autonomy cert rotate

Rotate an existing TLS leaf certificate in-place

Synopsis

Rotate an existing ECDSA P-256 leaf certificate in-place.

The existing certificate and key files are replaced atomically. If –identity is omitted, the Subject CN of the existing certificate is used.

Run this command before the certificate’s renewal window (default 30 days before expiry) to maintain uninterrupted mTLS connectivity.

Required RBAC permission: cert:manage. Set AUTONOMY_RBAC_ENFORCEMENT=0 to disable enforcement (not recommended in production).

Usage

autonomy cert rotate [flags]

Examples

# Rotate with identity read from existing cert
  autonomy cert rotate \
    --cert-file   /etc/edge/certs/node.crt \
    --key-file    /etc/edge/certs/node.key \
    --ca-cert     /etc/edge/certs/ca.crt \
    --ca-key      /etc/edge/certs/ca.key

  # Rotate with explicit identity override
  autonomy cert rotate \
    --cert-file   /etc/edge/certs/node.crt \
    --key-file    /etc/edge/certs/node.key \
    --ca-cert     /etc/edge/certs/ca.crt \
    --ca-key      /etc/edge/certs/ca.key \
    --identity    node-alpha.edge.io

Options

      --ca-cert string      path to CA certificate PEM (required)
      --ca-key string       path to CA private key PEM (required)
      --cert-file string    path to write the new leaf certificate PEM (required)
      --identity string     override node identity (default: Subject CN of existing cert)
      --key-file string     path to write the new leaf private key PEM (required)
      --validity-days int   certificate validity period in days (default 90)

See also

  • autonomy cert — Manage TLS leaf certificates for edge node identity