Skip to content

Commit e4dd0be

Browse files
authored
Merge pull request #452 from smallstep/carl/console
Closes CON-283
2 parents 39862f4 + b58a7a3 commit e4dd0be

21 files changed

+67
-65
lines changed

certificate-manager/README.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
updated_at: September 17, 2025
2+
updated_at: November 06, 2025
33
title: Getting Started with Smallstep Certificate Manager
44
html_title: Certificate Manager Documentation Hub Overview
55
description: Complete guide to Smallstep Certificate Manager. Simplify enterprise PKI with automated certificate lifecycle management at scale easily.
66
---
77

8-
Smallstep Certificate Manager is a commercial product built on `step-ca` that delivers a highly available hosted certificate authorities, expiry notifications and alerts, a management dashboard, Active Revocation, API, and other features. With Smallstep Certificate Manager, you can easily issue private TLS/SSL certificates to all your things. [Learn more here.](https://smallstep.com/certificate-manager)
8+
Smallstep Certificate Manager is a commercial product built on `step-ca` that delivers a highly available hosted certificate authorities, expiry notifications and alerts, a management console, Active Revocation, API, and other features. With Smallstep Certificate Manager, you can easily issue private TLS/SSL certificates to all your things. [Learn more here.](https://smallstep.com/certificate-manager)
99

1010
If you need to manage devices or workloads that are not supported yet, then you can use Certificate Manager to tinker a solution.
1111

certificate-manager/basic-ops.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
updated_at: September 17, 2025
2+
updated_at: November 06, 2025
33
title: Smallstep Certificate Manager Basic Certificate Operations
44
html_title: Basic Certificate Manager Operations Guide
55
description: Essential Certificate Manager operations for daily use. Learn certificate issuance, renewal, revocation, and monitoring workflows.
@@ -40,7 +40,7 @@ In this command, we are asking the CA to create a certificate with the following
4040
* `--san myservice.internal.mycompany.net` - Add an additional SAN to the certificate, with the specified value
4141
* `--not-after 24h` - Set the certificate to expire after 24 hours
4242

43-
When you run this command, it will envoke the `authority-admin` provisioner and start a single sign-on flow via the smallstep dashboard.
43+
When you run this command, it will envoke the `authority-admin` provisioner and start a single sign-on flow via the smallstep console.
4444
After a successful sign-in, the authority will issue the certificate.
4545

4646
### Step 2 - Inspect a test certificate

certificate-manager/getting-started.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
updated_at: September 17, 2025
2+
updated_at: November 06, 2025
33
title: Smallstep Certificate Manager Getting Started
44
html_title: Get Started with Certificate Manager Guide
55
description: Get started with Certificate Manager in minutes. Quick setup guide for enterprise certificate automation and PKI management with best practices.
@@ -30,18 +30,18 @@ Creating a team gives you access to Smallstep's products.
3030
Click [here](https://smallstep.com/signup?product=cm) to create a team.
3131
You will be asked to provide:
3232
* `Team Name` - Usually, this is your company name.
33-
* `Team URL` - This is where you will access the smallstep dashboard and will also be the base domain for the CA URL for any Authorities you create.
33+
* `Team URL` - This is where you will access the smallstep console and will also be the base domain for the CA URL for any Authorities you create.
3434
* `First & Last Name` - Smallstep Team administrator's name.
3535
* `E-mail` - Smallstep Team administrator's e-mail address.
36-
* `password` - This password is used to login into the Smallstep dashboard
36+
* `password` - This password is used to login into the Smallstep console
3737

