How To Install SSL Certificate on AWS (Amazon Web Services)

2 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 5 (2 votes, average: 5.00 out of 5, rated)
Install SSL On AWS

This installation guide will help you learn the complete SSL certificate installation process on AWS in a step-by-step manner. Get a comprehensive and in-depth overview of how to install SSL certificates on AWS here. So, read till the end.

Nevertheless, the steps outlined in this SSL installation guide work in most instances. But it’s good to be prepared before you start with the installation. So, what do you need to install an SSL certificate on AWS? Check below.

Things You Need Before Installing an SSL Certificate on AWS

Before installing the SSL certificate on AWS, you’ll have to prepare and be ready with some files. Here is a checklist of all the things you need to get started with the installation procedure.

1. Server Certificate

You receive a server certificate on your email for your website domain from the CA. Also, you can download it from the Account Dashboard without any hassle.

2. Intermediate Certificate(s)

These certificate files enable your server-connected devices to find out the issuing CA. Also known as CA Bundle, you can find these files with the certificate you received in a ZIP folder. If not received, you can download it manually.

3. Private Key

If you used any free tool to generate your CSR, you should have this under your possession or on your server. It’s crucial to generate CSR and request an SSL certificate before installation. In the section below, we’ve outlined steps to generate CSR on AWS.

Generating CSR Code & Requesting SSL Certificate

At the time of requesting for an SSL certificate, you’ll be asked to generate and send a CSR to the Certificate Authority. Generating a CSR is crucial as it contains all your organization or website info along with the private key. One of the most simple and fastest ways to generate a CSR is using our free CSR generator tool.

Installation of SSL Certificate on AWS

Step 1: For AWS ACM (Amazon Certificate Manager)

To upload your certificate to AMC, run this command:

aws acm import-certificate
--certificate file://abc.crt
--private-key file://abc.key
--certificate-chain file://abc-bundle.crt

Simply interchange the ‘abc’ attribute with the real names of your files. Once uploaded successfully, an Amazon Resource Name (ARN) will be sent to you. This will allow you to handle and organize your SSL certificate seamlessly.

Step 2: For AWS IAM (Identity Access Manager)

To upload an SSL certificate on IAM, run this command:

aws iam upload-server-certificate
--server-certificate-name certificate-name
--certificate-body file://abc.crt
--certificate-chain file://abc-bundle.crt
--private-key file://abc.key

Simply replace the ‘abc’ with actual file names and interchange the bolded values with the following:

  • Certificate Body File Parameter: Here, replace and add the actual name of your main SSL certificate file.
  • Certificate Name: Here, use any easy-to-remember custom name. You can use any value linked with your SSL certificate or your domain name.
  • Certificate Chain File Parameter: Use the actual name of your CA bundle file.
  • Private Key File Parameter: Use your private key file name here.

Once you upload the cert successfully, the screen will display a server cert metadata comprising its name, ARN, ID, server path, upload and expiration date, and identifier.

Step 3: For ELB (Elastic Load Balancing)

If you’re reading this section, we assume that you have uploaded the certificate either in ACM or IAM. Now, you’re looking forward to updating or creating HTTPS listeners on the current application load balancers. To install the certificate in ELB, you’ll require ARN and the existing balancer’s ARN.

→ Classic Load Balancer

To generate an HTTP listener and allocate the SSL certificate to it, run this command:

aws elb create-load-balancer-listeners
--load-balancer-name my-load-balancer
--listeners “Protocol=HTTPS,LoadBalancerPort=443,InstanceProtocol=HTTP,InstancePort=80,SSLCertificateId=ARN”

The value of ARN is your SSL certificate’s ARN. However, it may happen that you already have an HTTPS listener. In that case, you’ll only have to update the certificate. Do so by running this command:

aws elb set
--load-balancer-name my-load-balancer
--load-balancer-port 443
--ssl-certificate-id NewARN

The new value of ARN is your new SSL certificate’s ARN (the cert you need to import).

→ Application Load Balancer

To generate an HTTP listener on the application load balancer, use this command:

aws elbv2 create-listener
--load-balancer-arn my-load-balancer-arn
--protocol HTTPS --port 443
--certificates CertificateArn=my-certificate-arn
--default-actions Type=forward,TargetGroupArn=my-target-group-arn

So, finalize the installation, and you’re done!

