Skip to content

Commit 60291ad

Browse files
committed
Fix issues with Vault RA mode instructions
1 parent 69f0386 commit 60291ad

File tree

1 file changed

+12
-1
lines changed

1 file changed

+12
-1
lines changed

step-ca/registration-authority-ra-mode.mdx

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -521,7 +521,7 @@ Run:
521521

522522
```bash
523523
VAULT_URI=http://127.0.0.1:8200
524-
VAULT_CA_FINGERPRINT=$(step certificate fingerprint `step path`/certs/root_ca.crt)
524+
VAULT_CA_FINGERPRINT=$(step certificate fingerprint root_ca.crt)
525525
cat <<< $(jq --arg vault_role_id "$VAULT_ROLE_ID" \
526526
--arg vault_secret_id "$VAULT_SECRET_ID" \
527527
--arg vault_uri "$VAULT_URI" \
@@ -581,6 +581,17 @@ Here are the `config` options for `vaultcas` authorities:
581581

582582
- **tokenPath**: [authType=`kubernetes`] the path to a token used to authenticate (default to the service account token path in a k8s pod)
583583

584+
Finally, remove the `"root"`, `"key"`, and `"crt"` values from your `$(step path)/config/ca.json`, and the associated files. These are generated by `step ca init` but are not used by RA servers.
585+
586+
Run:
587+
588+
```
589+
cat <<< $(jq 'del(.key, .crt, .root)' `step path`/config/ca.json) > $(step path)/config/ca.json
590+
rm $(step path)/certs/root_ca.crt $(step path)/certs/intermediate_ca.crt $(step path)/secrets/intermediate_ca_key
591+
```
592+
593+
Your RA server will read your root from Vault when it starts up.
594+
584595
#### 6. Start your RA server
585596

586597
```bash

0 commit comments

Comments
 (0)