Manage certificates with Cloud Manager

Cloud Manager offers self-service tools to install and manage SSL certificates, ensuring site security for your users. Cloud Manager supports two models for managing your certificates.

ModelDescription
AAdobe-managed SSL certificate (DV)Cloud Manager lets users configure DV (Domain Validation) certificates that are provided by Adobe for quick domain setup.
BCustomer-managed SSL certificate (OV/EV)Cloud Manager offers a platform TLS (Transport Layer Security) service to let you manage OV and EV SSL certificates that you own and private keys from third-party Certificate Authorities, such as Let’s Encrypt.

Both models offer the following general features for managing your certificates:

  • Each Cloud Manager environment can use multiple certificates.
  • A private key may issue multiple SSL certificates.
  • The platform TLS service routes requests to the customer’s CDN service based on the SSL certificate used to terminate and the CDN service that hosts that domain.
IMPORTANT
To add and associate a custom domain with an environment, you must have a valid SSL certificate that covers the domain.

Adobe-managed (DV) SSL certificates

DV certificates are the most basic level of SSL certification and are often used for testing purposes or for securing websites with basic encryption. DV certificates are available in both production programs and sandbox programs.

After the DV certificate is created, Adobe renews it automatically every three months, unless it is deleted.

Customer-managed (OV/EV) SSL certificates

OV and EV certificates offer CA-validated information. Such information helps users assess whether the website owner, email sender, or digital signatory of code or PDF documents can be trusted. DV certificates do not allow such ownership verification.

OV and EV additionally offer these features over DV certificates in Cloud Manager.

  • Multiple environments can use an OV/EV certificate. That is, it can be added once, but used multiple times.
  • Each OV/EV certificate typically contains multiple domains.
  • Cloud Manager accepts wildcard OV/EV certificates for a domain.
TIP
If you have multiple custom domains, you may not want to upload a certificate each time you add a new domain. In that case, you could benefit from obtaining a single certificate that covers multiple domains.

Requirements for customer-managed OV/EV SSL certificates

If you choose to add your own customer-managed SSL certificate, it must meet the following updated requirements:

  • Domain Validation (DV) certificates and self-signed certificates are not supported.

  • The certificate must conform to OV (Organization Validation) or EV (Extended Validation) policies.

  • The certificate must be an X.509 TLS certificate issued by a trusted Certificate Authority (CA).

  • Supported cryptographic key types include the following:

    • RSA 2048-bit, standard support.
      RSA keys larger than 2048-bit (such as 3072-bit or 4096-bit RSA keys) are not supported at this time.
    • Elliptic Curve (EC) keys prime256v1 (secp256r1) and secp384r1
    • Elliptic Curve Digital Signature Algorithm (ECDSA) certificates. Such certificates are Adobe-recommended over RSA for improved performance, security, and efficiency.
  • Certificates must be formatted correctly to pass validation. Private keys must be in PKCS#8 format.

NOTE
If your organization requires compliance using 3072-bit RSA keys, the Adobe-recommended alternative is to use ECDSA certificates (secp256r1 or secp384r1).

Best practices for certificate management

  • Avoid overlapping certificates:

    • To ensure smooth certificate management, avoid deploying overlapping certificates that match the same domain. For example, having a wildcard certificate (*.example.com) alongside a specific certificate (dev.example.com) may lead to confusion.
    • The TLS layer prioritizes the most specific and recently deployed certificate.

    Example scenarios:

    • “Dev Certificate” covers dev.example.com and is deployed as a domain mapping for dev.example.com.

    • “Stage Certificate” covers stage.example.com and is deployed as a domain mapping for stage.example.com.

    • If “Stage Certificate” is deployed/updated after “Dev Certificate,” it also serves requests for dev.example.com.

      To avoid such conflicts, ensure that certificates are carefully scoped to their intended domains.

  • Wildcard certificates:

    While wildcard certificates (for example, *.example.com) are supported, they should only be used when necessary. In cases of overlap, the more specific certificate takes precedence. For example, the specific certificate serves dev.example.com instead of the wildcard (*.example.com).

  • Validation and troubleshooting:
    Before you attempt to install a certificate with Cloud Manager, Adobe recommends that you validate the integrity of your certificate locally using tools such as openssl. For example,

    openssl verify -untrusted intermediate.pem certificate.pem