Before you install an SSL certificate, verify that your files meet the following platform requirements:
Chain Order: The CA intermediate certificates field must contain the chain in descending order: Leaf → Intermediate(s) → Root (or nearest-to-root).
CDN "Bridge" Certificates: Platform CDN serves the certificate you upload on Cloud Platform. Make sure your intermediate chain is present and in the proper order.
Format: The private key must be PEM-formatted and unencrypted and not password-protected.
Key Size (Platform CDN): If you use Cloud Platform CDN, your certificate must be created with a 2048-bit RSA private key. 4096-bit keys are not supported in Platform CDN.
Validation: The private key must mathematically match the certificate. You can verify this through the OpenSSL commands to compare their public key hashes:
openssl pkey -pubout -in private.key | openssl sha256
openssl x509 -pubkey -in certificate.crt -noout | openssl sha256If the output hashes match, the pair is valid.
Error Message | Common cause and resolution |
|---|---|
|
|
|
|
| CDN Caching/Selection: When using Platform CDN, an older valid certificate may still be served. Deactivate the older certificate in the user interface to force the update. |
A certificate only secures the domains listed in its Common Name (CN) or Subject Alternative Name (SAN). When you map a new domain to an environment, you must upload and activate a certificate that covers that domain.
Map the new domain in the Cloud Platform user interface.
Install a certificate that covers the new domain through SAN or Wildcard.
Activate the certificate on the SSL page.
After obtaining an SSL certificate for an environment, as described in Obtaining an SSL certificate, you can use the SSL page in the Cloud Platform user interface to install the certificate on an environment. Depending on whether you use a CSR generated through the Cloud Platform user interface or obtain the certificate through some other way, you can use the following methods to install an SSL certificate:
To renew or replace an SSL certificate, see Renewing or replacing an SSL certificate.
You may want to confirm the validity of your SSL certificate before you upload or try to activate the certificate on Cloud Platform. For more information, see Verifying the validity of an SSL certificate.
To install an SSL certificate based on an Acquia-generated CSR, you can follow one of these methods based on the type of your SSL certificate:
To install a legacy SSL certificate based on an Acquia-generated CSR:
In SSL Certificate, enter the SSL certificate in the PEM format. The certificate must look something like the following example, but much longer:
-----BEGIN CERTIFICATE-----
MIIFWzCCBEOgAwIG1bBouS1O/ob8scTviFvVCKVzzANBgkqhkiG9w0BAQsFADBw
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
d3cuZGlnaWNlcnQuY29tMS8wLQYDVQQDEyZEaWdpQ2VydCBTSEEyIEhpZ2ggQXNz
dXJhbmNlIFNlcnZlciBDQTAeFw0xNjA5MTUwMDAwMDBaFw0xNzEyMDgxMjAwMDBa
MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQIEw1NYXNzYWNodXNldHRzMQ8wDQYDVQQH
Us8/azXp7pJ75vyNi/tuLbLSQbwqNcEo+jBXPysGdA==
-----END CERTIFICATE-----After installing an SSL certificate on an environment, you must activate the certificate before it starts working with HTTPS requests to the environment.
To activate an SSL certificate, on the SSL page (under SSL certificates) locate the certificate you want to activate, and then click Activate to confirm. The activation will take a few minutes to complete.
When multiple certificates are set to active, HTTPS requests for any given domain on your environment will be served using the newest activated certificate which includes that domain. If multiple certificates are active and cover the same domain, one with an exact match and one with a wildcard match, your environment will serve the certificate with the exact match, even if the wildcard certificate was installed more recently. If no matching certificates are found, your environment will default to using any default or custom certificate installed on that environment by Acquia.
You can deactivate an active SSL certificate at any time. If you are planning to remove an SSL certificate, Acquia recommends to first deactivate the certificate and then remove it.
To deactivate an SSL certificate, on the SSL page (under SSL certificates), locate the active certificate you want to deactivate, and then click Deactivate.
To avoid potential impact to your site(s), it is a best practice to keep your current certificate in place before removing it if you are replacing it with a new certificate.
You can delete a non-legacy SSL certificate in the Cloud Platform user interface at any time. Before doing so, you must deactivate the certificate itself.
To remove a legacy/ELB SSL certificate, you must create a Support ticket. Removing a legacy SSL certificate includes permanently removing your ELB as well. This means that if you would like to install another legacy SSL certificate in the future, you would need to point your domains to a new ELB CNAME address.
