docs/documentation/platform/pki/ca/aws-pca.mdx
Issue and manage certificates using AWS Private Certificate Authority (PCA) for cloud-native private certificate management.
Before setting up AWS PCA integration, ensure you have:
Your AWS connection's IAM role or user needs the following permissions on your Private CA resource(s):
acm-pca:DescribeCertificateAuthorityacm-pca:GetCertificateAuthorityCertificateacm-pca:IssueCertificateacm-pca:GetCertificateacm-pca:RevokeCertificateTo scope permissions to a single CA, set the Resource to that CA's ARN:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"acm-pca:DescribeCertificateAuthority",
"acm-pca:GetCertificateAuthorityCertificate",
"acm-pca:IssueCertificate",
"acm-pca:GetCertificate",
"acm-pca:RevokeCertificate"
],
"Resource": "arn:aws:acm-pca:us-east-1:123456789012:certificate-authority/your-ca-id"
}
]
}
To allow access to multiple CAs, list each ARN in the Resource array:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"acm-pca:DescribeCertificateAuthority",
"acm-pca:GetCertificateAuthorityCertificate",
"acm-pca:IssueCertificate",
"acm-pca:GetCertificate",
"acm-pca:RevokeCertificate"
],
"Resource": [
"arn:aws:acm-pca:us-east-1:123456789012:certificate-authority/ca-id-1",
"arn:aws:acm-pca:us-west-2:123456789012:certificate-authority/ca-id-2"
]
}
]
}
See the AWS Connection page for full setup instructions.

CA Not in ACTIVE Status
IAM Permission Errors
acm-pca:* permissions scoped to the correct CA ARN. See the IAM Permissions section above.Invalid CA ARN
arn:aws:acm-pca:<region>:<account-id>:certificate-authority/<ca-id>.