Documentation Index
Fetch the complete documentation index at: https://mintlify.com/lamassuiot/lamassuiot/llms.txt
Use this file to discover all available pages before exploring further.
Certificate Authorities
Certificate Authorities (CAs) are the foundation of Lamassu’s PKI infrastructure. They issue, sign, and manage digital certificates that establish device identities and secure communications.CA Lifecycle
A Certificate Authority in Lamassu follows a well-defined lifecycle from creation to expiration or revocation:CA Status States
Lamassu tracks CAs through several status states:- ACTIVE — CA is valid and can issue certificates
- EXPIRED — CA certificate has passed its validity period
- REVOKED — CA has been revoked and should not be trusted
- INACTIVE — CA is not currently in use
CA status is automatically computed based on certificate validity periods and revocation status.
CA Certificate Types
Lamassu supports three types of CA certificates:Managed CAs
Type:MANAGED
Managed CAs are created and controlled entirely by Lamassu. The platform generates the private key, stores it securely in a crypto engine, and manages the full certificate lifecycle.
Managed CAs provide the highest level of automation and integration with Lamassu’s key management system.
- Production PKI hierarchies
- Automated certificate issuance
- Hardware-backed key storage (PKCS#11, AWS KMS)
Imported with Key
Type:IMPORTED_WITH_KEY
CAs imported along with their private keys. Lamassu stores both the certificate and private key, enabling the CA to issue certificates.
Use cases:
- Migrating existing PKI infrastructure
- Using externally generated CA keys
- Integration with external certificate workflows
Imported without Key
Type:IMPORTED_WITHOUT_KEY
CAs imported for trust and validation purposes only. Lamassu stores the certificate but not the private key, so the CA cannot issue new certificates through Lamassu.
Use cases:
- Adding external trust anchors
- Certificate validation and chain building
- CA distribution for EST endpoints
CA Hierarchy and Levels
Lamassu supports multi-level CA hierarchies for implementing enterprise PKI best practices:CA Level Metadata
Each CA certificate includes level metadata:- Level — Position in the hierarchy (0 = root, 1 = intermediate, 2+ = issuing)
- Issuer CA Metadata — Reference to the parent CA
- Serial Number
- CA ID
- Level
CA Data Model
The core CA data structure:- ID — Unique identifier for the CA (e.g.,
ca-root-01) - Certificate — Full certificate object including X.509 details
- Level — Position in the CA hierarchy
- ProfileID — Default issuance profile for certificates issued by this CA
- Metadata — Flexible key-value storage for custom attributes
Certificate Subject and Issuer
Every CA certificate contains subject and issuer information:For root CAs, the subject and issuer are identical (self-signed). For subordinate CAs, the issuer matches the parent CA’s subject.
CA Reissuance
Lamassu supports CA reissuance for certificate renewal or rotation:Reissuance Metadata
CA metadata tracks reissuance operations:lamassu.io/ca/reissued-as— ID of the new CA certificatelamassu.io/ca/reissued-at— Timestamp of reissuancelamassu.io/ca/reissued-from— ID of the original CA certificatelamassu.io/ca/reissue-reason— Reason for reissuance
Reissuance Workflow
- Generate new key pair (optional — can reuse existing key)
- Create CSR with updated validity period
- Sign with parent CA or self-sign for root
- Update metadata on both old and new CA
- Transition clients to trust new CA
Expiration Monitoring
Lamassu provides built-in CA expiration monitoring:Monitoring Deltas
Configure expiration alerts using monitoring deltas:- Key:
lamassu.io/ca/expiration-deltas - Value: Array of
MonitoringExpirationDeltaobjects
Example Configuration
CA Statistics
Lamassu provides aggregated statistics for CA monitoring:Crypto Engine Binding
Each CA is bound to a crypto engine that stores its private key:- EngineID — Identifier of the crypto engine (e.g.,
golang-default,aws-kms-prod) - Engine Type — PKCS11, AWS KMS, Azure Key Vault, HashiCorp Vault, or Golang (software)
- Security Level — SL0 (software), SL1 (cloud HSM), SL2 (hardware HSM)
See Key Management for details on crypto engines and security levels.
Issuance Profiles
CAs can have associated issuance profiles that define:- Certificate validity periods
- Key usage and extended key usage
- Subject DN handling
- Crypto enforcement policies
Related API Endpoints
GET /v2/cas— List all CAs with filteringPOST /v2/cas— Create a new CAGET /v2/cas/{caId}— Get CA detailsDELETE /v2/cas/{caId}— Revoke or delete a CAGET /v2/cas/{caId}/certificates— List certificates issued by a CAGET /v2/stats/cas— Get CA statistics
Best Practices
Root CA Protection
- Store root CA keys offline or in hardware HSMs (SL2)
- Limit root CA certificate validity to 10-20 years
- Use root CAs only to sign intermediate CAs, not end-entity certificates
- Maintain offline backups of root CA private keys
Intermediate CAs
- Use intermediate CAs for day-to-day certificate issuance
- Set intermediate CA validity to 5-10 years
- Rotate intermediate CAs before expiration
- Distribute intermediate CA certificates with end-entity certificates
Operational CAs
- Create separate CAs for different certificate types (devices, servers, users)
- Set operational CA validity to 2-5 years
- Enable expiration monitoring with appropriate deltas
- Plan reissuance strategy before CA expiration
Metadata Usage
- Tag CAs with environment labels (production, staging, development)
- Track CA purpose in metadata (devices, servers, code signing)
- Document CA ownership and operational contacts
- Store compliance and audit information in metadata
Next Steps
Device Management
Learn how devices use CA certificates for identity
Enrollment
Understand device enrollment and certificate provisioning
Managing CAs
Practical guide to creating and managing CAs
Issuance Profiles
Configure certificate issuance policies
