Skip to main content

Creating X.509 Certificates with Peridio

This guide describes how to create X.509 certificates with the Peridio CLI.

less speed more flexibility

For more control over key and certificate details, see creating X.509 certificates with OpenSSL.

Prerequisites

Create Certificates

sensitive private keys

Private keys are sensitive components of a public key infrastructure. If they are leaked the entire downstream chain of trust is compromised.

certificate validity period

The --start-date and --end-date options should be specified cautiously as they dictate when the certificate will be valid for. The impact of a certificate not being valid yet or having already expired is dependent on the parties interacting with it.

For information regarding how Peridio interacts with certificates reference CA Certificates and Device Certificates.

sign by name

The --signer-key PATH and --signer-cert PATH option pair can be replaced by a single --signer NAME option. For context, see Peridio CLI config.

Root

For context, reference X.509.

You must fill in the --start-date and --end-date values.

peridio x509 create \
--common-name root-ca \
--is-ca \
--start-date YYYY-MM-DD \
--end-date YYYY-MM-DD

Intermediate

For context, reference X.509 intermediate.

You must fill in the --start-date and --end-date values.

peridio x509 create \
--common-name intermediate-ca \
--is-ca \
--start-date YYYY-MM-DD \
--end-date YYYY-MM-DD
--signer-key root-ca-private-key.pem \
--signer-cert root-ca-certificate.pem

End-Entity Certificate

For context, reference X.509 end entity.

You must fill in the --start-date and --end-date values.

peridio x509 create \
--common-name end-entity \
--start-date YYYY-MM-DD \
--end-date YYYY-MM-DD
--signer-key intermediate-ca-private-key.pem \
--signer-cert intermediate-ca-certificate.pem