You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* <p>Creates an audit report that lists every time that your CA private key is used. The
41
-
* report is saved in the Amazon S3 bucket that you specify on input. The <a href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_IssueCertificate.html">IssueCertificate</a> and <a href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a> actions use
42
-
* the private key. </p>
43
-
* <note>
44
-
* <p>Both Amazon Web Services Private CA and the IAM principal must have permission to write to
45
-
* the S3 bucket that you specify. If the IAM principal making the call
46
-
* does not have permission to write to the bucket, then an exception is
47
-
* thrown. For more information, see <a href="https://docs.aws.amazon.com/privateca/latest/userguide/crl-planning.html#s3-policies">Access
48
-
* policies for CRLs in Amazon S3</a>.</p>
49
-
* </note>
40
+
* <p>Creates an audit report that lists every time that your CA private key is used to issue a certificate. The <a href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_IssueCertificate.html">IssueCertificate</a> and <a href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a> actions use
41
+
* the private key.</p>
42
+
* <p>To save the audit report to your designated Amazon S3 bucket, you must create a bucket policy that grants Amazon Web Services Private CA permission to access and write to it. For an example policy, see <a href="https://docs.aws.amazon.com/privateca/latest/userguide/PcaAuditReport.html#s3-access">Prepare an Amazon S3 bucket for audit reports</a>.</p>
50
43
* <p>Amazon Web Services Private CA assets that are stored in Amazon S3 can be protected with encryption.
51
44
* For more information, see <a href="https://docs.aws.amazon.com/privateca/latest/userguide/PcaAuditReport.html#audit-report-encryption">Encrypting Your Audit
* <p>Basic constraints (<i>must</i> be marked critical)</p>
105
+
* <p>Authority key identifier</p>
106
106
* </li>
107
107
* <li>
108
-
* <p>Subject alternative names</p>
108
+
* <p>Basic constraints (<i>must</i> be marked critical)</p>
109
109
* </li>
110
110
* <li>
111
-
* <p>Key usage</p>
111
+
* <p>Certificate policies</p>
112
112
* </li>
113
113
* <li>
114
114
* <p>Extended key usage</p>
115
115
* </li>
116
116
* <li>
117
-
* <p>Authority key identifier</p>
117
+
* <p>Inhibit anyPolicy</p>
118
118
* </li>
119
119
* <li>
120
-
* <p>Subject key identifier</p>
120
+
* <p>Issuer alternative name</p>
121
121
* </li>
122
122
* <li>
123
-
* <p>Issuer alternative name</p>
123
+
* <p>Key usage</p>
124
124
* </li>
125
125
* <li>
126
-
* <p>Subject directory attributes</p>
126
+
* <p>Name constraints</p>
127
127
* </li>
128
128
* <li>
129
-
* <p>Subject information access</p>
129
+
* <p>Policy mappings</p>
130
130
* </li>
131
131
* <li>
132
-
* <p>Certificate policies</p>
132
+
* <p>Subject alternative name</p>
133
133
* </li>
134
134
* <li>
135
-
* <p>Policy mappings</p>
135
+
* <p>Subject directory attributes</p>
136
136
* </li>
137
137
* <li>
138
-
* <p>Inhibit anyPolicy</p>
138
+
* <p>Subject key identifier</p>
139
+
* </li>
140
+
* <li>
141
+
* <p>Subject information access</p>
139
142
* </li>
140
143
* </ul>
141
144
* <p>Amazon Web Services Private CA rejects the following extensions when they are marked critical in an
142
145
* imported CA certificate or chain.</p>
143
146
* <ul>
144
147
* <li>
145
-
* <p>Name constraints</p>
146
-
* </li>
147
-
* <li>
148
-
* <p>Policy constraints</p>
148
+
* <p>Authority information access</p>
149
149
* </li>
150
150
* <li>
151
151
* <p>CRL distribution points</p>
152
152
* </li>
153
153
* <li>
154
-
* <p>Authority information access</p>
155
-
* </li>
156
-
* <li>
157
154
* <p>Freshest CRL</p>
158
155
* </li>
159
156
* <li>
160
-
* <p>Any other extension</p>
157
+
* <p>Policy constraints</p>
161
158
* </li>
162
159
* </ul>
160
+
* <p>Amazon Web Services Private Certificate Authority will also reject any other extension marked as critical not contained on the preceding list of allowed extensions.</p>
163
161
* @example
164
162
* Use a bare-bones client and the command you need to make an API call.
