You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Set up RSA certificate chains with step-ca. Complete guide for RSA-based PKI implementation with proper chain configuration.
@@ -19,7 +19,14 @@ However, the CA can sign leaf certificates
19
19
using RSA, ECDSA, or Ed25519 key types,
20
20
regardless of the key types of the root and intermediate CA.
21
21
22
-
This tutorial uses RSA-PSS and SHA256 for the signature algorithm. RSA-PSS appeared in 2003 in [RFC 3447](https://www.rfc-editor.org/rfc/rfc3447). Both [RFC 3447](https://www.rfc-editor.org/rfc/rfc3447) and the updated [RFC 8017](https://www.rfc-editor.org/rfc/rfc8017) recommend RSA-PSS (aka RSASSA-PSS) over RSA PKCS#1 v1.5. RSA-PSS has a security proof and is (in theory) more robust than RSA PKCS #1 v1.5. Nevertheless, PKCS #1 v1.5 has no known security weaknesses as of May 2023.
22
+
## Before you begin
23
+
24
+
This tutorial uses RSA-PSS and SHA256 for the signature algorithm. RSA-PSS appeared in 2003 in [RFC 3447](https://www.rfc-editor.org/rfc/rfc3447). Both [RFC 3447](https://www.rfc-editor.org/rfc/rfc3447) and the updated [RFC 8017](https://www.rfc-editor.org/rfc/rfc8017) recommend RSA-PSS (aka RSASSA-PSS) over RSA PKCS#1 v1.5 (from 1993). RSA-PSS has a security proof and is (in theory) more robust than RSA PKCS #1 v1.5.
25
+
26
+
While PKCS #1 v1.5 has no known security weaknesses as of October 2025, it is not recommended for new applications.
27
+
However, for compatibility with some Apple use cases,
28
+
RSA PKCS #1 v1.5 [may be necessary](https://github.com/smallstep/certificates/discussions/1447),
You'll be prompted to supply a password to encrypt your private keys.
85
92
86
-
You can now restart `step-ca` server.
93
+
You may now restart `step-ca` server.
94
+
95
+
## Alternative: Using RSA PKCS#1 v1.5 (not recommended)
96
+
97
+
Although the algorithm is widely deprecated, RSA PKCS #1 v1.5 CAs [may be necessary for some Apple clients](https://github.com/smallstep/certificates/discussions/1447).
98
+
99
+
First, stop your `step-ca` server if it is running.
100
+
101
+
Next, delete your existing PKI and create RSA root and intermediate certificates and keys.
0 commit comments