amazonka-certificatemanager-pca-1.6.0: Amazon Certificate Manager Private Certificate Authority SDK.

Copyright(c) 2013-2018 Brendan Hay
LicenseMozilla Public License, v. 2.0.
MaintainerBrendan Hay <brendan.g.hay+amazonka@gmail.com>
Stabilityauto-generated
Portabilitynon-portable (GHC extensions)
Safe HaskellNone
LanguageHaskell2010

Network.AWS.CertificateManagerPCA.ImportCertificateAuthorityCertificate

Contents

Description

Imports your signed private CA certificate into ACM PCA. Before you can call this function, you must create the private certificate authority by calling the CreateCertificateAuthority function. You must then generate a certificate signing request (CSR) by calling the GetCertificateAuthorityCsr function. Take the CSR to your on-premises CA and use the root certificate or a subordinate certificate to sign it. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory.

Synopsis

Creating a Request

importCertificateAuthorityCertificate Source #

Creates a value of ImportCertificateAuthorityCertificate with the minimum fields required to make a request.

Use one of the following lenses to modify other fields as desired:

  • icacCertificateAuthorityARN - The Amazon Resource Name (ARN) that was returned when you called CreateCertificateAuthority . This must be of the form: arn:aws:acm:region :account :certificate-authority/12345678-1234-1234-1234-123456789012
  • icacCertificate - The PEM-encoded certificate for your private CA. This must be signed by using your on-premises CA.-- Note: This Lens automatically encodes and decodes Base64 data. The underlying isomorphism will encode to Base64 representation during serialisation, and decode from Base64 representation during deserialisation. This Lens accepts and returns only raw unencoded data.
  • icacCertificateChain - A PEM-encoded file that contains all of your certificates, other than the certificate you're importing, chaining up to your root CA. Your on-premises root certificate is the last in the chain, and each certificate in the chain signs the one preceding. -- Note: This Lens automatically encodes and decodes Base64 data. The underlying isomorphism will encode to Base64 representation during serialisation, and decode from Base64 representation during deserialisation. This Lens accepts and returns only raw unencoded data.

data ImportCertificateAuthorityCertificate Source #

Instances

Eq ImportCertificateAuthorityCertificate Source # 
Data ImportCertificateAuthorityCertificate Source # 

Methods

gfoldl :: (forall d b. Data d => c (d -> b) -> d -> c b) -> (forall g. g -> c g) -> ImportCertificateAuthorityCertificate -> c ImportCertificateAuthorityCertificate #

gunfold :: (forall b r. Data b => c (b -> r) -> c r) -> (forall r. r -> c r) -> Constr -> c ImportCertificateAuthorityCertificate #

toConstr :: ImportCertificateAuthorityCertificate -> Constr #

dataTypeOf :: ImportCertificateAuthorityCertificate -> DataType #

dataCast1 :: Typeable (* -> *) t => (forall d. Data d => c (t d)) -> Maybe (c ImportCertificateAuthorityCertificate) #

dataCast2 :: Typeable (* -> * -> *) t => (forall d e. (Data d, Data e) => c (t d e)) -> Maybe (c ImportCertificateAuthorityCertificate) #

gmapT :: (forall b. Data b => b -> b) -> ImportCertificateAuthorityCertificate -> ImportCertificateAuthorityCertificate #

gmapQl :: (r -> r' -> r) -> r -> (forall d. Data d => d -> r') -> ImportCertificateAuthorityCertificate -> r #

gmapQr :: (r' -> r -> r) -> r -> (forall d. Data d => d -> r') -> ImportCertificateAuthorityCertificate -> r #

gmapQ :: (forall d. Data d => d -> u) -> ImportCertificateAuthorityCertificate -> [u] #

gmapQi :: Int -> (forall d. Data d => d -> u) -> ImportCertificateAuthorityCertificate -> u #

gmapM :: Monad m => (forall d. Data d => d -> m d) -> ImportCertificateAuthorityCertificate -> m ImportCertificateAuthorityCertificate #

gmapMp :: MonadPlus m => (forall d. Data d => d -> m d) -> ImportCertificateAuthorityCertificate -> m ImportCertificateAuthorityCertificate #

gmapMo :: MonadPlus m => (forall d. Data d => d -> m d) -> ImportCertificateAuthorityCertificate -> m ImportCertificateAuthorityCertificate #

Read ImportCertificateAuthorityCertificate Source # 
Show ImportCertificateAuthorityCertificate Source # 
Generic ImportCertificateAuthorityCertificate Source # 
Hashable ImportCertificateAuthorityCertificate Source # 
ToJSON ImportCertificateAuthorityCertificate Source # 
NFData ImportCertificateAuthorityCertificate Source # 
AWSRequest ImportCertificateAuthorityCertificate Source # 
ToHeaders ImportCertificateAuthorityCertificate Source # 
ToPath ImportCertificateAuthorityCertificate Source # 
ToQuery ImportCertificateAuthorityCertificate Source # 
type Rep ImportCertificateAuthorityCertificate Source # 
type Rep ImportCertificateAuthorityCertificate = D1 * (MetaData "ImportCertificateAuthorityCertificate" "Network.AWS.CertificateManagerPCA.ImportCertificateAuthorityCertificate" "amazonka-certificatemanager-pca-1.6.0-745TdprsK5d4KxFM63j3hX" False) (C1 * (MetaCons "ImportCertificateAuthorityCertificate'" PrefixI True) ((:*:) * (S1 * (MetaSel (Just Symbol "_icacCertificateAuthorityARN") NoSourceUnpackedness SourceStrict DecidedStrict) (Rec0 * Text)) ((:*:) * (S1 * (MetaSel (Just Symbol "_icacCertificate") NoSourceUnpackedness SourceStrict DecidedStrict) (Rec0 * Base64)) (S1 * (MetaSel (Just Symbol "_icacCertificateChain") NoSourceUnpackedness SourceStrict DecidedStrict) (Rec0 * Base64)))))
type Rs ImportCertificateAuthorityCertificate Source # 

Request Lenses

icacCertificateAuthorityARN :: Lens' ImportCertificateAuthorityCertificate Text Source #

The Amazon Resource Name (ARN) that was returned when you called CreateCertificateAuthority . This must be of the form: arn:aws:acm:region :account :certificate-authority/12345678-1234-1234-1234-123456789012

icacCertificate :: Lens' ImportCertificateAuthorityCertificate ByteString Source #

The PEM-encoded certificate for your private CA. This must be signed by using your on-premises CA.-- Note: This Lens automatically encodes and decodes Base64 data. The underlying isomorphism will encode to Base64 representation during serialisation, and decode from Base64 representation during deserialisation. This Lens accepts and returns only raw unencoded data.

icacCertificateChain :: Lens' ImportCertificateAuthorityCertificate ByteString Source #

A PEM-encoded file that contains all of your certificates, other than the certificate you're importing, chaining up to your root CA. Your on-premises root certificate is the last in the chain, and each certificate in the chain signs the one preceding. -- Note: This Lens automatically encodes and decodes Base64 data. The underlying isomorphism will encode to Base64 representation during serialisation, and decode from Base64 representation during deserialisation. This Lens accepts and returns only raw unencoded data.

Destructuring the Response

data ImportCertificateAuthorityCertificateResponse Source #

Instances

Eq ImportCertificateAuthorityCertificateResponse Source # 
Data ImportCertificateAuthorityCertificateResponse Source # 

Methods

gfoldl :: (forall d b. Data d => c (d -> b) -> d -> c b) -> (forall g. g -> c g) -> ImportCertificateAuthorityCertificateResponse -> c ImportCertificateAuthorityCertificateResponse #

gunfold :: (forall b r. Data b => c (b -> r) -> c r) -> (forall r. r -> c r) -> Constr -> c ImportCertificateAuthorityCertificateResponse #

toConstr :: ImportCertificateAuthorityCertificateResponse -> Constr #

dataTypeOf :: ImportCertificateAuthorityCertificateResponse -> DataType #

dataCast1 :: Typeable (* -> *) t => (forall d. Data d => c (t d)) -> Maybe (c ImportCertificateAuthorityCertificateResponse) #

dataCast2 :: Typeable (* -> * -> *) t => (forall d e. (Data d, Data e) => c (t d e)) -> Maybe (c ImportCertificateAuthorityCertificateResponse) #

gmapT :: (forall b. Data b => b -> b) -> ImportCertificateAuthorityCertificateResponse -> ImportCertificateAuthorityCertificateResponse #

gmapQl :: (r -> r' -> r) -> r -> (forall d. Data d => d -> r') -> ImportCertificateAuthorityCertificateResponse -> r #

gmapQr :: (r' -> r -> r) -> r -> (forall d. Data d => d -> r') -> ImportCertificateAuthorityCertificateResponse -> r #

gmapQ :: (forall d. Data d => d -> u) -> ImportCertificateAuthorityCertificateResponse -> [u] #

gmapQi :: Int -> (forall d. Data d => d -> u) -> ImportCertificateAuthorityCertificateResponse -> u #

gmapM :: Monad m => (forall d. Data d => d -> m d) -> ImportCertificateAuthorityCertificateResponse -> m ImportCertificateAuthorityCertificateResponse #

gmapMp :: MonadPlus m => (forall d. Data d => d -> m d) -> ImportCertificateAuthorityCertificateResponse -> m ImportCertificateAuthorityCertificateResponse #

gmapMo :: MonadPlus m => (forall d. Data d => d -> m d) -> ImportCertificateAuthorityCertificateResponse -> m ImportCertificateAuthorityCertificateResponse #

Read ImportCertificateAuthorityCertificateResponse Source # 
Show ImportCertificateAuthorityCertificateResponse Source # 
Generic ImportCertificateAuthorityCertificateResponse Source # 
NFData ImportCertificateAuthorityCertificateResponse Source # 
type Rep ImportCertificateAuthorityCertificateResponse Source # 
type Rep ImportCertificateAuthorityCertificateResponse = D1 * (MetaData "ImportCertificateAuthorityCertificateResponse" "Network.AWS.CertificateManagerPCA.ImportCertificateAuthorityCertificate" "amazonka-certificatemanager-pca-1.6.0-745TdprsK5d4KxFM63j3hX" False) (C1 * (MetaCons "ImportCertificateAuthorityCertificateResponse'" PrefixI False) (U1 *))