Automate Local TLS Certificates With Step-CA

Поділитися
Вставка
  • Опубліковано 22 лис 2024

КОМЕНТАРІ • 23

  • @itssoaztek4592
    @itssoaztek4592 7 місяців тому +1

    I learned a lot from your previous videos about creating and using one's own private ca based on openSSL. Very recently I decided to change to step-ca as soon as I can allocate the time to make the change. Imagine how lucky I feel to see you now also have a brand new tutorial on step-ca!!

    • @TechTutorialsDavidMcKone
      @TechTutorialsDavidMcKone  7 місяців тому

      Step-ca has been on my radar for a while and I eventually got round to it
      So it was good to be able to finally put it to use

  • @Glatze603
    @Glatze603 8 місяців тому +4

    For more usability for users that watch youtube videos on there smartphones, could you please consider 3 things: enlarge the terminal, press enter 2 or 3 times in order not to start at the top and after you paste text presh arrow right in order to demarc the text so it is better readable? That would be fantastic 🙂

    • @TechTutorialsDavidMcKone
      @TechTutorialsDavidMcKone  8 місяців тому +2

      Good suggestions
      I did enlarge the font some time back based on comments, and my video editor seems to blur things when I get it to zoom but I'll revisit that option as well
      In the mean time, there is a blog which has all the commands in it
      www.techtutorials.tv/sections/it-security/automated-tls-certificates-step-ca/
      Just need to figure out how to get markup language to give me a copy button

    • @rob280
      @rob280 3 місяці тому +1

      @@TechTutorialsDavidMcKone Thank you for putting in a link to the blog post, it is nice to be able to copy in the commands while watching the video.

    • @TechTutorialsDavidMcKone
      @TechTutorialsDavidMcKone  3 місяці тому

      @@rob280 Yes, I think all videos like these should have commands you can copy and paste
      I'd like to have a copy command next to the lines, but it's a static website and it's proving difficult to find how to do that

  • @jasonmako343
    @jasonmako343 7 місяців тому +1

    Thank you for your instructional videos. I find them to be very useful. and appreciate that you don't gloss over the details and more often than not, provide additional insight. For this implementation when using ACME, how do you include the IP address in the SAN when PVE generates the CSR, in addition to the FQDN, so connecting via IP provides a secure connection? With your recent Ansible videos, it would be interesting to see how much of this process could be automated for existing hosts and new hosts as they are provisioned.

    • @TechTutorialsDavidMcKone
      @TechTutorialsDavidMcKone  7 місяців тому +1

      I haven't tested this with a SAN or IP addressing but according to the documentation, step-ca support this
      smallstep.com/docs/step-cli/reference/ca/token/
      For PVE for instance, you can include multiple entries in the domain field
      You just have to separate them with a semi-colon e.g.
      prox1.servers.com;192.168.12.12
      Ansible's very flexible as you can just execute commands if there isn't a module to support this
      So for PVE you have the pve config command available
      pve.proxmox.com/pve-docs/pvenode.1.html

  • @aaron6841
    @aaron6841 5 днів тому +1

    Caddy is awesome for this

    • @TechTutorialsDavidMcKone
      @TechTutorialsDavidMcKone  4 дні тому

      Yeah, it's on my to do list
      I've been using it as a reverse proxy and it's very good for that
      Now I want to see if I can use it to provide certificates for other devices through ACME or even manually

    • @aaron6841
      @aaron6841 4 дні тому

      @TechTutorialsDavidMcKone you definitely can adding tls internal to the caddy file setsup a root certificate that isusses server certificate all you have to do is trust the root certificate. They only last for a day which I really hope the industry isn't going for.

  • @gkedge
    @gkedge 3 місяці тому +1

    Do you just create and install certs with expirations measured in decades for devices/environments that don't support ACME?

    • @TechTutorialsDavidMcKone
      @TechTutorialsDavidMcKone  3 місяці тому +1

      Typically you set the certificate expiry for 1 year
      Lab environments might use 10 years, but the expectation is they'd be rebuilt several times over the course of a year and so it wouldn't matter

  • @robertjyllhed3245
    @robertjyllhed3245 8 місяців тому +1

    I’m amazed, your content is great, good explaining and a great purpouse

    • @TechTutorialsDavidMcKone
      @TechTutorialsDavidMcKone  8 місяців тому

      Thanks for the feedback
      The videos I'm doing tend to cover what I'm doing myself to improve IT

  • @Glatze603
    @Glatze603 8 місяців тому +2

    Very interesting! Thanks for this video.

    • @TechTutorialsDavidMcKone
      @TechTutorialsDavidMcKone  8 місяців тому +1

      Yes, it's very useful
      You can run it as a normal application, but I'm liking the container option
      Retail switches for instance that don't support SSH will still need manual work
      But I noticed Cerbot supports a lot of systems so that could be used to automate other devices

  • @AdrianuX1985
    @AdrianuX1985 8 місяців тому +1

    +1

  • @ltonchis1245
    @ltonchis1245 8 місяців тому +1

    Nice coverage but too much of a hassle for using CLI

    • @TechTutorialsDavidMcKone
      @TechTutorialsDavidMcKone  8 місяців тому

      Docker has a desktop option
      www.docker.com/products/docker-desktop/
      And so does Podman
      podman-desktop.io/
      Portainer is an interesting alternative mind
      www.portainer.io/
      But for now at least it's only supporting Docker
      The bootstrapping stuff I was doing was more for basic testing and updating the certificate store. It's not necessary for web browsers
      Not much CLI work to do for Proxmox VE, but hopefully they'll add that into the GUI at some point

    • @gkedge
      @gkedge 3 місяці тому

      For devices without an ACME client, are you just manually creating one for years?
      If so, how might that compromise the 1day strategy?

    • @ltonchis1245
      @ltonchis1245 3 місяці тому

      @@TechTutorialsDavidMcKone Wouldn't it be better using Caddy v2 ? they use Step-CA for localPKI

    • @TechTutorialsDavidMcKone
      @TechTutorialsDavidMcKone  3 місяці тому

      @@ltonchis1245 Thanks for mentioning this, I'll take a look