Specifies X.509 certificate information to be included in the issued certificate. An
APICSRPassthrough template variant must
be selected, or else this parameter is ignored. For more information about using these
templates, see Understanding Certificate Templates.
If conflicting or duplicate certificate information is supplied during certificate issuance, Amazon Web Services Private CA applies order of operation rules to determine what information is used.
The Amazon Resource Name (ARN) that was returned when you called CreateCertificateAuthority. This must be of the form:
The certificate signing request (CSR) for the certificate you want to issue. As an example, you can use the following OpenSSL command to create the CSR and a 2048 bit RSA private key.
openssl req -new -newkey rsa:2048 -days 365 -keyout private/test_cert_priv_key.pem
If you have a configuration file, you can then use the following OpenSSL command. The
usr_cert block in the configuration file contains your X509 version 3
openssl req -new -config openssl_rsa.cnf -extensions usr_cert -newkey rsa:2048
-days 365 -keyout private/test_cert_priv_key.pem -out
Note: A CSR must provide either a subject name or a subject alternative name or the request will be rejected.
Alphanumeric string that can be used to distinguish between calls to the IssueCertificate action. Idempotency tokens for IssueCertificate time out after one minute. Therefore, if you call IssueCertificate multiple times with the same idempotency token within one minute, Amazon Web Services Private CA recognizes that you are requesting only one certificate and will issue only one. If you change the idempotency token for each call, Amazon Web Services Private CA recognizes that you are requesting multiple certificates.
The name of the algorithm that will be used to sign the certificate to be issued.
This parameter should not be confused with the
used to sign a CSR in the
The specified signing algorithm family (RSA or ECDSA) much match the algorithm family of the CA's secret key.
Specifies a custom configuration template to use when issuing a certificate. If this
parameter is not provided, Amazon Web Services Private CA defaults to the
EndEntityCertificate/V1 template. For CA certificates, you should
choose the shortest path length that meets your needs. The path length is indicated by
the PathLenN portion of the ARN, where N is
Note: The CA depth configured on a subordinate CA certificate must not exceed the limit set by its parents in the CA hierarchy.
For a list of
TemplateArn values supported by Amazon Web Services Private CA, see Understanding Certificate
Information describing the end of the validity period of the certificate. This parameter sets the “Not After” date for the certificate.
Certificate validity is the period of time during which a certificate is valid. Validity can be expressed as an explicit date and time when the certificate expires, or as a span of time after issuance, stated in days, months, or years. For more information, see Validity in RFC 5280.
This value is unaffected when
ValidityNotBefore is also specified. For
Validity is set to 20 days in the future, the certificate will
expire 20 days from issuance time regardless of the
The end of the validity period configured on a certificate must not exceed the limit set on its parents in the CA hierarchy.
Information describing the start of the validity period of the certificate. This parameter sets the “Not Before" date for the certificate.
By default, when issuing a certificate, Amazon Web Services Private CA sets the "Not Before" date to the
issuance time minus 60 minutes. This compensates for clock inconsistencies across
computer systems. The
ValidityNotBefore parameter can be used to customize
the “Not Before” value.
Validity parameter, the
parameter is optional.