Manage certificates with Cloud Manager
Cloud Manager offers self-service tools to install and manage SSL certificates, ensuring site security for your users. Cloud Manager supports two models for managing your certificates.
Model | Description | |
---|---|---|
A | Adobe-managed SSL certificate (DV) | Cloud Manager lets users configure DV (Domain Validation) certificates that are provided by Adobe for quick domain setup. |
B | Customer-managed SSL certificate (OV/EV) | Cloud Manager offers a platform TLS (Transport Layer Security) service to let you manage OV and EV SSL certificates that you own and private keys from third-party Certificate Authorities, such as Let’s Encrypt. |
Both models offer the following general features for managing your certificates:
- Each Cloud Manager environment can use multiple certificates.
- A private key may issue multiple SSL certificates.
- The platform TLS service routes requests to the customer’s CDN service based on the SSL certificate used to terminate and the CDN service that hosts that domain.
Adobe-managed (DV) SSL certificates
DV certificates are the most basic level of SSL certification and are often used for testing purposes or for securing websites with basic encryption. DV certificates are available in both production programs and sandbox programs.
After the DV certificate is created, Adobe renews it automatically every three months, unless it is deleted.
Customer-managed (OV/EV) SSL certificates
OV and EV certificates offer CA-validated information. Such information helps users assess whether the website owner, email sender, or digital signatory of code or PDF documents can be trusted. DV certificates do not allow such ownership verification.
OV and EV additionally offer these features over DV certificates in Cloud Manager.
- Multiple environments can use an OV/EV certificate. That is, it can be added once, but used multiple times.
- Each OV/EV certificate typically contains multiple domains.
- Cloud Manager accepts wildcard OV/EV certificates for a domain.
Requirements for customer-managed OV/EV SSL certificates
If you choose to add your own customer-managed SSL certificate, it must meet the following updated requirements:
-
Domain Validation (DV) certificates and self-signed certificates are not supported.
-
The certificate must conform to OV (Organization Validation) or EV (Extended Validation) policies.
-
The certificate must be an X.509 TLS certificate issued by a trusted Certificate Authority (CA).
-
Supported cryptographic key types include the following:
- RSA 2048-bit, standard support.
RSA keys larger than 2048-bit (such as 3072-bit or 4096-bit RSA keys) are not supported at this time. - Elliptic Curve (EC) keys
prime256v1
(secp256r1
) andsecp384r1
- Elliptic Curve Digital Signature Algorithm (ECDSA) certificates. Such certificates are Adobe-recommended over RSA for improved performance, security, and efficiency.
- RSA 2048-bit, standard support.
-
Certificates must be formatted correctly to pass validation. Private keys must be in
PKCS#8
format.
secp256r1
or secp384r1
).Best practices for certificate management
-
Avoid overlapping certificates:
- To ensure smooth certificate management, avoid deploying overlapping certificates that match the same domain. For example, having a wildcard certificate (*.example.com) alongside a specific certificate (dev.example.com) may lead to confusion.
- The TLS layer prioritizes the most specific and recently deployed certificate.
Example scenarios:
-
“Dev Certificate” covers
dev.example.com
and is deployed as a domain mapping fordev.example.com
. -
“Stage Certificate” covers
stage.example.com
and is deployed as a domain mapping forstage.example.com
. -
If “Stage Certificate” is deployed/updated after “Dev Certificate,” it also serves requests for
dev.example.com
.To avoid such conflicts, ensure that certificates are carefully scoped to their intended domains.
-
Wildcard certificates:
While wildcard certificates (for example,
*.example.com
) are supported, they should only be used when necessary. In cases of overlap, the more specific certificate takes precedence. For example, the specific certificate servesdev.example.com
instead of the wildcard (*.example.com
). -
Validation and troubleshooting:
Before you attempt to install a certificate with Cloud Manager, Adobe recommends that you validate the integrity of your certificate locally using tools such asopenssl
. For example,openssl verify -untrusted intermediate.pem certificate.pem