Before you install an SSL certificate, verify that your files meet the following platform requirements:
Certificate chain requirements: Cloud Platform requires the full certificate chain to establish trust, particularly for applications behind a CDN.
Upload in two parts: The installation form has separate fields. Paste your Server (Leaf) Certificate in the SSL Certificate field. Paste your Intermediate Chain (and, if provided by your CA, the Root) in the CA intermediate certificates field.
Chain Order: The CA intermediate certificates field must contain the chain in descending order: Leaf → Intermediate(s) → Root (or nearest-to-root).
CDN "Bridge" Certificates: Platform CDN serves the certificate you upload on Cloud Platform. Make sure your intermediate chain is present and in the proper order.
Format: The private key must be PEM-formatted and unencrypted and not password-protected.
Key Size (Platform CDN): If you useCloud Platform CDN, your certificate must be created with a 2048-bit RSA private key. 4096-bit keys are not supported in Platform CDN.
Validation: The private key must mathematically match the certificate. You can verify this through the OpenSSL commands to compare their public key hashes:
Size Mismatch (Platform CDN): You might use a 4096-bit key on a CDN-enabled environment. Regenerate a 2048-bit key.
Encryption: The key is password-protected. Decrypt it through the command:
openssl rsa -in enc.key -out unenc.key
Mismatch: The key does not match the certificate.
Certificate chain incomplete
Missing Intermediates: You must upload the intermediate certificates in the CA intermediate certificates field.
Incorrect Order: Ensure the chain ends with the Root certificate or the intermediate closest to Root.
New certificate not appearing
CDN Caching/Selection: When using Platform CDN, an older valid certificate may still be served. Deactivate the older certificate in the user interface to force the update.
A certificate only secures the domains listed in its Common Name (CN) or Subject Alternative Name (SAN). When you map a new domain to an environment, you must upload and activate a certificate that covers that domain.
Map the new domain in the Cloud Platform user interface.
Install a certificate that covers the new domain through SAN or Wildcard.
Activate the certificate on the SSL page.
Note
Multiple active certificates are supported on most environments apart from Cloud Platform Professional and Node.js. Acquia serves the newest activated certificate that covers the domain. If an exact-match and a wildcard cover the domain, the exact match takes precedence.
After obtaining an SSL certificate for an environment, as described in Obtaining an SSL certificate, you can use the SSL page in the Cloud Platform user interface to install the certificate on an environment. Depending on whether you use a CSR generated through the Cloud Platform user interface or obtain the certificate through some other way, you can use the following methods to install an SSL certificate:
You may want to confirm the validity of your SSL certificate before you upload or try to activate the certificate on Cloud Platform. For more information, see Verifying the validity of an SSL certificate.
Installing an SSL certificate based on an Acquia-generated CSR¶
To install an SSL certificate based on an Acquia-generated CSR, you can follow one of these methods based on the type of your SSL certificate:
Installing a new certificate as the legacy certificate overwrites the certificate currently active on ELB as there can only be one legacy/ELB certificate in place at a time. For a summary of differences between standard and legacy SSL certificates, see Standard certificates.
The legacy method is unavailable in Site Factory and non-production environments.
(Optional) In Label, enter a label to help you identify the certificate. If you selected Install legacy SSL certificate, the system does not display the Label field since you can only have a single legacy SSL certificate on an environment.
In SSL Certificate, enter the SSL certificate in the PEM format. The certificate must look something like the following example, but much longer:
In SSL private key, paste the private key that you previously copied in the text editor.
In CA intermediate certificates, enter the chain/intermediate certificates files in the PEM format and in the proper order. For more information, see Ensuring that certificates are in proper order.
Click Install.
After the installation is complete, the system displays the CSR details in the SSL certificates section.
Select your organization, application, and environment.
In the left menu, click SSL.
On the SSL tab, click Install next to the CSR that you generated.
The private key pre-populates in its respective field and you can fill the remaining fields on the installation form. If you are unsure about how to find the private key associated with a CSR that was generated in the Cloud Platform user interface, see Generate private key in CSR.
On the Install SSL certificate page, enter the following information about the certificate:
Installing a new certificate as the legacy certificate overwrites the certificate currently active on ELB as there can only be one legacy/ELB certificate in place at a time. For a summary of differences between standard and legacy SSL certificates, see Standard certificates.
The legacy method is unavailable in Site Factory and non-production environments.
(Optional) In Label, enter a label to help you identify the certificate. If you selected Install legacy SSL certificate, the system does not display the Label field since you can only have a single legacy SSL certificate on an environment.
In SSL Certificate, enter the main/server SSL certificate file in the PEM format. PEM formatted files are text files written in Base64 ASCII encoding with plain-text headers and footers. The certificate must look something like the following example, but much longer:
Private key files must be unencrypted and non-password protected, or the certificate cannot be deployed. The system updates the SSL private key field with the private key for the certificate in the PEM format. Do not change this key.
In CA intermediate certificates, enter the required intermediate certificates in the PEM format and in the proper order. For more information, see Ensuring that certificates are in proper order.
Click Install.
After the installation is complete, the system displays the CSR details in the SSL certificates section.
Installing an SSL certificate not based on an Acquia-generated CSR¶
To install an SSL certificate not based on an Acquia-generated CSR:
Installing a new certificate as the legacy certificate overwrites the certificate currently active on ELB as there can only be one legacy/ELB certificate in place at a time. For a summary of differences between standard and legacy SSL certificates, see Standard certificates.
The legacy method is unavailable in Site Factory and non-production environments.
(Optional) In Label, enter a label to help you identify the certificate. If you selected Install legacy SSL certificate, the system does not display the Label field since you can only have a single legacy SSL certificate on an environment.
