Repository


Certification authorities

Trust store and pinning recommendations

Amazon Trust Services doesn't recommend or support pinning.

If you require pinning then we recommend that you pin to the public key of the root. Applications that pin to subordinate CAs or end-entity certificates that chain to ATS roots are at a higher risk for outages. We do not recommend pinning to the attributes of a certificate associated with a root. All CAs can have multiple certificates associated with their keys. Because trust is based on keys and not certificate attributes, pinning to certificate attributes may result in unexpected behavior. If you have technical constraints that require pinning to certificate attributes we have provided that information below.

For relying parties that make use of custom trust stores we recommend that all five of the above roots be included in the trust store. "Amazon Root CA 1 - 4" represent different key types/algorithms. "Starfield Services Root Certificate Authority - G2" is an older root that is compatible with other older trust stores and clients that can not be updated. Including all five of the roots ensure maximum compatibility for your application.

Root certificates with the "EU" designation in the CN will be used for certificate issuance in the AWS European Sovereign Cloud region only. These roots are pending inclusion in public root store programs. End-entity certificates issued from the AWS European Sovereign Cloud region will be trusted in public root store programs that follow the cross-signed certificates issued from our existing "Amazon Root CA 1, 3, and 4" roots.

Root CAs

The following certificate authorities are operated according to the practices described in the above CPS.
Distinguished names are represented using the algorithm recommended in RFC 4514.

This is provided for informational purposes. We do not recommend pinning to attributes in the certificates.

Amazon Root CAs have multiple certificates for each root key pair.

For the "Amazon Root CAs [1-4]", one set of certificates is self-signed, the other set is cross-signed with the older "Starfield Services Root Certificate Authority - G2" root.

Additionally, we also have a cross-signed version of the certificate for "Starfield Services Root Certificate Authority - G2". It is cross-signed with an even older root managed by a different certificate authority.

One set of the EU root CAs is self-signed and the others are cross-signed by "Amazon Root CA [1,3,4]", respectively. Cross-signed versions of our EU roots will be distributed in the AWS European Sovereign Cloud region only. These cross-signs establish a trusted path to our existing roots that are already included in major root store programs.

The certificate files above are licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License .


Requests and problem reporting

Certificate management

For help with using your Amazon Trust Services certificate or using AWS Certificate Manager please see: https://docs.aws.amazon.com/acm/latest/userguide/gs.html .

Problem reporting

Subscribers, relying parties, application software suppliers, and other third parties may email ats-certificate-report[at]amazon.com to report suspected private key compromise, certificate misuse, or other types of fraud, compromise, misuse, and inappropriate conduct. Proof of key compromise should be submitted in either of the following formats: a CSR signed by the compromised private key with the common name "Proof of Key Compromise for Amazon"; or the private key itself.

Revocation requests

Subscribers may request revocation of their own certificates by emailing ats-certificate-report[at]amazon.com. All reports need to include sufficient detail to identify the specific certificates to be revoked. Requests must include a reason code as specified in the Subscriber Agreement.

General questions

Subscribers, relying parties, application software suppliers, and other third parties may email ats-general-questions[at]amazon.com with non-urgent questions about Amazon Trust Services. This email should not be used for revocation requests or other problem reporting related to certificates.

Requester authorization

Applicants may limit individuals who may request certificates on their behalf and may request a list of their currently authorized certificate requesters. Requests to limit or list requesters should be addressed to validation-questions[at]amazon.com.


Cross-signed and externally operated subordinate CAs certificates