fioctl keys ca disable-device-ca

Disable device CA, so that new devices with client certificates it issued can no longer be registered

Synopsis

Disable device CA, so that new devices with client certificates it issued can no longer be registered.

When the online or local device CA is disabled: - It is no longer possible to register new devices with client certificates it had issued. - Existing devices with client certificates it issued may continue to connect and use your Factory.

Usually, when the device CA is compromised, a user should: 1. Immediately disable a given device CA using “fioctl keys ca disable-device-ca <PKI Directory> –serial <CA Serial>”. 2. Inspect their devices with client certificates issued by that device CA, and remove compromised devices (see “fioctl devices list|delete”). 3. Create a new device CA using “fioctl keys ca add-device-ca <PKI Directory> –online-ca|–local-ca”. 4. Rotate a client certificate of legitimate devices to the certificate issued by a new device CA (see “fioctl devices config rotate-certs”). 5. Revoke a given device CA using “fioctl keys ca revoke-device-ca <PKI Directory> –serial <CA Serial>”.

fioctl keys ca disable-device-ca <PKI Directory> [flags]

Examples

# Disable two device CAs given their serial numbers:
fioctl keys ca disable-device-ca /path/to/pki/dir --ca-serial <base-10-serial-1> --ca-file <base-10-serial-2>

# Show a generated CRL that would be sent to the server to disable a local device CA, without actually disabling it.
fioctl keys ca disable-device-ca /path/to/pki/dir --ca-file local-ca --dry-run --pretty

# See "fioctl keys ca revoke-device-ca --help" for more examples; these two commands have a very similar syntax.

Options

    --ca-file stringArray      A file name of the device CA to disable. Can be used multiple times to disable several device CAs
    --ca-serial stringArray    A serial number (base 10) of the device CA to disable. Can be used multiple times to disable several device CAs
    --dry-run                  Do not disable the certificate, but instead show a generated CRL that will be uploaded to the server.
-h, --help                     help for disable-device-ca
    --hsm-module string        Load a root CA key from a PKCS#11 compatible HSM using this module
    --hsm-pin string           The PKCS#11 PIN to log into the HSM
    --hsm-token-label string   The label of the HSM token containing the root CA key
    --pretty                   Can be used with dry-run to show the generated CRL in a pretty format.

Options inherited from parent commands

-c, --config string    config file (default is $HOME/.config/fioctl.yaml)
-f, --factory string   Factory to list targets for
-t, --token string     API token from https://app.foundries.io/settings/tokens/
-v, --verbose          Print verbose logging

SEE ALSO

  • fioctl keys ca - Manage Public Key Infrastructure for your device gateway