Skip to content
Discussion options

You must be logged in to vote

Hi @ch0wm3in, you're right that someone could start cracking the encryptedKey, but you can remove it from the provisioner as long as you provide it on the client side every time it's required. It's provided for convenience.

Here's some docs on that: https://smallstep.com/docs/step-ca/provisioners/#removing-the-encrypted-private-key-from-a-jwk-provisioner.

That said, in our general production considerations we mention to use strong passwords, which, as you mentioned, should protect you from the key getting decrypted: https://smallstep.com/docs/step-ca/certificate-authority-server-production/#use-strong-passwords-and-store-them-well.

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by ch0wm3in
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants