diff --git a/setup.py b/setup.py
index 0493f03..7fb8e6c 100644
--- a/setup.py
+++ b/setup.py
@@ -10,7 +10,7 @@ setup(
     #long_description_content_type="text/markdown",
     install_requires=["requests>=2.20.0,<3.0", "PyYAML", "tabulate"],
     keywords=["step-ca-inspector"],
-    version="0.0.3",
+    version="0.0.1",
     classifiers=[
         "Intended Audience :: Developers",
         "Development Status :: 3 - Alpha",
diff --git a/step_ca_inspector_client/cli.py b/step_ca_inspector_client/cli.py
index c78b2ac..700c753 100644
--- a/step_ca_inspector_client/cli.py
+++ b/step_ca_inspector_client/cli.py
@@ -9,21 +9,6 @@ from step_ca_inspector_client.config import config
 
 config()
 
-CERT_STATUS = ["Valid", "Expired", "Revoked"]
-PROVISIONER_TYPES = [
-    "ACME",
-    "AWS",
-    "GCP",
-    "JWK",
-    "Nebula",
-    "OIDC",
-    "SCEP",
-    "SSHPOP",
-    "X5C",
-    "K8sSA",
-]
-SSH_CERT_TYPES = ["Host", "User"]
-
 
 def delta_text(delta):
     s = "s"[: abs(delta.days) ^ 1]
@@ -51,19 +36,11 @@ def fetch_api(endpoint, params={}):
     return results.json()
 
 
-def list_ssh_certs(
-    sort_key,
-    cert_status=["Valid"],
-    cert_type=SSH_CERT_TYPES,
-    key=None,
-    principal=None,
-):
+def list_ssh_certs(sort_key, revoked=False, expired=False):
     params = {
         "sort_key": sort_key,
-        "cert_status": cert_status,
-        "cert_type": cert_type,
-        "key": key,
-        "principal": principal,
+        "revoked": revoked,
+        "expired": expired,
     }
     cert_list = fetch_api("ssh/certs", params=params)
 
@@ -163,21 +140,11 @@ def dump_ssh_cert(serial):
     print(cert["public_identity"])
 
 
-def list_x509_certs(
-    sort_key,
-    cert_status=["Valid"],
-    provisioner_type=None,
-    provisioner_name=None,
-    subject=None,
-    san=None,
-):
+def list_x509_certs(sort_key, revoked=False, expired=False):
     params = {
         "sort_key": sort_key,
-        "cert_status": cert_status,
-        "provisioner_type": provisioner_type,
-        "provisioner": provisioner_name,
-        "subject": subject,
-        "san": san,
+        "revoked": revoked,
+        "expired": expired,
     }
     cert_list = fetch_api(f"x509/certs", params=params)
     cert_tbl = []
@@ -309,12 +276,18 @@ def main():
     )
     x509_list_parser = x509_subparsers.add_parser("list", help="List x509 certificates")
     x509_list_parser.add_argument(
-        "--status",
-        type=str,
-        choices=CERT_STATUS,
-        default=["Valid"],
-        nargs="+",
-        help="Filter by x509 certificate status (default: Valid)",
+        "--show-expired",
+        "-e",
+        action="store_true",
+        default=False,
+        help="Show expired certificates",
+    )
+    x509_list_parser.add_argument(
+        "--show-revoked",
+        "-r",
+        action="store_true",
+        default=False,
+        help="Show revoked certificates",
     )
     x509_list_parser.add_argument(
         "--sort-by",
@@ -324,34 +297,6 @@ def main():
         default="not_after",
         help="Sort certificates",
     )
-    x509_list_parser.add_argument(
-        "--provisioner-type",
-        "-t",
-        type=str,
-        choices=PROVISIONER_TYPES,
-        default=None,
-        nargs="+",
-        help="Filter by provisioner type",
-    )
-    x509_list_parser.add_argument(
-        "--provisioner-name",
-        "-p",
-        type=str,
-        default=None,
-        help="Filter by provisioner name",
-    )
-    x509_list_parser.add_argument(
-        "--subject",
-        type=str,
-        default=None,
-        help="Search for subject",
-    )
-    x509_list_parser.add_argument(
-        "--san",
-        type=str,
-        default=None,
-        help="Search for Subject Alt Name",
-    )
     x509_details_parser = x509_subparsers.add_parser(
         "details", help="Show an x509 certificate details"
     )
@@ -392,12 +337,18 @@ def main():
     )
     ssh_list_parser = ssh_subparsers.add_parser("list", help="List ssh certificates")
     ssh_list_parser.add_argument(
-        "--status",
-        type=str,
-        choices=CERT_STATUS,
-        default=["Valid"],
-        nargs="+",
-        help="Filter by SSH certificate status (default: Valid)",
+        "--show-expired",
+        "-e",
+        action="store_true",
+        default=False,
+        help="Show expired certificates",
+    )
+    ssh_list_parser.add_argument(
+        "--show-revoked",
+        "-r",
+        action="store_true",
+        default=False,
+        help="Show revoked certificates",
     )
     ssh_list_parser.add_argument(
         "--sort-by",
@@ -407,29 +358,6 @@ def main():
         default="not_after",
         help="Sort certificates (default: not_after)",
     )
-    ssh_list_parser.add_argument(
-        "--type",
-        "-t",
-        type=str,
-        choices=SSH_CERT_TYPES,
-        default=SSH_CERT_TYPES,
-        nargs="+",
-        help="Filter by SSH certificate type",
-    )
-    ssh_list_parser.add_argument(
-        "--key-id",
-        "-k",
-        type=str,
-        default=None,
-        help="Search for key ID",
-    )
-    ssh_list_parser.add_argument(
-        "--principal",
-        "-p",
-        type=str,
-        default=None,
-        help="Search for principal",
-    )
     ssh_details_parser = ssh_subparsers.add_parser(
         "details", help="Show an ssh certificate details"
     )
@@ -445,12 +373,9 @@ def main():
     if args.object == "x509":
         if args.action == "list":
             list_x509_certs(
-                cert_status=args.status,
+                revoked=args.show_revoked,
+                expired=args.show_expired,
                 sort_key=args.sort_by,
-                provisioner_type=args.provisioner_type,
-                provisioner_name=args.provisioner_name,
-                subject=args.subject,
-                san=args.san,
             )
         elif args.action == "details":
             get_x509_cert(
@@ -463,11 +388,9 @@ def main():
     elif args.object == "ssh":
         if args.action == "list":
             list_ssh_certs(
-                cert_status=args.status,
+                revoked=args.show_revoked,
+                expired=args.show_expired,
                 sort_key=args.sort_by,
-                cert_type=args.type,
-                key=args.key_id,
-                principal=args.principal,
             )
         elif args.action == "details":
             get_ssh_cert(serial=args.serial)