- Newest
- Most votes
- Most comments
Hii Robby,
CloudFront isn't recognizing your GlobalSign wildcard certificate as trusted. Here's a solution:
Double-check Certificate Chain: Ensure you uploaded the entire certificate chain, including intermediate certificates from GlobalSign, not just the main certificate.
Verify Region: CloudFront requires certificates to be uploaded in the US-east-1 region. Check if you uploaded it there.
Double-Check Region: CloudFront is picky! It requires certificates to be uploaded in the US East (N. Virginia) Region
(https://baxtel.com/data-center/aws-us-east-n-virginia).
Hello,
You can refer this article: https://repost.aws/knowledge-center/cloudfront-invalid-viewer-certificate
This error message indicates that the certificate wasn't issued by a trusted certificate authority (CA). Issue a certificate from a trusted CA for CloudFront to allow you to use an alternate domain name (CNAME). If your current CA doesn't support this, you can use ACM to issue a free valid certificate. Note: Self-signed certificates aren't supported.
I agree with the other responses that the immediate issue is clear. I'd like to point out, though, that if you have the option, you'd both eliminate this issue and gain other benefits from using a certificate issued by ACM (AWS Certificate Manager) instead of one issued by an external certificate authority, like GlobalSign.
If you authorise ACM to issue the certificate by adding the CNAME record it requires in your domain to do so (and don't have a conflicting CAA record blocking ACM as an issuing authority or adjust it to allow ACM), ACM will issue the certificate for you free of charge, and you can use the certificate with CloudFront without paying AWS anything more than you would with a GlobalSign-issued certificate. That eliminates the cost for the externally issued certificate. Note that for CloudFront, the certificate request must be created in the us-east-1 region.
As long as the authorisation records remain in place in the DNS zone, ACM will automatically renew the certificate without requiring any manual action or monitoring for certificate expiration. If an issue arises trying to renew it automatically, such as the CNAME authorisation record getting removed or your entire domain expiring, ACM will raise a warning of failing to renew the certificate well in advance in the account-level health events. It also reports in CloudWatch Metrics how long it will be until the certificate expires, so you can effortlessly set your own monitoring alarms, if you'd like.
From a security point of view, the private key for the ACM-issued certificate will be generated internally by ACM and never saved on your laptop or servers. The private key cannot be exported from ACM in any situation even with administrative permissions, which ensures that the private key for your certificate cannot be stolen.
Relevant content
- asked 4 months ago
- asked 10 months ago
- AWS OFFICIALUpdated 7 months ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 5 months ago
- AWS OFFICIALUpdated 4 months ago
This is the steps I've done to help anyone in the future.