- Products›
- Amazon Certificate Manager
Amazon Certificate Manager FAQs
General
Open allACM makes it easier to enable SSL/TLS for a website or application on the Amazon Web Services, hybrid, and multicloud environments. ACM eliminates many of the manual processes previously associated with using and managing SSL/TLS certificates. ACM can also help you avoid downtime due to misconfigured, revoked, or expired certificates by managing renewals. You get SSL/TLS protection and easy certificate management. Enabling SSL/TLS for Internet-facing sites can help improve the search rankings for your site and help you meet regulatory compliance requirements for encrypting data in transit.
When you use ACM to manage certificates, certificate private keys are securely protected and stored using strong encryption and key management best practices. ACM lets you use the Amazon Web Services Management Console, Amazon CLI, or Amazon Certificate Manager APIs to centrally manage all of the SSL/TLS ACM certificates in an Amazon Web Services China Region. ACM is integrated with other Amazon Web Services services, so you can request an SSL/TLS certificate and provision it with your Elastic Load Balancing load balancer from the Amazon Web Services Management Console, through Amazon CLI commands, or with API calls.
ACM enables you to manage the lifecycle of your public certificates. ACM’s capabilities depend on whether the certificate is public, how you obtain the certificate, and where you deploy it. See ACM Public Certificates to learn more about public certificates.
Public certificates - ACM manages the renewal and deployment of public certificates used with ACM-integrated services, including Elastic Load Balancing and Amazon API Gateway.
Exportable public certificates - ACM manages the renewal of exported public certificates that you may deploy with Amazon Web Services services and/or in your on-premises environments.
Imported certificates – If you want to use a third-party certificate with Elastic Load Balancing or Amazon API Gateway, you may import it into ACM using the Amazon Web Services Management Console, Amazon CLI, or ACM APIs. ACM does not manage the renewal process for imported certificates. You are responsible for monitoring the expiration date of your imported certificates and for renewing them before they expire. You can use the Amazon Web Services Management Console to monitor the expiration dates of an imported certificates and import a new third-party certificate to replace an expiring one.
You can use public ACM certificates with the following Amazon Web Services services:
- Elastic Load Balancing – Refer to the Elastic Load Balancing documentation
- Amazon API Gateway – Refer to the API Gateway documentation
- Amazon Elastic Beanstalk – Refer to the Amazon Elastic Beanstalk documentation
- Amazon CloudFormation – Support is currently limited to public certificates that use email validation. Refer to the Amazon CloudFormation documentation.
ACM certificates
Open allACM public certificates
Open allBrowsers that trust ACM certificates display a lock icon and do not issue certificate warnings when connected to sites that use ACM certificates over SSL/TLS, for example using HTTPS.
Public ACM certificates are verified by Amazon’s certificate authority (CA). Any browser, application, or OS that includes the Amazon Root CA 1, Starfield Services Root Certificate Authority - G2, or Starfield Class 2 Certification Authority trusts ACM certificates.
Provisioning ACM public certificates
Open allYou can use the Amazon Web Services Management Console, Amazon CLI, or ACM APIs/SDKs. To use the Amazon Web Services Management Console, navigate to the Certificate Manager, choose Request a certificate, select Request a public certificate, enter the domain name for your site, and follow the instructions on the screen to complete your request. You can add additional domain names to your request if users can reach your site by other names. Before ACM can issue a certificate, it validates that you own or control the domain names in your certificate request. You can choose DNS validation or email validation when requesting a certificate. With DNS validation, you write a record to the public DNS configuration for your domain to establish that you own or control the domain. After you use DNS validation once to establish control of your domain, you can obtain additional certificates and have ACM renew existing certificates for the domain as long as the record remains in place and the certificate remains in use. You do not have to validate control of the domain again. If you choose email validation instead of DNS validation, emails are sent to the domain owner requesting approval to issue the certificate. After validating that you own or control each domain name in your request, the certificate is issued and ready to be provisioned with other Amazon Web Services services, such as Elastic Load Balancing. Refer to the ACM Documentation for details.
