fioctl keys ca disable-device-ca#
Disable device CA, so that new devices with client certificates it issued can no longer be registered
Synopsis#
Disable device CA, so that new devices with client certificates it issued can no longer be registered.
When the online or local device CA is disabled: - It is no longer possible to register new devices with client certificates it had issued. - Existing devices with client certificates it issued may continue to connect and use your Factory.
Usually, when the device CA is compromised, a user should: 1. Immediately disable a given device CA using “fioctl keys ca disable-device-ca <PKI Directory> –serial <CA Serial>”. 2. Inspect their devices with client certificates issued by that device CA, and remove compromised devices (see “fioctl devices list|delete”). 3. Create a new device CA using “fioctl keys ca add-device-ca <PKI Directory> –online-ca|–local-ca”. 4. Rotate a client certificate of legitimate devices to the certificate issued by a new device CA (see “fioctl devices config rotate-certs”). 5. Revoke a given device CA using “fioctl keys ca revoke-device-ca <PKI Directory> –serial <CA Serial>”.
fioctl keys ca disable-device-ca <PKI Directory> [flags]
Examples#
# Disable two device CAs given their serial numbers:
fioctl keys ca disable-device-ca /path/to/pki/dir --ca-serial <base-10-serial-1> --ca-file <base-10-serial-2>
# Show a generated CRL that would be sent to the server to disable a local device CA, without actually disabling it.
fioctl keys ca disable-device-ca /path/to/pki/dir --ca-file local-ca --dry-run --pretty
# See "fioctl keys ca revoke-device-ca --help" for more examples; these two commands have a very similar syntax.
Options#
--ca-file stringArray A file name of the device CA to disable. Can be used multiple times to disable several device CAs
--ca-serial stringArray A serial number (base 10) of the device CA to disable. Can be used multiple times to disable several device CAs
--dry-run Do not disable the certificate, but instead show a generated CRL that will be uploaded to the server.
-h, --help help for disable-device-ca
--hsm-module string Load a root CA key from a PKCS#11 compatible HSM using this module
--hsm-pin string The PKCS#11 PIN to log into the HSM
--hsm-token-label string The label of the HSM token containing the root CA key
--pretty Can be used with dry-run to show the generated CRL in a pretty format.
Options inherited from parent commands#
-c, --config string config file (default is $HOME/.config/fioctl.yaml)
-f, --factory string Factory to list Targets for
-t, --token string API token from https://app.foundries.io/settings/tokens/
-v, --verbose Print verbose logging
SEE ALSO#
fioctl keys ca - Manage Public Key Infrastructure for your device gateway