Configure Root Certificate Authority for Amazon Bedrock AgentCore Browser
By default, Amazon Bedrock AgentCore Browser sessions trust only publicly recognized certificate authorities. If your agents need to access internal services, corporate websites, or resources behind a TLS-intercepting proxy that use certificates signed by a private CA, you must provide your custom root CA certificates when starting a session.
Amazon Bedrock AgentCore retrieves the PEM-encoded certificate content from AWS Secrets Manager using your caller credentials, validates the X.509 format and expiry, and installs the certificates into the session’s OS trust store. This enables the browser to establish trusted HTTPS connections to your internal resources.
How it works
Root Certificate Authority for Amazon Bedrock AgentCore Browser works as follows:
-
You provide a list of certificate locations, each pointing to a secret in AWS Secrets Manager that contains a PEM-encoded root CA certificate.
-
Amazon Bedrock AgentCore uses your caller credentials to retrieve each certificate from AWS Secrets Manager.
-
Each certificate is validated for correct X.509 PEM format and checked to ensure it has not expired and is not used before its validity start date.
-
Valid certificates are deployed to the session’s OS trust store, making them available to the browser and any network clients within the sandbox.
Certificates configured at the tool level (through CreateBrowser ) are combined with any certificates provided at session start time. This allows you to set organization-wide certificates on the tool and add session-specific certificates as needed.
Note
Certificate configuration is a one-time operation per session. Once certificates are installed, they cannot be modified for the duration of that session.
Prerequisites
Before configuring root CA certificates, ensure you have the following:
-
Completed the general Prerequisites.
-
Your root CA certificates stored as secrets in AWS Secrets Manager. Each secret must contain valid PEM-encoded X.509 certificate
-
IAM permissions to read the certificate secrets from AWS Secrets Manager. Add the following permissions to your IAM policy:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "SecretsManagerCertificateAccess", "Effect": "Allow", "Action": [ "secretsmanager:GetSecretValue" ], "Resource": "arn:aws:secretsmanager:<Region>:<account-id>:secret:<secret-name>" } ] }
Store your certificate in AWS Secrets Manager
Before you can use a root CA certificate with Amazon Bedrock AgentCore Browser, you must store it as a secret in AWS Secrets Manager. The secret value must be the PEM-encoded certificate content.
Example
Note the secret ARN from the output. You will use this ARN when starting sessions with certificate configuration.
Important
The secret must contain a valid PEM-encoded X.509 certificate. The certificate must not be expired and must be within its validity period. Amazon Bedrock AgentCore validates the certificate format and expiry before installing it.
Start a browser session with custom certificates
To start a browser session that trusts your custom root CA certificates, include the certificates parameter in your StartBrowserSession request.
Example
Using multiple certificates
You can provide multiple root CA certificates in a single browser session. This is useful when your environment requires trust for multiple internal certificate authorities, such as separate CAs for different internal services or environments.
Example
Configure certificates at the tool level
You can configure certificates at the tool level when creating a custom browser. Certificates configured at the tool level are automatically applied to every session started with that tool, in addition to any certificates provided at session start time.
This is useful for organization-wide certificates that should be trusted by all browser sessions.
Example
When you start a session with a browser that has certificates configured, the tool-level certificates are combined with any session-level certificates. Tool-level certificates are applied first, followed by session-level certificates.
Certificate requirements and limits
Certificates must meet the following requirements:
| Requirement | Details |
|---|---|
|
Format |
PEM-encoded X.509 certificate |
|
Storage |
AWS Secrets Manager secret (as a string value, not binary) |
|
Validity |
Certificate must not be expired and must be within its validity period (between |
|
Maximum certificates per session |
10 per session and 10 per tool. A session can have up to 20 certificates in total. |
|
Secret ARN format |
|
|
Location type |
Only AWS Secrets Manager is supported as a certificate location |