Retrieve the RSA-2048 signature from the instance metadata and add it to a file named rsa2048 along the required header and footer. Use one of the following commands depending on the IMDS version used by the instance.
Use the OpenSSL smime command to verify the signature. Include the -verify option to indicate that the signature needs to be verified, and the -noverify option to indicate that the certificate does not need to be verified.
The following sections discuss how to use the ACM console or AWS CLI to request apublic ACM certificate. After you request a public certificate, you must complete oneof the procedures described in Validating domain ownership.
Administrators can use ACM Conditional Key Policiesto control how end users issue new certificates. These Conditional keys allow restrictions to be placed on domains,validation methods, and other attributes related to a certificate request.
Unless you choose to opt out, publicly trusted ACM certificates areautomatically recorded in at least two certificate transparency databases. Youcannot currently use the console to opt out. You must use the AWS CLI or the ACMAPI. For more information, see Opting out of certificate transparency logging. For general information abouttransparency logs, see Certificate Transparency Logging.
You can use a fully qualified domain name (FQDN), such aswww.example.com, or a bare or apex domain namesuch as example.com. You can also use an asterisk(*) as a wild card in the leftmost position toprotect several site names in the same domain. For example,*.example.com protectscorp.example.com, andimages.example.com. The wild-card name willappear in the Subject field and in theSubject Alternative Name extension of the ACMcertificate.
When you request a wild-card certificate, the asterisk(*) must be in the leftmost position of thedomain name and can protect only one subdomain level. For example,*.example.com can protectlogin.example.com, andtest.example.com, but it cannot protecttest.login.example.com. Also note that*.example.com protects onlythe subdomains of example.com, it does not protectthe bare or apex domain (example.com). To protectboth, see the next step.
To add another name, choose Add another name to thiscertificate and type the name in the text box. This is usefulfor protecting both a bare or apex domain (such asexample.com) and its subdomains such as*.example.com).
In the Tags page, you can optionally tag yourcertificate. Tags are key-value pairs that serve as metadata for identifyingand organizing AWS resources. For a list of ACM tag parameters and forinstructions on how to add tags to certificates after creation, see Tagging AWS Certificate Manager certificates.
A certificate enters status Pending validation uponbeing requested, unless it fails for any of the reasons given in thetroubleshooting topic Certificate request fails. ACM makes repeated attempts tovalidate a certificate for 72 hours and then times out. If a certificateshows status Failed or Validation timedout, delete the request, correct the issue with DNS validation or Email validation, andtry again. If validation succeeds, the certificate enters statusIssued.
Depending on how you have ordered the list, a certificate you arelooking for might not be immediately visible. You can click theblack triangle at right to change the ordering. You can also navigatethrough multiple pages of certificates using the page numbers atupper-right.
Use the request-certificate command to request a new public ACM certificateon the command line. Optional values for the validation method are DNS and EMAIL.Optional values for the key algorithm are RSA_2048 (the default if the parameter isnot explicitly provided), EC_prime256v1, and EC_secp384r1.
AWS Certificate Manager (ACM) now allows you to import Secure Sockets Layer/Transport Layer Security (SSL/TLS) X.509 certificates of additional key types and key sizes, including Elliptic Curve Digital Signature Algorithm (ECDSA) and RSA 3072 and 4096 keys and bind them with integrated services like Amazon CloudFront and Application Load Balancer. Previously, you could use AWS Identity and Access Management (IAM) to import and use these certificate types as ACM only supported usage of imported RSA 1024 or RSA 2048 key certificates.
SSL/TLS certificates are used to secure network communications and establish the identity of websites over the internet as well as resources on private networks. ACM lets you easily provision, manage, and deploy public and private SSL/TLS certificates. You can use ACM to issue RSA 2048 certificates. However your application may require certificates with different key types or key sizes. ACM now allows you to import and use ECDSA P256, P384, P521 and RSA 3072, 4096 SSL/TLS certificates with integrated services. Specifically, you can use imported ECDSA P256 certificates with Amazon CloudFront and all of the ECDSA and RSA certificate mentioned above with Application Load Balancing. When you import a certificate using the AWS Management Console, you will be informed about the certificate type and the integrated services with which it can be used. This information is also available in the certificate details within the console.