To remove a non-legacy SSL certificate:
If you need to delete or deactivate a valid SSL certificate, you must revoke that certificate to prevent an attacker’s website masquerading as your own. Acquia recommends that you deactivate or delete any revoked or expired certificates from all environments. Leaving a revoked certificate active in any environment may result in downtime for your application.
Each SSL certificate vendor has different procedures to perform a certificate revocation. Ensure you follow the instructions your SSL certificate vendor provides. Here are the procedures for two common vendors:
If you need to replace an SSL certificate that is expiring, you do not need to delete or remove your existing certificate(s). There are two options you can take to replace your SSL certificate: The first is to install an updated certificate that includes new information, such as additional domains/ organizational changes, etc. This option includes the same steps as if you were installing a brand new certificate. If this applies to you, follow the instructions on installing a certificate here.
The other option is to install a renewed version of your existing certificate that just has a new expiration date. If there is no change to the details of the certificate itself besides the expiry date, you may not need to generate a new CSR. To install the updated version of the same certificate, follow these steps:
To upload a new SSL certificate to a Cloud Platform subscription that already has an active SSL certificate:
On the SSL page, in the Certificate signing requests section, click Install to navigate to the installation form and have the private key prepopulated in its respective field.
If you have questions on this step, see Generate private key in CSR for the CSR you used to obtain the SSL certificate you want to install.
ssl.csr) and the private key (ssl.key) in the Cloud API.Rekeying an SSL certificate is the process of replacing the existing private key associated with a currently valid SSL/TLS certificate. After a new private key is generated, the new key is used to generate a new Certificate Signing Request (CSR). You can send the CSR to the Certificate Authority (CA) to get a new certificate. The new certificate retains the same domain name and validity period but is secured by the new, stronger key pair.
This critical security and maintenance process involves the following primary steps:
The first step in rekeying your SSL certificate is to create a new private key and a Certificate Signing Request (CSR). The CSR contains information about your domain and organization that the Certificate Authority (CA) uses to reissue your certificate. Based on your web server software like Apache, Nginx, or IIS, you can generate a new Private Key and CSR. For example,
openssl req -new -newkey rsa:2048 -nodes -keyout yourdomain.key -out yourdomain.csrAfter you have your new CSR, you must submit it to the CA that issued your original certificate. The process varies by CA, but typically you must log in to your account on the CA's website and access the option to reissue or replace your certificate. When prompted, paste the contents of your CSR into the appropriate field. The CA verifies that the CSR is associated with the same domain as the existing certificate and uses the new public key from the CSR to issue a brand new SSL certificate. You can download this new certificate and install it on your server, replacing the old one. Post installation, you must test your installation.
Click Install.
After the installation is complete, the system displays the CSR details in the SSL certificates section.
To install a non-legacy SSL certificate based on an Acquia-generated CSR:
On the SSL tab, click Install next to the CSR that you generated.
The private key pre-populates in its respective field and you can fill the remaining fields on the installation form. If you are unsure about how to find the private key associated with a CSR that was generated in the Cloud Platform user interface, see Generate private key in CSR.
In SSL Certificate, enter the main/server SSL certificate file in the PEM format. PEM formatted files are text files written in Base64 ASCII encoding with plain-text headers and footers. The certificate must look something like the following example, but much longer:
-----BEGIN CERTIFICATE-----
MIIFWzCCBEOgAwIG1bBouS1O/ob8scTviFvVCKVzzANBgkqhkiG9w0BAQsFADBw
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
d3cuZGlnaWNlcnQuY29tMS8wLQYDVQQDEyZEaWdpQ2VydCBTSEEyIEhpZ2ggQXNz
dXJhbmNlIFNlcnZlciBDQTAeFw0xNjA5MTUwMDAwMDBaFw0xNzEyMDgxMjAwMDBa
MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQIEw1NYXNzYWNodXNldHRzMQ8wDQYDVQQH
Us8/azXp7pJ75vyNi/tuLbLSQbwqNcEo+jBXPysGdA==
-----END CERTIFICATE-----Private key files must be unencrypted and non-password protected, or the certificate cannot be deployed. The system updates the SSL private key field with the private key for the certificate in the PEM format. Do not change this key.
Click Install.
After the installation is complete, the system displays the CSR details in the SSL certificates section.
