Hello!
- Vote on this issue by adding a 👍 reaction
- If you want to implement this feature, comment to let us know (we'll work with you on design, scheduling, etc.)
Issue details
Similar to the current method of using --root and --key flags, it would be useful to have another option of --csr instead so that the certificate can be signed offline later. To make this work seamlessly, we would also need a step ca renew-ca (hopefully a better name) that simply copies/rekeys/request a new csr according to the current --ca-config if simple tests pass like if the certificate is valid, if it is signed by the root, etc.
Why is this needed?
As far I understand this would be equivalent with the current RA options, but more geared towards an offline root CA structure.
The latter part is useful regardless of the first part, but overall this can be useful for automated deployments like ansible where it would be best not to put all your eggs in a single basket, or if you want to manage multiple CAs, e.g. root CA belongs to a school and intermediates are managed by individual labs.
Hello!
Issue details
Similar to the current method of using
--rootand--keyflags, it would be useful to have another option of--csrinstead so that the certificate can be signed offline later. To make this work seamlessly, we would also need astep ca renew-ca(hopefully a better name) that simply copies/rekeys/request a new csr according to the current--ca-configif simple tests pass like if the certificate is valid, if it is signed by the root, etc.Why is this needed?
As far I understand this would be equivalent with the current RA options, but more geared towards an offline root CA structure.
The latter part is useful regardless of the first part, but overall this can be useful for automated deployments like ansible where it would be best not to put all your eggs in a single basket, or if you want to manage multiple CAs, e.g. root CA belongs to a school and intermediates are managed by individual labs.