ies to manage certificate authority contexts. ## EXAMPLES ''' $ cat $(step path --base)/contexts.json { "alpha-one": { "authority": "alpha-one.ca.smallstep.com", "profile": "alpha-one" }, "alpha-two": { "authority": "alpha-two.ca.smallstep.com", "profile": "alpha-two" }, "beta": { "authority": "beta.ca.smallstep.com", "profile": "beta" } } ''' Select the default certificate authority context: ''' $ step context select alpha-one ''' List the available certificate authority contexts: ''' $ step context list ▶ alpha-one alpha-two beta '''**step ssh certificate** [**--host**] [--**host-id**] [**--sign**] [**--principal**=] [**--password-file**=] [**--provisioner-password-file**=] [**--add-user**] [**--not-before**=] [**--comment**=] [**--not-after**=] [**--token**=] [**--issuer**=] [**--console**] [**--no-password**] [**--insecure**] [**--force**] [**--x5c-cert**=] [**--x5c-key**=] [**--k8ssa-token-path**=] [**--no-agent**] [**--kty**=] [**--curve**=] [**--size**=] [**--min-password-length**=] [**--ca-url**=] [**--root**=] [**--context**=]The cryptographic content encryption algorithm used to perform authenticated encryption on the plaintext payload (the content) to produce ciphertext and the authentication tag. : is a case-sensitive string and must be one of: **A128CBC-HS256** : AES_128_CBC_HMAC_SHA_256 authenticated encryption algorithm **A192CBC-HS384** : AES_192_CBC_HMAC_SHA_384 authenticated encryption algorithm **A256CBC-HS512** : AES_256_CBC_HMAC_SHA_512 authenticated encryption algorithm **A128GCM** : AES GCM using 128-bit key **A192GCM** : AES GCM using 192-bit key **A256GCM** (default) : AES GCM using 256-bit key**%s** command manages URI domains in policies ## EXAMPLES Allow all URI subdomains of "local" in X.509 certificates on authority level ''' $ step ca policy authority x509 allow uri "*.local" ''' Deny URI badhost.local domain in X.509 certificates on authority level ''' $ step ca policy authority x509 deny uri badhost.local ''' Remove badhost.local from denied URI domain names in X.509 certificates on authority level ''' $ step ca policy authority x509 deny uri badhost.local --remove ''' Allow all URI subdomains of "example.com" in X.509 certificates on provisioner level ''' $ step ca policy provisioner x509 allow uri "*.example.com" --provisioner my_provisioner '''**step ca api token create** creates a new token for connecting to the Smallstep API. ## POSITIONAL ARGUMENTS : UUID or slug of the team the API token will be issued for. This is available in the Smallstep dashboard. : File to read the certificate (PEM format). This certificate must be signed by a trusted root configured in the Smallstep dashboard. : File to read the private key (PEM format). ## EXAMPLES Use a certificate to get a new API token: ''' $ step api token create ff98be70-7cc3-4df5-a5db-37f5d3c96e23 internal.crt internal.key ''' Get a token using the team slug: ''' $ step api token create teamfoo internal.crt internal.key ''' **step ssh renew** command renews an SSH Host Certificate using [step certificates](https://github.com/smallstep/certificates). It writes the new certificate to disk - either overwriting or using a new file when the **--out**= flag is used. This command cannot be used to renew SSH User Certificates. ## POSITIONAL ARGUMENTS : The ssh certificate to renew. : The ssh certificate private key. ## EXAMPLES Renew an ssh certificate overwriting the previous one: ''' $ step ssh renew -f id_ecdsa-cert.pub id_ecdsa ''' Renew an ssh certificate with a custom out file: ''' $ step ssh renew -out new-id_ecdsa-cer.pub id_ecdsa-cert.pub id_ecdsa '''**step ca health** makes an API request to the /health endpoint of the Step CA to check if it is running. If the CA is healthy, the response will be 'ok'. ## EXAMPLES Using the required flags: ''' $ step ca health --ca-url https://ca.smallstep.com:8080 --root path/to/root_ca.crt ok ''' With the required flags preconfigured: **--ca-url** is set using environment variables (as STEP_CA_URL) or the default configuration file in <$STEPPATH/config/defaults.json>. **--root** is set using environment variables (as STEP_ROOT), the default configuration file in <$STEPPATH/config/defaults.json> or the default root certificate located in <$STEPPATH/certs/root_ca.crt> ''' $ step ca health ok '''