Configure a Certificate Authority (Optional)
Focus
Focus
Next‑Gen Trust Security

Configure a Certificate Authority (Optional)

Table of Contents

Configure a Certificate Authority (Optional)

If you want Next-Gen Trust Security to issue a code signing certificate along with the key, you will need to select a certificate authority (CA) when creating the Signing Key. Some CAs require no setup, while others require configuration before they can be used:
  • None -- creates only a key pair with no certificate
  • Built-in CA -- requires no configuration and is suitable for internal trust use cases, such as development builds. Certificates issued by the Built-in CA are not implicitly trusted by browsers or operating systems.
  • Microsoft AD CS, DigiCert, and Zero Touch PKI -- require certificate authority connectors to be configured before use
Notes:
  • If you plan to obtain a certificate from a public certificate authority, you must select AWS KMS as the key storage type when creating the Signing Key. Public CAs will not sign a CSR for a key that is not stored on a hardware HSM.
  • Certificate authority connectors must be configured in the parent TSG. Once configured, the CA is available for selection when creating a Signing Key in any child TSG.
  • While Next-Gen Trust Security supports additional certificate authorities for issuing TLS certificates, only the CAs listed above are supported for issuing code signing certificates through the code signing capability.
For details about setting up certificate authority connectors, see the CA configuration documentation.

What's Next

After configuring a certificate authority (if needed), continue with Create a Signing Key.