Skip to content

Commit

Permalink
Fix :::note that prettier changed
Browse files Browse the repository at this point in the history
  • Loading branch information
johnmaguire committed Oct 30, 2023
1 parent fc7ec27 commit 343d3ab
Showing 1 changed file with 6 additions and 2 deletions.
8 changes: 6 additions & 2 deletions docs/guides/rotating-certificate-authority/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -66,12 +66,16 @@ To match this certificate, we would run `nebula-cert ca -name "test ca - do not
not need to pass `-groups` or `-subnets` because this CA has no such restrictions. By default, Nebula will set the
expiration to a year from today. If you'd like to use a custom expiration, you can use the `-duration` flag.

:::note Nebula offers built-in encryption of the CA private key since v1.7.0. If you do not plan to store the private
:::note

Nebula offers built-in encryption of the CA private key since v1.7.0. If you do not plan to store the private
key in encrypted storage (e.g. Ansible Vault or AWS Secrets Manager), it is recommended that you use the built-in
encryption.

To encrypt your Nebula private key, pass the `-encrypt` flag when generating the CA and you will be prompted for a
passphrase. Keep it safe - you will be prompted for it each time you sign a host using the encrypted CA key. :::
passphrase. Keep it safe - you will be prompted for it each time you sign a host using the encrypted CA key.

:::

**Before proceeding,** we strongly recommend you set a reminder for yourself to rotate your CA again in the future.
Consider setting a reminder in your team's shared calendar for 2-3 months prior to your new CA's expiration.
Expand Down

0 comments on commit 343d3ab

Please sign in to comment.