- Newest
- Most votes
- Most comments
When using the BlankEndEntityCertificate_APIPassthrough/V1 template with AWS Private CA, removing Subject Alternative Names (SANs) from the issued certificate while they are present in the CSR can be challenging. The API Passthrough method generally takes precedence over the CSR values, but it doesn't provide a direct way to remove extensions that are present in the CSR.
However, there are a few approaches you can consider:
-
Template Priority: The template definition has the highest priority over both API Passthrough values and CSR values. If you can create a custom template that explicitly defines an empty or null SAN extension, this should override the SANs in the CSR.
-
API Passthrough Override: While you can't pass an empty list for subjectAlternativeNames due to the constraint you encountered, you might be able to pass a single, benign SAN that effectively replaces the multiple SANs from the CSR. This could be a dummy value that you can later ignore or remove if necessary.
-
CSR Modification: If possible, consider modifying your CSR generation process to exclude SANs. This would be the most straightforward solution, as it eliminates the problem at the source.
-
Alternative Template: Instead of using the APIPassthrough template, you could try using the BlankEndEntityCertificate_CSRPassthrough/V1 template and then use the API Passthrough to override or remove specific extensions. This might allow more control over which CSR elements are included or excluded.
-
Custom Extension: As a workaround, you might be able to use a custom extension in the API Passthrough that nullifies or overrides the SAN extension from the CSR.
It's important to note that the exact behavior can depend on the specific implementation of AWS Private CA and the SDK version you're using. If none of these approaches work, you may need to contact AWS support for a more tailored solution or consider modifying your certificate issuance process to align with the constraints of the API Passthrough method.
Sources
How to issue use-case bound certificates with AWS Private CA | AWS Security Blog
Issue private end-entity certificates - AWS Private Certificate Authority
Relevant content
- AWS OFFICIALUpdated 5 months ago