3838
Smallstep team admins can subscribe to and manage Smallstep products.
3939

4040
### step 2 - Create an Authority
4141
A Certificate Manager Authority is an online CA that authenticates and authorizes certificate requests.
4242
It can issue, renew, and revoke your x.509 TLS certificates.
4343
To create an Authority:
44-
* Log into the smallstep dashboard, select the Certificate Manager tab, and click the "Add Authority" button.
44+
* Log into the smallstep console, select the Certificate Manager tab, and click the "Add Authority" button.
4545
* Choose "Create a new hosted Authority".
4646
* Give your Authority a name and subdomain value (the URL path you wish to use for your online CA).
4747
* Choose "Create"

certificate-manager/how-it-works.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
updated_at: September 17, 2025
2+
updated_at: November 06, 2025
33
title: Smallstep Certificate Manager How It Works
44
html_title: Certificate Manager Architecture Guide
55
description: Technical architecture of Certificate Manager. Understand components, workflows, and security model for enterprise PKI deployment planning.
@@ -41,7 +41,7 @@ configuration management, or use
4141
or [`step ca root`](https://smallstep.com/docs/step-cli/reference/ca/root) to
4242
securely download your root certificate from an issuing authority. You can also
4343
download the root certificate for your authorities from the Certificate Manager
44-
dashboard.
44+
console.
4545

4646
- [`step ca bootstrap`](https://smallstep.com/docs/step-cli/reference/ca/bootstrap)
4747
configures `step` to trust your root CA and use a particular issuing
@@ -159,7 +159,7 @@ default for the `OIDC` provisioner).
159159
Some use cases demand an option to renew expired certificates.
160160
For example, intermittently-connected devices may not be able to reach the CA in time for a renewal.
161161
The ability to renew expired certificates can be enabled on a per-provisioner basis.
162-
Enable it in the Smallstep dashboard when you create a new provisioner,
162+
Enable it in the Smallstep console when you create a new provisioner,
163163
or on the command line for an existing provisioner.
164164
While sometimes necessary, this feature comes with risks and is disabled by default.
165165

certificate-manager/oidc.mdx

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
---
2+
updated_at: November 06, 2025
23
title: Smallstep Certificate Manager Single Sign-on Certificates
34
html_title: Smallstep Certificate Manager single sign-on certificates for humans
45
description: Connect your IDP to Smallstep Certificate Manager and issue certificates to your developers.
@@ -76,7 +77,7 @@ Use the following command as a template for adding an OIDC provisioner.
7677
</Alert>
7778

7879

79-
This command requires Administrator privileges on the Authority. The terminal will prompt you to enter your email and perform a single sign-on flow via the smallstep dashboard.
80+
This command requires Administrator privileges on the Authority. The terminal will prompt you to enter your email and perform a single sign-on flow via the smallstep console.
8081

8182
<CodeBlock language="shell-session" >
8283
{`No admin credentials found. You must login to execute admin commands.
@@ -86,7 +87,7 @@ Your default web browser has been opened to visit:`}
8687
</CodeBlock>
8788

8889
Upon completion, your OIDC provisioner will be created.
89-
It will appear on your smallstep dashboard authority detail page.
90+
It will appear on your smallstep console authority detail page.
9091

9192
### Step 3 - Enable self-service single sign-on certificates.
9293
From the user's perspective, when requesting a certificate, `step` detects the OIDC provisioner and initiates the OAuth login flow automatically:

platform/enrollment-guide.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
updated_at: September 17, 2025
2+
updated_at: November 06, 2025
33
title: Device Enrollment Guide
44
html_title: Device Enrollment Implementation Guide
55
description: Step-by-step guide for device enrollment and inventory management. Set up secure certificate enrollment for all enterprise devices.
@@ -94,6 +94,6 @@ create a user using the following value
9494
```
9595

9696
Once added,
97-
you'll see the device in your Smallstep dashboard,
97+
you'll see the device in your Smallstep console,
9898
under Recent Devices,
9999
and it will be automatically approved.

platform/smallstep-agent.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
updated_at: October 20, 2025
2+
updated_at: November 06, 2025
33
title: Smallstep Agent for Linux
44
html_title: Smallstep Agent for Device Management Guide
55
description: Deploy and configure Smallstep Agent on Linux. Automated device identity management and certificate renewal for enterprise Linux fleets.
@@ -214,9 +214,9 @@ Alternatively, you can pre-register all of your team's devices:
214214
fingerprint: "40523785c1d1d11EXAMPLE017b660d52a5fa5f2cb94cf0e1a9e9209dbea0826"
215215
```
216216
217-
- Your `team` ID (team slug). This is the value after `/app/` in your Smallstep dashboard URL.
218-
- Your agent CA `fingerprint`. Find this value in your dashboard:
219-
- In the Smallstep dashboard, select Authorities
217+
- Your `team` ID (team slug). This is the value after `/app/` in your Smallstep console URL.
218+
- Your agent CA `fingerprint`. Find this value in your console:
219+
- In the Smallstep console, select Authorities
220220
- Select the Smallstep Agents authority
221221
- Use the sha256 Root fingerprint displayed on this page
222222

