issueCertificate method
Uses your private certificate authority (CA), or one that has been shared with you, to issue a client certificate. This action returns the Amazon Resource Name (ARN) of the certificate. You can retrieve the certificate by calling the GetCertificate action and specifying the ARN.
May throw LimitExceededException. May throw ResourceNotFoundException. May throw InvalidStateException. May throw InvalidArnException. May throw InvalidArgsException. May throw MalformedCSRException.
Parameter certificateAuthorityArn
:
The Amazon Resource Name (ARN) that was returned when you called CreateCertificateAuthority.
This must be of the form:
arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012
Parameter csr
:
The certificate signing request (CSR) for the certificate you want to
issue. You can use the following OpenSSL command to create the CSR and a
2048 bit RSA private key.
openssl req -new -newkey rsa:2048 -days 365 -keyout
private/test_cert_priv_key.pem -out csr/test_cert_.csr
If you have a configuration file, you can use the following OpenSSL
command. The usr_cert
block in the configuration file
contains your X509 version 3 extensions.
openssl req -new -config openssl_rsa.cnf -extensions usr_cert
-newkey rsa:2048 -days -365 -keyout private/test_cert_priv_key.pem -out
csr/test_cert_.csr
Note: A CSR must provide either a subject name or a subject alternative name or the request will be rejected.
Parameter signingAlgorithm
:
The name of the algorithm that will be used to sign the certificate to be
issued.
This parameter should not be confused with the
SigningAlgorithm
parameter used to sign a CSR.
Parameter validity
:
Information describing the validity period of the certificate.
When issuing a certificate, ACM Private CA sets the "Not Before" date in the validity field to date and time minus 60 minutes. This is intended to compensate for time inconsistencies across systems of 60 minutes or less.
The validity period configured on a certificate must not exceed the limit set by its parents in the CA hierarchy.
Parameter idempotencyToken
:
Custom string that can be used to distinguish between calls to the
IssueCertificate action. Idempotency tokens time out after one
hour. Therefore, if you call IssueCertificate multiple times with
the same idempotency token within 5 minutes, ACM Private CA recognizes
that you are requesting only one certificate and will issue only one. If
you change the idempotency token for each call, PCA recognizes that you
are requesting multiple certificates.
Parameter templateArn
:
Specifies a custom configuration template to use when issuing a
certificate. If this parameter is not provided, ACM Private CA defaults to
the EndEntityCertificate/V1
template. For CA certificates,
you should choose the shortest path length that meets your needs. The path
length is indicated by the PathLenN portion of the ARN, where
N is the CA
depth.
Note: The CA depth configured on a subordinate CA certificate must not exceed the limit set by its parents in the CA hierarchy.
The following service-owned TemplateArn
values are supported
by ACM Private CA:
- arn:aws:acm-pca:::template/CodeSigningCertificate/V1
- arn:aws:acm-pca:::template/CodeSigningCertificate_CSRPassthrough/V1
- arn:aws:acm-pca:::template/EndEntityCertificate/V1
- arn:aws:acm-pca:::template/EndEntityCertificate_CSRPassthrough/V1
- arn:aws:acm-pca:::template/EndEntityClientAuthCertificate/V1
- arn:aws:acm-pca:::template/EndEntityClientAuthCertificate_CSRPassthrough/V1
- arn:aws:acm-pca:::template/EndEntityServerAuthCertificate/V1
- arn:aws:acm-pca:::template/EndEntityServerAuthCertificate_CSRPassthrough/V1
- arn:aws:acm-pca:::template/OCSPSigningCertificate/V1
- arn:aws:acm-pca:::template/OCSPSigningCertificate_CSRPassthrough/V1
- arn:aws:acm-pca:::template/RootCACertificate/V1
- arn:aws:acm-pca:::template/SubordinateCACertificate_PathLen0/V1
- arn:aws:acm-pca:::template/SubordinateCACertificate_PathLen1/V1
- arn:aws:acm-pca:::template/SubordinateCACertificate_PathLen2/V1
- arn:aws:acm-pca:::template/SubordinateCACertificate_PathLen3/V1
Implementation
Future<IssueCertificateResponse> issueCertificate({
required String certificateAuthorityArn,
required Uint8List csr,
required SigningAlgorithm signingAlgorithm,
required Validity validity,
String? idempotencyToken,
String? templateArn,
}) async {
ArgumentError.checkNotNull(
certificateAuthorityArn, 'certificateAuthorityArn');
_s.validateStringLength(
'certificateAuthorityArn',
certificateAuthorityArn,
5,
200,
isRequired: true,
);
ArgumentError.checkNotNull(csr, 'csr');
ArgumentError.checkNotNull(signingAlgorithm, 'signingAlgorithm');
ArgumentError.checkNotNull(validity, 'validity');
_s.validateStringLength(
'idempotencyToken',
idempotencyToken,
1,
36,
);
_s.validateStringLength(
'templateArn',
templateArn,
5,
200,
);
final headers = <String, String>{
'Content-Type': 'application/x-amz-json-1.1',
'X-Amz-Target': 'ACMPrivateCA.IssueCertificate'
};
final jsonResponse = await _protocol.send(
method: 'POST',
requestUri: '/',
exceptionFnMap: _exceptionFns,
// TODO queryParams
headers: headers,
payload: {
'CertificateAuthorityArn': certificateAuthorityArn,
'Csr': base64Encode(csr),
'SigningAlgorithm': signingAlgorithm.toValue(),
'Validity': validity,
if (idempotencyToken != null) 'IdempotencyToken': idempotencyToken,
if (templateArn != null) 'TemplateArn': templateArn,
},
);
return IssueCertificateResponse.fromJson(jsonResponse.body);
}