Machine ID should have a method for refreshing expired certificates without recreating a bot #13091
Labels
feature-request
Used for new features in Teleport, improvements to current should be #enhancements
machine-id
What would you like Teleport to do?
tctl
should have a new function to refresh expired bot credentials by generating a new token for an existing user, expiring any other credentials.As an example:
What problem does this solve?
Currently when a bot's certificates expire, it must be fully deleted and recreated to generate a new token. This is required to reset the server-side generation counter, which is an additional level of certificate theft prevention used with token-based joining.
If a workaround exists, please include it.
Additionally, AWS IAM joining and GitHub Actions OIDC joining use reusable tokens and are not affected by this.
The text was updated successfully, but these errors were encountered: