[][src]Trait rusoto_acm_pca::AcmPca

pub trait AcmPca {
    fn create_certificate_authority(
        &self,
        input: CreateCertificateAuthorityRequest
    ) -> RusotoFuture<CreateCertificateAuthorityResponse, CreateCertificateAuthorityError>;
fn create_certificate_authority_audit_report(
        &self,
        input: CreateCertificateAuthorityAuditReportRequest
    ) -> RusotoFuture<CreateCertificateAuthorityAuditReportResponse, CreateCertificateAuthorityAuditReportError>;
fn create_permission(
        &self,
        input: CreatePermissionRequest
    ) -> RusotoFuture<(), CreatePermissionError>;
fn delete_certificate_authority(
        &self,
        input: DeleteCertificateAuthorityRequest
    ) -> RusotoFuture<(), DeleteCertificateAuthorityError>;
fn delete_permission(
        &self,
        input: DeletePermissionRequest
    ) -> RusotoFuture<(), DeletePermissionError>;
fn describe_certificate_authority(
        &self,
        input: DescribeCertificateAuthorityRequest
    ) -> RusotoFuture<DescribeCertificateAuthorityResponse, DescribeCertificateAuthorityError>;
fn describe_certificate_authority_audit_report(
        &self,
        input: DescribeCertificateAuthorityAuditReportRequest
    ) -> RusotoFuture<DescribeCertificateAuthorityAuditReportResponse, DescribeCertificateAuthorityAuditReportError>;
fn get_certificate(
        &self,
        input: GetCertificateRequest
    ) -> RusotoFuture<GetCertificateResponse, GetCertificateError>;
fn get_certificate_authority_certificate(
        &self,
        input: GetCertificateAuthorityCertificateRequest
    ) -> RusotoFuture<GetCertificateAuthorityCertificateResponse, GetCertificateAuthorityCertificateError>;
fn get_certificate_authority_csr(
        &self,
        input: GetCertificateAuthorityCsrRequest
    ) -> RusotoFuture<GetCertificateAuthorityCsrResponse, GetCertificateAuthorityCsrError>;
fn import_certificate_authority_certificate(
        &self,
        input: ImportCertificateAuthorityCertificateRequest
    ) -> RusotoFuture<(), ImportCertificateAuthorityCertificateError>;
fn issue_certificate(
        &self,
        input: IssueCertificateRequest
    ) -> RusotoFuture<IssueCertificateResponse, IssueCertificateError>;
fn list_certificate_authorities(
        &self,
        input: ListCertificateAuthoritiesRequest
    ) -> RusotoFuture<ListCertificateAuthoritiesResponse, ListCertificateAuthoritiesError>;
fn list_permissions(
        &self,
        input: ListPermissionsRequest
    ) -> RusotoFuture<ListPermissionsResponse, ListPermissionsError>;
fn list_tags(
        &self,
        input: ListTagsRequest
    ) -> RusotoFuture<ListTagsResponse, ListTagsError>;
fn restore_certificate_authority(
        &self,
        input: RestoreCertificateAuthorityRequest
    ) -> RusotoFuture<(), RestoreCertificateAuthorityError>;
fn revoke_certificate(
        &self,
        input: RevokeCertificateRequest
    ) -> RusotoFuture<(), RevokeCertificateError>;
fn tag_certificate_authority(
        &self,
        input: TagCertificateAuthorityRequest
    ) -> RusotoFuture<(), TagCertificateAuthorityError>;
fn untag_certificate_authority(
        &self,
        input: UntagCertificateAuthorityRequest
    ) -> RusotoFuture<(), UntagCertificateAuthorityError>;
fn update_certificate_authority(
        &self,
        input: UpdateCertificateAuthorityRequest
    ) -> RusotoFuture<(), UpdateCertificateAuthorityError>; }

Trait representing the capabilities of the ACM-PCA API. ACM-PCA clients implement this trait.

Required methods

fn create_certificate_authority(
    &self,
    input: CreateCertificateAuthorityRequest
) -> RusotoFuture<CreateCertificateAuthorityResponse, CreateCertificateAuthorityError>

Creates a private subordinate certificate authority (CA). You must specify the CA configuration, the revocation configuration, the CA type, and an optional idempotency token. The CA configuration specifies the name of the algorithm and key size to be used to create the CA private key, the type of signing algorithm that the CA uses to sign, and X.500 subject information. The CRL (certificate revocation list) configuration specifies the CRL expiration period in days (the validity period of the CRL), the Amazon S3 bucket that will contain the CRL, and a CNAME alias for the S3 bucket that is included in certificates issued by the CA. If successful, this operation returns the Amazon Resource Name (ARN) of the CA.

fn create_certificate_authority_audit_report(
    &self,
    input: CreateCertificateAuthorityAuditReportRequest
) -> RusotoFuture<CreateCertificateAuthorityAuditReportResponse, CreateCertificateAuthorityAuditReportError>

Creates an audit report that lists every time that your CA private key is used. The report is saved in the Amazon S3 bucket that you specify on input. The IssueCertificate and RevokeCertificate operations use the private key. You can generate a new report every 30 minutes.

fn create_permission(
    &self,
    input: CreatePermissionRequest
) -> RusotoFuture<(), CreatePermissionError>

Assigns permissions from a private CA to a designated AWS service. Services are specified by their service principals and can be given permission to create and retrieve certificates on a private CA. Services can also be given permission to list the active permissions that the private CA has granted. For ACM to automatically renew your private CA's certificates, you must assign all possible permissions from the CA to the ACM service principal.

At this time, you can only assign permissions to ACM (acm.amazonaws.com). Permissions can be revoked with the DeletePermission operation and listed with the ListPermissions operation.

fn delete_certificate_authority(
    &self,
    input: DeleteCertificateAuthorityRequest
) -> RusotoFuture<(), DeleteCertificateAuthorityError>

Deletes a private certificate authority (CA). You must provide the ARN (Amazon Resource Name) of the private CA that you want to delete. You can find the ARN by calling the ListCertificateAuthorities operation. Before you can delete a CA, you must disable it. Call the UpdateCertificateAuthority operation and set the CertificateAuthorityStatus parameter to DISABLED.

Additionally, you can delete a CA if you are waiting for it to be created (the Status field of the CertificateAuthority is CREATING). You can also delete it if the CA has been created but you haven't yet imported the signed certificate (the Status is PENDING_CERTIFICATE) into ACM PCA.

If the CA is in one of the previously mentioned states and you call DeleteCertificateAuthority, the CA's status changes to DELETED. However, the CA won't be permanently deleted until the restoration period has passed. By default, if you do not set the PermanentDeletionTimeInDays parameter, the CA remains restorable for 30 days. You can set the parameter from 7 to 30 days. The DescribeCertificateAuthority operation returns the time remaining in the restoration window of a Private CA in the DELETED state. To restore an eligible CA, call the RestoreCertificateAuthority operation.

fn delete_permission(
    &self,
    input: DeletePermissionRequest
) -> RusotoFuture<(), DeletePermissionError>

Revokes permissions that a private CA assigned to a designated AWS service. Permissions can be created with the CreatePermission operation and listed with the ListPermissions operation.

fn describe_certificate_authority(
    &self,
    input: DescribeCertificateAuthorityRequest
) -> RusotoFuture<DescribeCertificateAuthorityResponse, DescribeCertificateAuthorityError>

Lists information about your private certificate authority (CA). You specify the private CA on input by its ARN (Amazon Resource Name). The output contains the status of your CA. This can be any of the following:

  • CREATING - ACM PCA is creating your private certificate authority.

  • PENDING_CERTIFICATE - The certificate is pending. You must use your on-premises root or subordinate CA to sign your private CA CSR and then import it into PCA.

  • ACTIVE - Your private CA is active.

  • DISABLED - Your private CA has been disabled.

  • EXPIRED - Your private CA certificate has expired.

  • FAILED - Your private CA has failed. Your CA can fail because of problems such a network outage or backend AWS failure or other errors. A failed CA can never return to the pending state. You must create a new CA.

  • DELETED - Your private CA is within the restoration period, after which it is permanently deleted. The length of time remaining in the CA's restoration period is also included in this operation's output.

fn describe_certificate_authority_audit_report(
    &self,
    input: DescribeCertificateAuthorityAuditReportRequest
) -> RusotoFuture<DescribeCertificateAuthorityAuditReportResponse, DescribeCertificateAuthorityAuditReportError>

Lists information about a specific audit report created by calling the CreateCertificateAuthorityAuditReport operation. Audit information is created every time the certificate authority (CA) private key is used. The private key is used when you call the IssueCertificate operation or the RevokeCertificate operation.

fn get_certificate(
    &self,
    input: GetCertificateRequest
) -> RusotoFuture<GetCertificateResponse, GetCertificateError>

Retrieves a certificate from your private CA. The ARN of the certificate is returned when you call the IssueCertificate operation. You must specify both the ARN of your private CA and the ARN of the issued certificate when calling the GetCertificate operation. You can retrieve the certificate if it is in the ISSUED state. You can call the CreateCertificateAuthorityAuditReport operation to create a report that contains information about all of the certificates issued and revoked by your private CA.

fn get_certificate_authority_certificate(
    &self,
    input: GetCertificateAuthorityCertificateRequest
) -> RusotoFuture<GetCertificateAuthorityCertificateResponse, GetCertificateAuthorityCertificateError>

Retrieves the certificate and certificate chain for your private certificate authority (CA). Both the certificate and the chain are base64 PEM-encoded. The chain does not include the CA certificate. Each certificate in the chain signs the one before it.

fn get_certificate_authority_csr(
    &self,
    input: GetCertificateAuthorityCsrRequest
) -> RusotoFuture<GetCertificateAuthorityCsrResponse, GetCertificateAuthorityCsrError>

Retrieves the certificate signing request (CSR) for your private certificate authority (CA). The CSR is created when you call the CreateCertificateAuthority operation. Take the CSR to your on-premises X.509 infrastructure and sign it by using your root or a subordinate CA. Then import the signed certificate back into ACM PCA by calling the ImportCertificateAuthorityCertificate operation. The CSR is returned as a base64 PEM-encoded string.

fn import_certificate_authority_certificate(
    &self,
    input: ImportCertificateAuthorityCertificateRequest
) -> RusotoFuture<(), ImportCertificateAuthorityCertificateError>

Imports your signed private CA certificate into ACM PCA. Before you can call this operation, you must create the private certificate authority by calling the CreateCertificateAuthority operation. You must then generate a certificate signing request (CSR) by calling the GetCertificateAuthorityCsr operation. Take the CSR to your on-premises CA and use the root certificate or a subordinate certificate to sign it. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory.

Your certificate chain must not include the private CA certificate that you are importing.

Your on-premises CA certificate must be the last certificate in your chain. The subordinate certificate, if any, that your root CA signed must be next to last. The subordinate certificate signed by the preceding subordinate CA must come next, and so on until your chain is built.

The chain must be PEM-encoded.

fn issue_certificate(
    &self,
    input: IssueCertificateRequest
) -> RusotoFuture<IssueCertificateResponse, IssueCertificateError>

Uses your private certificate authority (CA) to issue a client certificate. This operation returns the Amazon Resource Name (ARN) of the certificate. You can retrieve the certificate by calling the GetCertificate operation and specifying the ARN.

You cannot use the ACM ListCertificateAuthorities operation to retrieve the ARNs of the certificates that you issue by using ACM PCA.

fn list_certificate_authorities(
    &self,
    input: ListCertificateAuthoritiesRequest
) -> RusotoFuture<ListCertificateAuthoritiesResponse, ListCertificateAuthoritiesError>

Lists the private certificate authorities that you created by using the CreateCertificateAuthority operation.

fn list_permissions(
    &self,
    input: ListPermissionsRequest
) -> RusotoFuture<ListPermissionsResponse, ListPermissionsError>

Lists all the permissions, if any, that have been assigned by a private CA. Permissions can be granted with the CreatePermission operation and revoked with the DeletePermission operation.

fn list_tags(
    &self,
    input: ListTagsRequest
) -> RusotoFuture<ListTagsResponse, ListTagsError>

Lists the tags, if any, that are associated with your private CA. Tags are labels that you can use to identify and organize your CAs. Each tag consists of a key and an optional value. Call the TagCertificateAuthority operation to add one or more tags to your CA. Call the UntagCertificateAuthority operation to remove tags.

fn restore_certificate_authority(
    &self,
    input: RestoreCertificateAuthorityRequest
) -> RusotoFuture<(), RestoreCertificateAuthorityError>

Restores a certificate authority (CA) that is in the DELETED state. You can restore a CA during the period that you defined in the PermanentDeletionTimeInDays parameter of the DeleteCertificateAuthority operation. Currently, you can specify 7 to 30 days. If you did not specify a PermanentDeletionTimeInDays value, by default you can restore the CA at any time in a 30 day period. You can check the time remaining in the restoration period of a private CA in the DELETED state by calling the DescribeCertificateAuthority or ListCertificateAuthorities operations. The status of a restored CA is set to its pre-deletion status when the RestoreCertificateAuthority operation returns. To change its status to ACTIVE, call the UpdateCertificateAuthority operation. If the private CA was in the PENDING_CERTIFICATE state at deletion, you must use the ImportCertificateAuthorityCertificate operation to import a certificate authority into the private CA before it can be activated. You cannot restore a CA after the restoration period has ended.

fn revoke_certificate(
    &self,
    input: RevokeCertificateRequest
) -> RusotoFuture<(), RevokeCertificateError>

Revokes a certificate that you issued by calling the IssueCertificate operation. If you enable a certificate revocation list (CRL) when you create or update your private CA, information about the revoked certificates will be included in the CRL. ACM PCA writes the CRL to an S3 bucket that you specify. For more information about revocation, see the CrlConfiguration structure. ACM PCA also writes revocation information to the audit report. For more information, see CreateCertificateAuthorityAuditReport.

fn tag_certificate_authority(
    &self,
    input: TagCertificateAuthorityRequest
) -> RusotoFuture<(), TagCertificateAuthorityError>

Adds one or more tags to your private CA. Tags are labels that you can use to identify and organize your AWS resources. Each tag consists of a key and an optional value. You specify the private CA on input by its Amazon Resource Name (ARN). You specify the tag by using a key-value pair. You can apply a tag to just one private CA if you want to identify a specific characteristic of that CA, or you can apply the same tag to multiple private CAs if you want to filter for a common relationship among those CAs. To remove one or more tags, use the UntagCertificateAuthority operation. Call the ListTags operation to see what tags are associated with your CA.

fn untag_certificate_authority(
    &self,
    input: UntagCertificateAuthorityRequest
) -> RusotoFuture<(), UntagCertificateAuthorityError>

Remove one or more tags from your private CA. A tag consists of a key-value pair. If you do not specify the value portion of the tag when calling this operation, the tag will be removed regardless of value. If you specify a value, the tag is removed only if it is associated with the specified value. To add tags to a private CA, use the TagCertificateAuthority. Call the ListTags operation to see what tags are associated with your CA.

fn update_certificate_authority(
    &self,
    input: UpdateCertificateAuthorityRequest
) -> RusotoFuture<(), UpdateCertificateAuthorityError>

Updates the status or configuration of a private certificate authority (CA). Your private CA must be in the ACTIVE or DISABLED state before you can update it. You can disable a private CA that is in the ACTIVE state or make a CA that is in the DISABLED state active again.

Loading content...

Implementors

impl AcmPca for AcmPcaClient[src]

fn create_certificate_authority(
    &self,
    input: CreateCertificateAuthorityRequest
) -> RusotoFuture<CreateCertificateAuthorityResponse, CreateCertificateAuthorityError>
[src]

Creates a private subordinate certificate authority (CA). You must specify the CA configuration, the revocation configuration, the CA type, and an optional idempotency token. The CA configuration specifies the name of the algorithm and key size to be used to create the CA private key, the type of signing algorithm that the CA uses to sign, and X.500 subject information. The CRL (certificate revocation list) configuration specifies the CRL expiration period in days (the validity period of the CRL), the Amazon S3 bucket that will contain the CRL, and a CNAME alias for the S3 bucket that is included in certificates issued by the CA. If successful, this operation returns the Amazon Resource Name (ARN) of the CA.

fn create_certificate_authority_audit_report(
    &self,
    input: CreateCertificateAuthorityAuditReportRequest
) -> RusotoFuture<CreateCertificateAuthorityAuditReportResponse, CreateCertificateAuthorityAuditReportError>
[src]

Creates an audit report that lists every time that your CA private key is used. The report is saved in the Amazon S3 bucket that you specify on input. The IssueCertificate and RevokeCertificate operations use the private key. You can generate a new report every 30 minutes.

fn create_permission(
    &self,
    input: CreatePermissionRequest
) -> RusotoFuture<(), CreatePermissionError>
[src]

Assigns permissions from a private CA to a designated AWS service. Services are specified by their service principals and can be given permission to create and retrieve certificates on a private CA. Services can also be given permission to list the active permissions that the private CA has granted. For ACM to automatically renew your private CA's certificates, you must assign all possible permissions from the CA to the ACM service principal.

At this time, you can only assign permissions to ACM (acm.amazonaws.com). Permissions can be revoked with the DeletePermission operation and listed with the ListPermissions operation.

fn delete_certificate_authority(
    &self,
    input: DeleteCertificateAuthorityRequest
) -> RusotoFuture<(), DeleteCertificateAuthorityError>
[src]

Deletes a private certificate authority (CA). You must provide the ARN (Amazon Resource Name) of the private CA that you want to delete. You can find the ARN by calling the ListCertificateAuthorities operation. Before you can delete a CA, you must disable it. Call the UpdateCertificateAuthority operation and set the CertificateAuthorityStatus parameter to DISABLED.

Additionally, you can delete a CA if you are waiting for it to be created (the Status field of the CertificateAuthority is CREATING). You can also delete it if the CA has been created but you haven't yet imported the signed certificate (the Status is PENDING_CERTIFICATE) into ACM PCA.

If the CA is in one of the previously mentioned states and you call DeleteCertificateAuthority, the CA's status changes to DELETED. However, the CA won't be permanently deleted until the restoration period has passed. By default, if you do not set the PermanentDeletionTimeInDays parameter, the CA remains restorable for 30 days. You can set the parameter from 7 to 30 days. The DescribeCertificateAuthority operation returns the time remaining in the restoration window of a Private CA in the DELETED state. To restore an eligible CA, call the RestoreCertificateAuthority operation.

fn delete_permission(
    &self,
    input: DeletePermissionRequest
) -> RusotoFuture<(), DeletePermissionError>
[src]

Revokes permissions that a private CA assigned to a designated AWS service. Permissions can be created with the CreatePermission operation and listed with the ListPermissions operation.

fn describe_certificate_authority(
    &self,
    input: DescribeCertificateAuthorityRequest
) -> RusotoFuture<DescribeCertificateAuthorityResponse, DescribeCertificateAuthorityError>
[src]

Lists information about your private certificate authority (CA). You specify the private CA on input by its ARN (Amazon Resource Name). The output contains the status of your CA. This can be any of the following:

  • CREATING - ACM PCA is creating your private certificate authority.

  • PENDING_CERTIFICATE - The certificate is pending. You must use your on-premises root or subordinate CA to sign your private CA CSR and then import it into PCA.

  • ACTIVE - Your private CA is active.

  • DISABLED - Your private CA has been disabled.

  • EXPIRED - Your private CA certificate has expired.

  • FAILED - Your private CA has failed. Your CA can fail because of problems such a network outage or backend AWS failure or other errors. A failed CA can never return to the pending state. You must create a new CA.

  • DELETED - Your private CA is within the restoration period, after which it is permanently deleted. The length of time remaining in the CA's restoration period is also included in this operation's output.

fn describe_certificate_authority_audit_report(
    &self,
    input: DescribeCertificateAuthorityAuditReportRequest
) -> RusotoFuture<DescribeCertificateAuthorityAuditReportResponse, DescribeCertificateAuthorityAuditReportError>
[src]

Lists information about a specific audit report created by calling the CreateCertificateAuthorityAuditReport operation. Audit information is created every time the certificate authority (CA) private key is used. The private key is used when you call the IssueCertificate operation or the RevokeCertificate operation.

fn get_certificate(
    &self,
    input: GetCertificateRequest
) -> RusotoFuture<GetCertificateResponse, GetCertificateError>
[src]

Retrieves a certificate from your private CA. The ARN of the certificate is returned when you call the IssueCertificate operation. You must specify both the ARN of your private CA and the ARN of the issued certificate when calling the GetCertificate operation. You can retrieve the certificate if it is in the ISSUED state. You can call the CreateCertificateAuthorityAuditReport operation to create a report that contains information about all of the certificates issued and revoked by your private CA.

fn get_certificate_authority_certificate(
    &self,
    input: GetCertificateAuthorityCertificateRequest
) -> RusotoFuture<GetCertificateAuthorityCertificateResponse, GetCertificateAuthorityCertificateError>
[src]

Retrieves the certificate and certificate chain for your private certificate authority (CA). Both the certificate and the chain are base64 PEM-encoded. The chain does not include the CA certificate. Each certificate in the chain signs the one before it.

fn get_certificate_authority_csr(
    &self,
    input: GetCertificateAuthorityCsrRequest
) -> RusotoFuture<GetCertificateAuthorityCsrResponse, GetCertificateAuthorityCsrError>
[src]

Retrieves the certificate signing request (CSR) for your private certificate authority (CA). The CSR is created when you call the CreateCertificateAuthority operation. Take the CSR to your on-premises X.509 infrastructure and sign it by using your root or a subordinate CA. Then import the signed certificate back into ACM PCA by calling the ImportCertificateAuthorityCertificate operation. The CSR is returned as a base64 PEM-encoded string.

fn import_certificate_authority_certificate(
    &self,
    input: ImportCertificateAuthorityCertificateRequest
) -> RusotoFuture<(), ImportCertificateAuthorityCertificateError>
[src]

Imports your signed private CA certificate into ACM PCA. Before you can call this operation, you must create the private certificate authority by calling the CreateCertificateAuthority operation. You must then generate a certificate signing request (CSR) by calling the GetCertificateAuthorityCsr operation. Take the CSR to your on-premises CA and use the root certificate or a subordinate certificate to sign it. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory.

Your certificate chain must not include the private CA certificate that you are importing.

Your on-premises CA certificate must be the last certificate in your chain. The subordinate certificate, if any, that your root CA signed must be next to last. The subordinate certificate signed by the preceding subordinate CA must come next, and so on until your chain is built.

The chain must be PEM-encoded.

fn issue_certificate(
    &self,
    input: IssueCertificateRequest
) -> RusotoFuture<IssueCertificateResponse, IssueCertificateError>
[src]

Uses your private certificate authority (CA) to issue a client certificate. This operation returns the Amazon Resource Name (ARN) of the certificate. You can retrieve the certificate by calling the GetCertificate operation and specifying the ARN.

