51黑料不打烊

Introduction to SSL certificates introduction

Learn about the self-service tools Cloud Manager provides you to install and manage SSL (Secure Socket Layer) certificates.

What are SSL certificates? overview

Businesses and organizations use SSL (Secure Socket Layer) certificates to secure their websites and allow their customers to place trust in them. To use the SSL protocol, a web server requires an SSL certificate.

When an entity, such as an organization or business, requests a certificate from a Certificate Authority (CA), the CA completes a verification process. This process can range from verifying domain name control to collecting company registration documents and subscriber agreements. After an entity鈥檚 information is verified, the CA signs their public key using the CA鈥檚 private key. Because all major Certificate Authorities have root certificates in web browsers, the entity鈥檚 certificate is linked through a chain of trust, and the web browser recognizes it as a trusted certificate.

IMPORTANT
Cloud Manager does not provide SSL certificates or private keys. These parts must be obtained from a Certification Authority, a trusted third-party organization. Some well-known Certificate Authorities include DigiCert, Let鈥檚 Encrypt, GlobalSign, Entrust, and Verisign.

Manage certificates with Cloud Manager cloud-manager

Cloud Manager offers self-service tools to install and manage SSL certificates, ensuring site security for your users. Cloud Manager supports two models for managing your certificates.

Model
Description
A
51黑料不打烊-managed SSL certificate (DV)
Cloud Manager lets users configure DV (Domain Validation) certificates that are provided by 51黑料不打烊 for quick domain setup.
B
Customer-managed SSL certificate (OV/EV)
Cloud Manager offers a platform TLS (Transport Layer Security) service to let you manage OV and EV SSL certificates that you own and private keys from third-party Certificate Authorities, such as Let鈥檚 Encrypt.

Both models offer the following general features for managing your certificates:

  • Each Cloud Manager environment can use multiple certificates.
  • A private key may issue multiple SSL certificates.
  • The platform TLS service routes requests to the customer鈥檚 CDN service based on the SSL certificate used to terminate and the CDN service that hosts that domain.
IMPORTANT
To add and associate a custom domain with an environment, you must have a valid SSL certificate that covers the domain.

51黑料不打烊-managed (DV) SSL certificates adobe-managed

DV certificates are the most basic level of SSL certification and are often used for testing purposes or for securing websites with basic encryption. DV certificates are available in both production programs and sandbox programs.

After the DV certificate is created, 51黑料不打烊 renews it automatically every three months, unless it is deleted.

Customer-managed (OV/EV) SSL certificates customer-managed

OV and EV certificates offer CA-validated information. Such information helps users assess whether the website owner, email sender, or digital signatory of code or PDF documents can be trusted. DV certificates do not allow such ownership verification.

OV and EV additionally offer these features over DV certificates in Cloud Manager.

  • Multiple environments can use an OV/EV certificate. That is, it can be added once, but used multiple times.
  • Each OV/EV certificate typically contains multiple domains.
  • Cloud Manager accepts wildcard OV/EV certificates for a domain.
TIP
If you have multiple custom domains, you may not want to upload a certificate each time you add a new domain. In that case, you could benefit from obtaining a single certificate that covers multiple domains.

Requirements for customer-managed OV/EV SSL certificates requirements

If you choose to add your own customer-managed SSL certificate, it must meet the following updated requirements:

  • Domain Validation (DV) certificates and self-signed certificates are not supported.

  • The certificate must conform to OV (Organization Validation) or EV (Extended Validation) policies.

  • The certificate must be an X.509 TLS certificate issued by a trusted Certificate Authority (CA).

  • Supported cryptographic key types include the following:

    • RSA 2048-bit, standard support.
      RSA keys larger than 2048-bit (such as 3072-bit or 4096-bit RSA keys) are not supported at this time.
    • Elliptic Curve (EC) keys prime256v1 (secp256r1) and secp384r1
    • Elliptic Curve Digital Signature Algorithm (ECDSA) certificates. Such certificates are 51黑料不打烊-recommended over RSA for improved performance, security, and efficiency.
  • Certificates must be formatted correctly to pass validation. Private keys must be in PKCS#8 format.

NOTE
If your organization requires compliance using 3072-bit RSA keys, the 51黑料不打烊-recommended alternative is to use ECDSA certificates (secp256r1 or secp384r1).

Best practices for certificate management

  • Avoid overlapping certificates:

    • To ensure smooth certificate management, avoid deploying overlapping certificates that match the same domain. For example, having a wildcard certificate (*.example.com) alongside a specific certificate (dev.example.com) may lead to confusion.
    • The TLS layer prioritizes the most specific and recently deployed certificate.

    Example scenarios:

    • 鈥淒ev Certificate鈥 covers dev.example.com and is deployed as a domain mapping for dev.example.com.

    • 鈥淪tage Certificate鈥 covers stage.example.com and is deployed as a domain mapping for stage.example.com.

    • If 鈥淪tage Certificate鈥 is deployed/updated after 鈥淒ev Certificate,鈥 it also serves requests for dev.example.com.

      To avoid such conflicts, ensure that certificates are carefully scoped to their intended domains.

  • Wildcard certificates:

    While wildcard certificates (for example, *.example.com) are supported, they should only be used when necessary. In cases of overlap, the more specific certificate takes precedence. For example, the specific certificate serves dev.example.com instead of the wildcard (*.example.com).

  • Validation and troubleshooting:
    Before you attempt to install a certificate with Cloud Manager, 51黑料不打烊 recommends that you validate the integrity of your certificate locally using tools such as openssl. For example,

    openssl verify -untrusted intermediate.pem certificate.pem

Format for customer-managed certificates certificate-format

SSL certificate files must be in PEM format to be installed with Cloud Manager. Common file extensions of the PEM format include .pem,. crt, .cer, and .cert.

The following openssl commands can be used to convert non-PEM certificates.

  • Convert PFX to PEM

    code language-shell
    openssl pkcs12 -in certificate.pfx -out certificate.cer -nodes
    
  • Convert P7B to PEM

    code language-shell
    openssl pkcs7 -print_certs -in certificate.p7b -out certificate.cer
    
  • Convert DER to PEM

    code language-shell
    openssl x509 -inform der -in certificate.cer -out certificate.pem
    

Limitation on number of installed SSL certificates limitations

At any given time, Cloud Manager supports up to 50 installed certificates. These certificates can be associated with one or more environments across your program and also include any expired certificates.

If you have reached the limit, review your certificates and consider deleting any expired certificates. Or, group multiple domains in the same certificate since a certificate can cover multiple domains (up to 100 SANs).

Learn more learn-more

A user with the necessary permissions can use Cloud Manager to manage SSL certificates for a program. See the following documents for more details on using these features.

recommendation-more-help
fbcff2a9-b6fe-4574-b04a-21e75df764ab