You can optionally choose to issue exportable public certificates that you can use with integrated services and export for use with any workloads that require a TLS certificates. These workloads can be within Amazon Web Services, such as a server running on EC2, or can be outside Amazon Web Services, such as an on-premises server.
DNS validation (public certificates)
Open allDNS CNAME records have two components: a name and a label. The name component of an ACM-generated CNAME is constructed from an underscore character (_) followed by a token, which is a unique string that is tied to your Amazon Web Services account and your domain name. ACM prepends the underscore and token to your domain name to construct the name component. ACM constructs the label from an underscore character prepended to a different token which is also tied to your Amazon Web Services account and your domain name. ACM prepends the underscore and token to a DNS domain name used by Amazon Web Services for validations: acm-validations.aws. The following examples show the formatting of CNAMEs for www.example.com, subdomain.example.com, and *.example.com.
_TOKEN1.www.example.com CNAME _TOKEN2.acm-validations.aws
_TOKEN3.subdomain.example.com CNAME _TOKEN4.acm-validations.aws
_TOKEN5.example.com CNAME _TOKEN6.acm-validations.aws
Notice that ACM removes the wildcard label (*) when generating CNAME records for wildcard names. As a result, the CNAME record generated by ACM for a wildcard name (such as *.example.com) is the same record returned for the domain name without the wildcard label (example.com).
Email validation (public certificates)
Open allWhen you request a certificate using email validation, a WHOIS lookup for each domain name in the certificate request is used to retrieve contact information for the domain. Email is sent to the domain registrant, administrative contact, and technical contact listed for the domain. Email is also sent to five special email addresses, which are formed by prepending admin@, administrator@, hostmaster@, webmaster@ and postmaster@ to the domain name you’re requesting. For example, if you request a certificate for server.example.com, email is sent to the domain registrant, technical contact, and administrative contact using contact information returned by a WHOIS query for the example.com domain, plus admin@server.example.com, administrator@server.example.com, hostmaster@server.example.com, postmaster@server.example.com, and webmaster@server.example.com.
The five special email addresses are constructed differently for domain names that begin with "www" or wildcard names beginning with an asterisk (*). ACM removes the leading "www" or asterisk and email is sent to the administrative addresses formed by pre-pending admin@, administrator@, hostmaster@, postmaster@, and webmaster@ to the remaining portion of the domain name. For example, if you request a certificate for www.example.com, email is sent to the WHOIS contacts, as described previously, plus admin@example.com rather than admin@www.example.com. The remaining four special email addresses are similarly formed.
After you request a certificate, you can display the list of email addresses to which the email was sent for each domain using the ACM console, Amazon CLI, or APIs.
Private key protection
Open allBilling
Open allDetails
Open allLogging
Open allManaged renewal and deployment
Open allPublic Certificates
ACM can renew and deploy public ACM certificates without any additional validation from the domain owner. If a certificate cannot be renewed without additional validation, ACM manages the renewal process by validating domain ownership or control for each domain name in the certificate. After each domain name in the certificate has been validated, ACM renews the certificate and automatically deploys it with your Amazon Web Services resources. If ACM cannot validate domain ownership, we will let you (the Amazon Web Services account owner) know.If you chose DNS validation in your certificate request, ACM can renew your certificate indefinitely without any further action from you, as long as the certificate is in use (associated with other Amazon Web Services resources) and your CNAME record remains in place. If you selected email validation when requesting a certificate, you can improve ACM’s ability to automatically renew and deploy ACM certificates, by ensuring that the certificate is in use, that all domain names included in the certificate can be resolved to your site, and that all domain names are reachable from the internet.
If you chose DNS validation in your certificate request for a public certificate, then ACM can renew your certificate without any further action from you, as long as the certificate is in use (associated with other Amazon Web Services resources) and your CNAME record remains in place.
If you selected email validation when requesting a public certificate with a bare domain, ensure that a DNS lookup of the bare domain resolves to the Amazon Web Services resource that is associated with the certificate. Resolving the bare domain to an Amazon Web Services resource may be challenging unless you use DNS provider that supports alias resource records (or their equivalent) for mapping bare domains to Amazon Web Services resources.