You cannot use the ACM ListCertificateAuthorities operation to retrieve the ARNs of the certificates that you issue by using ACM PCA.

fn list_certificate_authorities(
    &self,
    input: ListCertificateAuthoritiesRequest
) -> RusotoFuture<ListCertificateAuthoritiesResponse, ListCertificateAuthoritiesError>
[src]

Lists the private certificate authorities that you created by using the CreateCertificateAuthority operation.

fn list_permissions(
    &self,
    input: ListPermissionsRequest
) -> RusotoFuture<ListPermissionsResponse, ListPermissionsError>
[src]

Lists all the permissions, if any, that have been assigned by a private CA. Permissions can be granted with the CreatePermission operation and revoked with the DeletePermission operation.

fn list_tags(
    &self,
    input: ListTagsRequest
) -> RusotoFuture<ListTagsResponse, ListTagsError>
[src]

Lists the tags, if any, that are associated with your private CA. Tags are labels that you can use to identify and organize your CAs. Each tag consists of a key and an optional value. Call the TagCertificateAuthority operation to add one or more tags to your CA. Call the UntagCertificateAuthority operation to remove tags.

fn restore_certificate_authority(
    &self,
    input: RestoreCertificateAuthorityRequest
) -> RusotoFuture<(), RestoreCertificateAuthorityError>
[src]

Restores a certificate authority (CA) that is in the DELETED state. You can restore a CA during the period that you defined in the PermanentDeletionTimeInDays parameter of the DeleteCertificateAuthority operation. Currently, you can specify 7 to 30 days. If you did not specify a PermanentDeletionTimeInDays value, by default you can restore the CA at any time in a 30 day period. You can check the time remaining in the restoration period of a private CA in the DELETED state by calling the DescribeCertificateAuthority or ListCertificateAuthorities operations. The status of a restored CA is set to its pre-deletion status when the RestoreCertificateAuthority operation returns. To change its status to ACTIVE, call the UpdateCertificateAuthority operation. If the private CA was in the PENDING_CERTIFICATE state at deletion, you must use the ImportCertificateAuthorityCertificate operation to import a certificate authority into the private CA before it can be activated. You cannot restore a CA after the restoration period has ended.

fn revoke_certificate(
    &self,
    input: RevokeCertificateRequest
) -> RusotoFuture<(), RevokeCertificateError>
[src]

Revokes a certificate that you issued by calling the IssueCertificate operation. If you enable a certificate revocation list (CRL) when you create or update your private CA, information about the revoked certificates will be included in the CRL. ACM PCA writes the CRL to an S3 bucket that you specify. For more information about revocation, see the CrlConfiguration structure. ACM PCA also writes revocation information to the audit report. For more information, see CreateCertificateAuthorityAuditReport.

fn tag_certificate_authority(
    &self,
    input: TagCertificateAuthorityRequest
) -> RusotoFuture<(), TagCertificateAuthorityError>
[src]

Adds one or more tags to your private CA. Tags are labels that you can use to identify and organize your AWS resources. Each tag consists of a key and an optional value. You specify the private CA on input by its Amazon Resource Name (ARN). You specify the tag by using a key-value pair. You can apply a tag to just one private CA if you want to identify a specific characteristic of that CA, or you can apply the same tag to multiple private CAs if you want to filter for a common relationship among those CAs. To remove one or more tags, use the UntagCertificateAuthority operation. Call the ListTags operation to see what tags are associated with your CA.

fn untag_certificate_authority(
    &self,
    input: UntagCertificateAuthorityRequest
) -> RusotoFuture<(), UntagCertificateAuthorityError>
[src]

Remove one or more tags from your private CA. A tag consists of a key-value pair. If you do not specify the value portion of the tag when calling this operation, the tag will be removed regardless of value. If you specify a value, the tag is removed only if it is associated with the specified value. To add tags to a private CA, use the TagCertificateAuthority. Call the ListTags operation to see what tags are associated with your CA.

fn update_certificate_authority(
    &self,
    input: UpdateCertificateAuthorityRequest
) -> RusotoFuture<(), UpdateCertificateAuthorityError>
[src]

Updates the status or configuration of a private certificate authority (CA). Your private CA must be in the ACTIVE or DISABLED state before you can update it. You can disable a private CA that is in the ACTIVE state or make a CA that is in the DISABLED state active again.

Loading content...