platform/smallstep-api.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
updated_at: September 17, 2025
2+
updated_at: November 06, 2025
33
title: Smallstep API
44
html_title: Platform API Reference Documentation Guide
55
description: Complete API reference for managing devices, certificates, and PKI programmatically. Integrate Smallstep into your security workflows.
@@ -57,6 +57,6 @@ curl -sH @api_headers --request GET \
5757
--header 'x-smallstep-api-version: 2025-01-01' | jq
5858
```
5959

60-
Or, in your Smallstep dashboard,
60+
Or, in your Smallstep console,
6161
you'll see the device listed under Recent Devices.
6262

registration-authorities/acme-for-certificate-manager.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
updated_at: September 17, 2025
2+
updated_at: November 06, 2025
33
title: ACME Registration Authority for Smallstep Certificate Manager
44
html_title: Deploy ACME RA with Certificate Manager
55
description: Deploy ACME Registration Authority with Certificate Manager. Enable distributed ACME certificate issuance at enterprise scale.
@@ -166,7 +166,7 @@ Setting up an RA manually involves the following steps:
166166

167167
1. Create an Authority in Certificate Manager with a JWK provisioner
168168

169-
First, create a hosted Authority in the Certificate Manager dashboard if you haven't already, and configure your local `step` CLI to access this Authority, using `step ca bootstrap`.
169+
First, create a hosted Authority in the Certificate Manager console if you haven't already, and configure your local `step` CLI to access this Authority, using `step ca bootstrap`.
170170

171171
Now, as a Super Administrator, add a JWK provisioner to the Authority, and give it a name (eg. `acme-ra-jwk`):
172172
<FormValues>
@@ -266,7 +266,7 @@ If you're running Kubernetes, you can run an ACME Registration Authority in your
266266

267267
1. Create an Authority in Certificate Manager with a JWK provisioner
268268

269-
First, create a hosted Authority in the Certificate Manager dashboard if you haven't already, install the `step` CLI locally (`brew install step`), and configure `step` to access your Authority, using `step ca bootstrap`.
269+
First, create a hosted Authority in the Certificate Manager console if you haven't already, install the `step` CLI locally (`brew install step`), and configure `step` to access your Authority, using `step ca bootstrap`.
270270

271271
Now, as a Super Administrator, add a JWK provisioner to the Authority, and give it a name (eg. `registration-authority`):
272272

ssh/acls.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
updated_at: September 17, 2025
2+
updated_at: November 06, 2025
33
title: Access Control Guide
44
description: Implement fine-grained SSH access controls with certificates. Define who can access which servers using certificate-based policies.
55
html_title: SSH Access Control Lists Configuration
@@ -48,7 +48,7 @@ Sign in at `https://smallstep.com/app/[Team ID]`
4848

4949
### Step 2: Grant User Group Access to Host(s)
5050

51-
On your Smallstep Dashboard.
51+
On your Smallstep console.
5252
* Select the "Users" tab on the right hand navigation bar.
5353
* Choose the "GROUPS" tab
5454

0 commit comments

Comments
 (0)