The default root of trust for ACM-issued certificates is CN=Amazon Root CA 1,O=Amazon,C=US, which offers 2048-bit RSA security. The other roots are reserved for future use. All of the roots are cross-signed by the Starfield Services Root Certificate Authority certificate.
Unlike Symmetric Key Cryptography, asymmetric cryptography uses different but mathematically related keys to encrypt and decrypt content. One of the keys is public and is typically made available in an X.509 v3 certificate. The other key is private and is stored securely. The X.509 certificate binds the identity of a user, computer, or other resource (the certificate subject) to the public key.
ACM certificates are X.509 SSL/TLS certificates that bind the identity of your website and the details of your organization to the public key that is contained in the certificate. ACM uses your AWS KMS key to encrypt the private key. For more information, see Security for certificate private keys.
A certificate authority (CA) is an entity that issues digital certificates. Commercially, the most common type of digital certificate is based on the ISO X.509 standard. The CA issues signed digital certificates that affirm the identity of the certificate subject and bind that identity to the public key contained in the certificate. A CA also typically manages certificate revocation.
To guard against SSL/TLS certificates that are issued by mistake or by a compromised CA, some browsers require that public certificates issued for your domain be recorded in a certificate transparency log. The domain name is recorded. The private key is not. Certificates that are not logged typically generate an error in the browser.
Before the Amazon CA issues a publicly trusted SSL/TLS certificate for your domain, it submits the certificate to at least three certificate transparency log servers. These servers add the certificate to their public databases and return a signed certificate timestamp (SCT) to the Amazon CA. The CA then embeds the SCT in the certificate, signs the certificate, and issues it to you. The timestamps are included with other X.509 extensions.
Certificate transparency logging is automatic when you request or renew a certificate unless you choose to opt out. For more information about opt out, see Opting out of certificate transparency logging.
The Domain Name System (DNS) is a hierarchical distributed naming system for computers and other resources connected to the internet or a private network. DNS is primarily used to translate textual domain names, such as aws.amazon.com, into numerical IP (Internet Protocol) addresses of the form 111.122.133.144. The DNS database for your domain, however, contains a number of records that can be used for other purposes. For example, with ACM you can use a CNAME record to validate that you own or control a domain when you request a certificate. For more information, see DNS validation.
A public key infrastructure (PKI) consists of hardware, software, people, policies, documents, and procedures that are needed to create, issue, manage, distribute, use, store, and revoke digital certificates. PKI facilitates the secure transfer of information across computer networks.
A certificate authority (CA) typically exists within a hierarchical structure that contains multiple other CAs with clearly defined parent-child relationships between them. Child or subordinate CAs are certified by their parent CAs, creating a certificate chain. The CA at the top of the hierarchy is referred to as the root CA, and its certificate is called the root certificate. This certificate is typically self-signed.
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide communication security over a computer network. TLS is the successor of SSL. They both use X.509 certificates to authenticate the server. Both protocols negotiate a symmetric key between the client and the server that is used to encrypt data flowing between the two entities.
HTTPS stands for HTTP over SSL/TLS, a secure form of HTTP that is supported by all major browsers and servers. All HTTP requests and responses are encrypted before being sent across a network. HTTPS combines the HTTP protocol with symmetric, asymmetric, and X.509 certificate-based cryptographic techniques. HTTPS works by inserting a cryptographic security layer below the HTTP application layer and above the TCP transport layer in the Open Systems Interconnection (OSI) model. The security layer uses the Secure Sockets Layer (SSL) protocol or the Transport Layer Security (TLS) protocol.
HTTPS transactions require server certificates to authenticate a server. A server certificate is an X.509 v3 data structure that binds the public key in the certificate to the subject of the certificate. An SSL/TLS certificate is signed by a certificate authority (CA) and contains the name of the server, the validity period, the public key, the signature algorithm, and more.
f448fe82f3