Repository

Current documents


Certification authorities

Trust store and pinning recommendations

Amazon Trust Services doesn't recommend or support pinning.

If you require pinning then we recommend that you pin to the public key of the root. Applications that pin to subordinate CAs or end-entity certificates that chain to ATS roots are at a higher risk for outages. We do not recommend pinning to the attributes of a certificate associated with a root. All CAs can have multiple certificates associated with their keys. Because trust is based on keys and not certificate attributes, pinning to certificate attributes may result in unexpected behavior. If you have technical constraints that require pinning to certificate attributes we have provided that information below.

For relying parties that make use of custom trust stores we recommend that all five of the above roots be included in the trust store. "Amazon Root CA 1 - 4" represent different key types/algorithms. "Starfield Services Root Certificate Authority - G2" is an older root that is compatible with other older trust stores and clients that can not be updated. Including all five of the roots ensure maximum compatibility for your application.

Root certificates with the "EU" designation in the CN will be used for certificate issuance in the AWS European Sovereign Cloud region only. These roots are pending inclusion in public root store programs. End-entity certificates issued from the AWS European Sovereign Cloud region will be trusted in public root store programs that follow the cross-signed certificates issued from our existing "Amazon Root CA 1, 3, and 4" roots.

Root CAs

The following certificate authorities are operated according to the practices described in the above CPS.
Distinguished names are represented using the algorithm recommended in RFC 4514.

This is provided for informational purposes. We do not recommend pinning to attributes in the certificates.

Amazon Root CAs have multiple certificates for each root key pair.

For the "Amazon Root CAs [1-4]", one set of certificates is self-signed, the other set is cross-signed with the older "Starfield Services Root Certificate Authority - G2" root.

Additionally, we also have a cross-signed version of the certificate for "Starfield Services Root Certificate Authority - G2". It is cross-signed with an even older root managed by a different certificate authority.

One set of the EU root CAs is self-signed and the others are cross-signed by "Amazon Root CA [1,3,4]", respectively. Cross-signed versions of our EU roots will be distributed in the AWS European Sovereign Cloud region only. These cross-signs establish a trusted path to our existing roots that are already included in major root store programs.

The certificate files above are licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License .

CRL and OCSP endpoints

View the complete list of CRL and OCSP endpoints operated by Amazon Trust Services.


Requests and issue reporting

Are you an AWS Certificate Manager customer?

If you require help with your certificate, see: https://docs.aws.amazon.com/acm/latest/userguide/gs.html .

Need to report a certificate issue or ask a question?

Report private key compromise, request revocation, or any other certificate-related issue — or ask a general question about Amazon Trust Services certificates.

Cross-signed, subordinate and externally operated subordinate CAs certificates