autonomy cert revoke

Revoke a certificate and update the local CRL

Synopsis

Revoke a TLS certificate for the given node identity.

The command updates a locally managed CRL file that edge transports can load via EDGE_CRL_FILE. Revocation is performed offline: no network service is contacted, and the CRL is signed with the provided CA certificate/key pair.

Audit trail: every successful revoke emits cert.revoked.

Required RBAC permission: cert:manage. Set AUTONOMY_RBAC_ENFORCEMENT=0 to disable enforcement (not recommended in production).

Usage

autonomy cert revoke [flags]

Examples

autonomy cert revoke \
    --identity node-alpha.edge.io \
    --cert-file /etc/edge/certs/node.crt \
    --ca-cert /etc/edge/certs/ca.crt \
    --ca-key /etc/edge/certs/ca.key \
    --crl-file /etc/edge/certs/revoked.crl \
    --reason key-compromise

Options

      --ca-cert string          path to CA certificate PEM used to sign the CRL (required)
      --ca-key string           path to CA private key PEM used to sign the CRL (required)
      --cert-file string        path to the leaf certificate PEM being revoked (required)
      --crl-file string         path to write the updated CRL PEM (default: EDGE_CRL_FILE)
      --identity string         node identity to revoke (required)
      --next-update-hours int   CRL validity window in hours before the next CRL must be issued (default 168)
      --reason string           revocation reason (e.g. key-compromise, ca-compromise, superseded, cessation-of-operation)

See also

  • autonomy cert — Manage TLS leaf certificates for edge node identity