* <p>Contains information to enable Online Certificate Status Protocol (OCSP) support, to
822
-
* enable a certificate revocation list (CRL), to enable both, or to enable neither. The
823
-
* default is for both certificate validation mechanisms to be disabled. </p>
824
-
* <note>
825
-
* <p>The following requirements apply to revocation configurations.</p>
826
-
* <ul>
827
-
* <li>
828
-
* <p>A configuration disabling CRLs or OCSP must contain only the <code>Enabled=False</code>
821
+
* <p>Contains information to enable support for Online Certificate Status Protocol (OCSP), certificate revocation list (CRL), both protocols, or neither. By default, both certificate validation mechanisms are disabled.</p>
822
+
* <p>The following requirements apply to revocation configurations.</p>
823
+
* <ul>
824
+
* <li>
825
+
* <p>A configuration disabling CRLs or OCSP must contain only the <code>Enabled=False</code>
829
826
* parameter, and will fail if other parameters such as <code>CustomCname</code> or
830
827
* <code>ExpirationInDays</code> are included.</p>
831
-
* </li>
832
-
* <li>
833
-
* <p>In a CRL configuration, the <code>S3BucketName</code> parameter must conform to
828
+
* </li>
829
+
* <li>
830
+
* <p>In a CRL configuration, the <code>S3BucketName</code> parameter must conform to
* <p>A configuration containing a custom Canonical
833
+
* </li>
834
+
* <li>
835
+
* <p>A configuration containing a custom Canonical
839
836
* Name (CNAME) parameter for CRLs or OCSP must conform to <a href="https://www.ietf.org/rfc/rfc2396.txt">RFC2396</a> restrictions
840
837
* on the use of special characters in a CNAME. </p>
841
-
* </li>
842
-
* <li>
843
-
* <p>In a CRL or OCSP configuration, the value of a CNAME parameter must not include a
838
+
* </li>
839
+
* <li>
840
+
* <p>In a CRL or OCSP configuration, the value of a CNAME parameter must not include a
844
841
* protocol prefix such as "http://" or "https://".</p>
845
-
* </li>
846
-
* </ul>
847
-
* </note>
842
+
* </li>
843
+
* </ul>
848
844
* <p> For more information, see the <a href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_OcspConfiguration.html">OcspConfiguration</a> and <a href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_CrlConfiguration.html">CrlConfiguration</a>
* <p>Contains information to enable Online Certificate Status Protocol (OCSP) support, to
2720
-
* enable a certificate revocation list (CRL), to enable both, or to enable neither. If
2721
-
* this parameter is not supplied, existing capibilites remain unchanged. For more
2715
+
* <p>Contains information to enable support for Online Certificate Status Protocol (OCSP), certificate revocation list (CRL), both protocols, or neither. If you don't supply this parameter, existing capibilites remain unchanged. For more
2722
2716
* information, see the <a href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_OcspConfiguration.html">OcspConfiguration</a> and <a href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_CrlConfiguration.html">CrlConfiguration</a> types.</p>
2723
-
* <note>
2724
-
* <p>The following requirements apply to revocation configurations.</p>
2725
-
* <ul>
2726
-
* <li>
2727
-
* <p>A configuration disabling CRLs or OCSP must contain only the <code>Enabled=False</code>
2717
+
* <p>The following requirements apply to revocation configurations.</p>
2718
+
* <ul>
2719
+
* <li>
2720
+
* <p>A configuration disabling CRLs or OCSP must contain only the <code>Enabled=False</code>
2728
2721
* parameter, and will fail if other parameters such as <code>CustomCname</code> or
2729
2722
* <code>ExpirationInDays</code> are included.</p>
2730
-
* </li>
2731
-
* <li>
2732
-
* <p>In a CRL configuration, the <code>S3BucketName</code> parameter must conform to
2723
+
* </li>
2724
+
* <li>
2725
+
* <p>In a CRL configuration, the <code>S3BucketName</code> parameter must conform to
* <p>A configuration containing a custom Canonical
2728
+
* </li>
2729
+
* <li>
2730
+
* <p>A configuration containing a custom Canonical
2738
2731
* Name (CNAME) parameter for CRLs or OCSP must conform to <a href="https://www.ietf.org/rfc/rfc2396.txt">RFC2396</a> restrictions
2739
2732
* on the use of special characters in a CNAME. </p>
2740
-
* </li>
2741
-
* <li>
2742
-
* <p>In a CRL or OCSP configuration, the value of a CNAME parameter must not include a
2733
+
* </li>
2734
+
* <li>
2735
+
* <p>In a CRL or OCSP configuration, the value of a CNAME parameter must not include a
2743
2736
* protocol prefix such as "http://" or "https://".</p>
2744
-
* </li>
2745
-
* </ul>
2746
-
* </note>
2737
+
* </li>
2738
+
* </ul>
2739
+
* <important>
2740
+
* <p> If you update the <code>S3BucketName</code> of <a href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_CrlConfiguration.html">CrlConfiguration</a>, you can break revocation for existing certificates. In other words, if you call <a href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_UpdateCertificateAuthority.html">UpdateCertificateAuthority</a> to update the CRL configuration's S3 bucket name, Amazon Web Services Private CA only writes CRLs to the new S3 bucket. Certificates issued prior to this point will have the old S3 bucket name in your CRL Distribution Point (CDP) extension, essentially breaking revocation. If you must update the S3 bucket, you'll need to reissue old certificates to keep the revocation working. Alternatively, you can use a <a href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_CrlConfiguration.html#privateca-Type-CrlConfiguration-CustomCname">CustomCname</a> in your CRL configuration if you might need to change the S3 bucket name in the future.</p>
0 commit comments