You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* <p>Retrieves an Amazon-issued certificate and its certificate chain. The chain consists of
32
-
* the certificate of the issuing CA and the intermediate certificates of any other subordinate
33
-
* CAs. All of the certificates are base64 encoded. You can use <a href="https://wiki.openssl.org/index.php/Command_Line_Utilities">OpenSSL</a> to decode
31
+
* <p>Retrieves a certificate and its certificate chain. The certificate may be either a public
32
+
* or private certificate issued using the ACM <code>RequestCertificate</code> action, or a
33
+
* certificate imported into ACM using the <code>ImportCertificate</code> action. The chain
34
+
* consists of the certificate of the issuing CA and the intermediate certificates of any other
35
+
* subordinate CAs. All of the certificates are base64 encoded. You can use <a href="https://wiki.openssl.org/index.php/Command_Line_Utilities">OpenSSL</a> to decode
34
36
* the certificates and inspect individual fields.</p>
35
37
* @example
36
38
* Use a bare-bones client and the command you need to make an API call.
* <p>Retrieves a list of certificate ARNs and domain names. You can request that only
32
-
* certificates that match a specific status be listed. You can also filter by specific
33
-
* attributes of the certificate. Default filtering returns only <code>RSA_2048</code>
34
-
* certificates. For more information, see <a>Filters</a>.</p>
31
+
* <p>Retrieves a list of certificate ARNs and domain names. By default, the API returns RSA_2048 certificates. To return all certificates in the account, include the <code>keyType</code> filter with the values <code>[RSA_1024, RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1]</code>.</p>
32
+
* <p>In addition to <code>keyType</code>, you can also filter by the <code>CertificateStatuses</code>, <code>keyUsage</code>, and <code>extendedKeyUsage</code> attributes on the certificate. For more information, see <a>Filters</a>.</p>
35
33
* @example
36
34
* Use a bare-bones client and the command you need to make an API call.
* list contains the domain names that are bound to the public key that is contained in the
1319
1321
* certificate. The subject alternative names include the canonical domain name (CN) of the
1320
1322
* certificate and additional domain names that can be used to connect to the website. </p>
1321
-
* <p>When called by <a href="https://docs.aws.amazon.com/acm/latestAPIReference/API_ListCertificates.html">ListCertificates</a>, this parameter will only return the first 100 subject alternative
1323
+
* <p>When called by <a>ListCertificates</a>, this parameter will only return the first 100 subject alternative
1322
1324
* names included in the certificate. To display the full list of subject alternative names, use
* <p>When called by <a href="https://docs.aws.amazon.com/acm/latestAPIReference/API_ListCertificates.html">ListCertificates</a>, indicates whether the full list of subject alternative names has
1331
+
* <p>When called by <a>ListCertificates</a>, indicates whether the full list of subject alternative names has
1330
1332
* been included in the response. If false, the response includes all of the subject alternative
1331
1333
* names included in the certificate. If true, the response only includes the first 100 subject
1332
1334
* alternative names included in the certificate. To display the full list of subject alternative
1333
-
* names, use <a href="https://docs.aws.amazon.com/acm/latestAPIReference/API_DescribeCertificate.html">DescribeCertificate</a>.</p>
* encrypt data. RSA is the default key algorithm for ACM certificates. Elliptic Curve Digital
1734
1736
* Signature Algorithm (ECDSA) keys are smaller, offering security comparable to RSA keys but
1735
1737
* with greater computing efficiency. However, ECDSA is not supported by all network clients.
1736
-
* Some AWS services may require RSA keys, or only support ECDSA keys of a particular size, while
1737
-
* others allow the use of either RSA and ECDSA keys to ensure that compatibility is not broken.
1738
-
* Check the requirements for the AWS service where you plan to deploy your certificate.</p>
1738
+
* Some Amazon Web Services services may require RSA keys, or only support ECDSA keys of a particular size,
1739
+
* while others allow the use of either RSA and ECDSA keys to ensure that compatibility is not
1740
+
* broken. Check the requirements for the Amazon Web Services service where you plan to deploy your
1741
+
* certificate. For more information about selecting an algorithm, see <a href="https://docs.aws.amazon.com/acm/latest/userguide/acm-certificate.html#algorithms">Key
1742
+
* algorithms</a>.</p>
1743
+
* <note>
1744
+
* <p>Algorithms supported for an ACM certificate request include: </p>
1745
+
* <ul>
1746
+
* <li>
1747
+
* <p>
1748
+
* <code>RSA_2048</code>
1749
+
* </p>
1750
+
* </li>
1751
+
* <li>
1752
+
* <p>
1753
+
* <code>EC_prime256v1</code>
1754
+
* </p>
1755
+
* </li>
1756
+
* <li>
1757
+
* <p>
1758
+
* <code>EC_secp384r1</code>
1759
+
* </p>
1760
+
* </li>
1761
+
* </ul>
1762
+
* <p>Other listed algorithms are for imported certificates only. </p>
1763
+
* </note>
1764
+
* <note>
1765
+
* <p>When you request a private PKI certificate signed by a CA from Amazon Web Services Private CA, the
1766
+
* specified signing algorithm family (RSA or ECDSA) must match the algorithm family of
0 commit comments