-----BEGIN CERTIFICATE-----
MIIFWzCCBEOgAwIG1bBouS1O/ob8scTviFvVCKVzzANBgkqhkiG9w0BAQsFADBw
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
d3cuZGlnaWNlcnQuY29tMS8wLQYDVQQDEyZEaWdpQ2VydCBTSEEyIEhpZ2ggQXNz
dXJhbmNlIFNlcnZlciBDQTAeFw0xNjA5MTUwMDAwMDBaFw0xNzEyMDgxMjAwMDBa
MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQIEw1NYXNzYWNodXNldHRzMQ8wDQYDVQQH
Us8/azXp7pJ75vyNi/tuLbLSQbwqNcEo+jBXPysGdA==
-----END CERTIFICATE-----After you have installed an SSL certificate on an environment, you can view it on the SSL page. The SSL certificates section lists all the installed certificates and their active status. Click View to see details about an SSL certificate, including:
Click Show to view the PEM encoded certificate, CA chain (CA intermediate certificates), or private key. Legacy/ELB certificates will not have the private key visible on this View page in the UI.
Cloud Platform and Site Factory offer SSL management with separate guidelines for default and custom domains. Default SSL certificates issued by Acquia only cover default domains and not custom domains. Ensure that you point to the correct domain to utilize SSL certificates properly.
If this content did not answer your questions, try searching or contacting our support team for further assistance.
Click Install.
After the installation is complete, the system displays the CSR details in the SSL certificates section.
To install a non-legacy SSL certificate based on an Acquia-generated CSR:
On the SSL tab, click Install next to the CSR that you generated.
The private key pre-populates in its respective field and you can fill the remaining fields on the installation form. If you are unsure about how to find the private key associated with a CSR that was generated in the Cloud Platform user interface, see Generate private key in CSR.
In SSL Certificate, enter the main/server SSL certificate file in the PEM format. PEM formatted files are text files written in Base64 ASCII encoding with plain-text headers and footers. The certificate must look something like the following example, but much longer:
-----BEGIN CERTIFICATE-----
MIIFWzCCBEOgAwIG1bBouS1O/ob8scTviFvVCKVzzANBgkqhkiG9w0BAQsFADBw
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
d3cuZGlnaWNlcnQuY29tMS8wLQYDVQQDEyZEaWdpQ2VydCBTSEEyIEhpZ2ggQXNz
dXJhbmNlIFNlcnZlciBDQTAeFw0xNjA5MTUwMDAwMDBaFw0xNzEyMDgxMjAwMDBa
MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQIEw1NYXNzYWNodXNldHRzMQ8wDQYDVQQH
Us8/azXp7pJ75vyNi/tuLbLSQbwqNcEo+jBXPysGdA==
-----END CERTIFICATE-----Private key files must be unencrypted and non-password protected, or the certificate cannot be deployed. The system updates the SSL private key field with the private key for the certificate in the PEM format. Do not change this key.
Click Install.
After the installation is complete, the system displays the CSR details in the SSL certificates section.
-----BEGIN CERTIFICATE-----
MIIFWzCCBEOgAwIG1bBouS1O/ob8scTviFvVCKVzzANBgkqhkiG9w0BAQsFADBw
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
d3cuZGlnaWNlcnQuY29tMS8wLQYDVQQDEyZEaWdpQ2VydCBTSEEyIEhpZ2ggQXNz
dXJhbmNlIFNlcnZlciBDQTAeFw0xNjA5MTUwMDAwMDBaFw0xNzEyMDgxMjAwMDBa
MGYxCzAJBgNVBAYTAlVTMRYwFAYDVQQIEw1NYXNzYWNodXNldHRzMQ8wDQYDVQQH
Us8/azXp7pJ75vyNi/tuLbLSQbwqNcEo+jBXPysGdA==
-----END CERTIFICATE-----After you have installed an SSL certificate on an environment, you can view it on the SSL page. The SSL certificates section lists all the installed certificates and their active status. Click View to see details about an SSL certificate, including:
Click Show to view the PEM encoded certificate, CA chain (CA intermediate certificates), or private key. Legacy/ELB certificates will not have the private key visible on this View page in the UI.
Cloud Platform and Site Factory offer SSL management with separate guidelines for default and custom domains. Default SSL certificates issued by Acquia only cover default domains and not custom domains. Ensure that you point to the correct domain to utilize SSL certificates properly.
If this content did not answer your questions, try searching or contacting our support team for further assistance.