + - **minTLSCertDuration**: do not allow TLS certificates with a duration less than this value. |
264 | 264 |
|
265 | | - - **maxTLSCertDuration**: do not allow certificates with a duration greater than this value. |
| 265 | + - **maxTLSCertDuration**: do not allow TLS certificates with a duration greater than this value. |
266 | 266 |
|
267 | | - - **defaultTLSCertDuration**: if no certificate validity period is specified, use this value. |
| 267 | + - **defaultTLSCertDuration**: if no TLS certificate validity period is specified, use this value. |
268 | 268 |
|
269 | 269 | - **disableRenewal**: do not allow any certificates to be renewed. The default is false. |
270 | 270 |
|
271 | 271 | - **allowRenewalAfterExpiry**: ☠️ allow expired certificates to be renewed. The default is false. This option adds security risk; proceed with caution and consider alternatives. |
272 | 272 |
|
273 | | - - **minUserSSHCertDuration**: do not allow certificates with a duration less than this value. |
| 273 | + - **minUserSSHCertDuration**: do not allow SSH user certificates with a duration less than this value. |
274 | 274 |
|
275 | | - - **maxUserSSHCertDuration**: do not allow certificates with a duration greater than this value. |
| 275 | + - **maxUserSSHCertDuration**: do not allow SSH user certificates with a duration greater than this value. |
276 | 276 |
|
277 | | - - **defaultUserSSHCertDuration**: if no certificate validity period is specified, use this value. |
| 277 | + - **defaultUserSSHCertDuration**: if no SSH user certificate validity period is specified by the client, use this value. |
278 | 278 |
|
279 | | - - **minHostSSHCertDuration**: do not allow certificates with a duration less than this value. |
| 279 | + - **minHostSSHCertDuration**: do not allow SSH host certificates with a duration less than this value. |
280 | 280 |
|
281 | | - - **maxHostSSHCertDuration**: do not allow certificates with a duration greater than this value. |
| 281 | + - **maxHostSSHCertDuration**: do not allow SSH host certificates with a duration greater than this value. |
282 | 282 |
|
283 | | - - **defaultHostSSHCertDuration**: if no certificate validity period is specified, use this value. |
| 283 | + - **defaultHostSSHCertDuration**: if no SSH host certificate validity period is specified by the client, use this value. |
284 | 284 |
|
285 | 285 | - **enableSSHCA**: enable this provisioner to generate SSH Certificates. The default value is false. |
286 | 286 |
|
|
0 commit comments