In SSL Certificate, enter the SSL certificate in the PEM format. The certificate must look something like the following example, but much longer:
In SSL private key, enter the private key for this certificate in the PEM format.
In CA intermediate certificates, enter the chain/intermediate certificates files in the PEM format and in the proper order. For more information, see Ensuring that certificates are in proper order.
Click Install.
After the installation is complete, the system displays the CSR details in the SSL certificates section.
After you have installed an SSL certificate on an environment, you can view it on the SSL page. The SSL certificates section lists all the installed certificates and their active status. Click View to see details about an SSL certificate, including:
The certificate’s label (the name you identified the certificate with when you installed it)
Click Show to view the PEM encoded certificate, CA chain (CA intermediate certificates), or private key. Legacy/ELB certificates will not have the private key visible on this View page in the UI.
Cloud Platform and Site Factory offer SSL management with separate guidelines for default and custom domains. Default SSL certificates issued by Acquia only cover default domains and not custom domains. Ensure that you point to the correct domain to utilize SSL certificates properly.
Important
Cloud Platform supports the use of multiple active certificates on each environment. Acquia doesn’t recommend having more than 10 active certificates per environment at a time. This feature isn’t available on Cloud Platform Professional environments or Node.js applications. Also, this feature isn’t compatible with certificate pinning features provided by some CDN providers.
After installing an SSL certificate on an environment, you must activate the certificate before it starts working with HTTPS requests to the environment.
To activate an SSL certificate, on the SSL page (under SSL certificates) locate the certificate you want to activate, and then click Activate to confirm. The activation will take a few minutes to complete.
Note
You must activate Standard (SNI) certificates before use.
Legacy certificates installed on the Elastic Load Balancer (ELB) will instantly override the previous certificate on the ELB.
You can have a single ELB/legacy certificate and one or more standard certificates active at the same time.
Site Factory customers who are using this interface for the first time to replace certificates previously installed by Acquia must ensure that any newly installed self-service certificate covers all of the domains previously covered by the Acquia-installed certificate.
When multiple certificates are set to active, HTTPS requests for any given domain on your environment will be served using the newest activated certificate which includes that domain. If multiple certificates are active and cover the same domain, one with an exact match and one with a wildcard match, your environment will serve the certificate with the exact match, even if the wildcard certificate was installed more recently. If no matching certificates are found, your environment will default to using any default or custom certificate installed on that environment by Acquia.
You can deactivate an active SSL certificate at any time. If you are planning to remove an SSL certificate, Acquia recommends to first deactivate the certificate and then remove it.
To deactivate an SSL certificate, on the SSL page (under SSL certificates), locate the active certificate you want to deactivate, and then click Deactivate.
To avoid potential impact to your site(s), it is a best practice to keep your current certificate in place before removing it if you are replacing it with a new certificate.
You can delete a non-legacy SSL certificate in the Cloud Platform user interface at any time. Before doing so, you must deactivate the certificate itself.
Important
Removing certificates from Cloud Platform is a permanent action that can’t be undone. Acquia recommends you save any necessary SSL files locally before deleting them in the Cloud Platform user interface.
To remove a legacy/ELB SSL certificate, you must create a Support ticket. Removing a legacy SSL certificate includes permanently removing your ELB as well. This means that if you would like to install another legacy SSL certificate in the future, you would need to point your domains to a new ELB CNAME address.
Note
Before Acquia can remove a legacy SSL certificate, all your domains must be pointed away from the ELB CNAME.
Select the environment from which you want to remove a certificate, and click SSL in the left menu.
In the SSL certificates section, locate the certificate you want to remove, and then click its Remove link. Cloud Platform displays a Remove certificate dialog box
Click Remove in the dialog box to permanently remove the certificate from Cloud Platform.
If you need to delete or deactivate a valid SSL certificate, you must revoke that certificate to prevent an attacker’s website masquerading as your own. Acquia recommends that you deactivate or delete any revoked or expired certificates from all environments. Leaving a revoked certificate active in any environment may result in downtime for your application.
Each SSL certificate vendor has different procedures to perform a certificate revocation. Ensure you follow the instructions your SSL certificate vendor provides. Here are the procedures for two common vendors:
If you need to replace an SSL certificate that is expiring, you do not need to delete or remove your existing certificate(s). There are two options you can take to replace your SSL certificate: The first is to install an updated certificate that includes new information, such as additional domains/ organizational changes, etc. This option includes the same steps as if you were installing a brand new certificate. If this applies to you, follow the instructions on installing a certificate here.
The other option is to install a renewed version of your existing certificate that just has a new expiration date. If there is no change to the details of the certificate itself besides the expiry date, you may not need to generate a new CSR. To install the updated version of the same certificate, follow these steps:
To upload a new SSL certificate to a Cloud Platform subscription that already has an active SSL certificate:
If the CSR that was used to originally obtain your certificate is available and you generated your CSR using the Cloud Platform user interface:
On the SSL page, in the Certificate signing requests section, click Install to navigate to the installation form and have the private key prepopulated in its respective field.
If you have questions on this step, see Generate private key in CSR for the CSR you used to obtain the SSL certificate you want to install.
If you don’t see the CSR that was used to originally obtain your certificate:
In the Certificate signing requests section, click View next to the preexisting certificate in the SSL certificates section to find the corresponding private key, as shown in the following screens:
Copy the private key to a local text editor before navigating to the installation form by clicking the Install SSL certificate button on your SSL page. Cloud Platform stores both the certificate signing request file (ssl.csr) and the private key (ssl.key) in the Cloud API.