Testing Your AWS SSL Installation

To test the installation, perform a browser test. Browse your website domain’s HTTPS version and see if there’s any SSL padlock or not. To check your SSL certificate’s info, click on it. You can also use our diagnostic SSL Checker Tool to perform a more in-depth evaluation.

<?xml version="1.0" encoding="UTF-8"?><svg id="Layer_1" xmlns="" viewBox="0 0 109.7 29.02"><defs><style>.cls-1{fill:#fff;}</style></defs><path class="cls-1" d="m5.38,22.85c-3.1-.26-5.3-1.92-5.38-4.8h3.6c.1,1.1.67,1.85,1.78,2.09v-4.58c-2.47-.62-5.38-1.32-5.38-4.87,0-2.83,2.26-4.68,5.38-4.92v-1.94h1.54v1.94c3,.24,5.02,1.85,5.23,4.7h-3.62c-.1-.94-.67-1.66-1.61-1.94v4.54c2.5.65,5.42,1.3,5.42,4.85,0,2.45-1.92,4.73-5.42,4.97v1.94h-1.54v-1.97Zm0-10.25v-4.15c-1.1.17-1.87.84-1.87,2.06,0,1.13.77,1.7,1.87,2.09Zm1.54,3.38v4.2c1.22-.22,1.94-1.06,1.94-2.14s-.82-1.68-1.94-2.06Z"/><path class="cls-1" d="m17.62,8.33h-2.33v-3.1h5.78v17.5h-3.46v-14.4Z"/><path class="cls-1" d="m28.27,17.81c.26,1.39,1.15,2.18,2.71,2.18,1.97,0,2.83-1.46,2.83-5.4-.74,1.03-2.16,1.63-3.7,1.63-3.02,0-5.45-1.9-5.45-5.59,0-3.5,2.21-5.81,5.91-5.81,4.75,0,6.22,3.22,6.22,8.76,0,5.95-1.32,9.17-5.95,9.17-3.72,0-5.5-2.38-5.69-4.94h3.12Zm5.23-7.15c0-1.92-1.1-2.98-2.81-2.98s-2.81,1.18-2.81,2.93c0,1.58.89,2.88,2.93,2.88,1.68,0,2.69-1.13,2.69-2.83Z"/><path class="cls-1" d="m41.28,22.9c-1.22,0-2.09-.86-2.09-1.97s.86-1.97,2.09-1.97,2.04.86,2.04,1.97-.86,1.97-2.04,1.97Z"/><path class="cls-1" d="m49.54,17.81c.26,1.39,1.15,2.18,2.71,2.18,1.97,0,2.83-1.46,2.83-5.4-.74,1.03-2.16,1.63-3.7,1.63-3.02,0-5.45-1.9-5.45-5.59,0-3.5,2.21-5.81,5.91-5.81,4.75,0,6.22,3.22,6.22,8.76,0,5.95-1.32,9.17-5.95,9.17-3.72,0-5.5-2.38-5.69-4.94h3.12Zm5.23-7.15c0-1.92-1.1-2.98-2.81-2.98s-2.81,1.18-2.81,2.93c0,1.58.89,2.88,2.93,2.88,1.68,0,2.69-1.13,2.69-2.83Z"/><path class="cls-1" d="m64.56,17.81c.26,1.39,1.15,2.18,2.71,2.18,1.97,0,2.83-1.46,2.83-5.4-.74,1.03-2.16,1.63-3.7,1.63-3.02,0-5.45-1.9-5.45-5.59,0-3.5,2.21-5.81,5.9-5.81,4.75,0,6.22,3.22,6.22,8.76,0,5.95-1.32,9.17-5.95,9.17-3.72,0-5.5-2.38-5.69-4.94h3.12Zm5.23-7.15c0-1.92-1.1-2.98-2.81-2.98s-2.81,1.18-2.81,2.93c0,1.58.89,2.88,2.93,2.88,1.68,0,2.69-1.13,2.69-2.83Z"/><path class="cls-1" d="m81.79,0h3.29l-6.48,27.07h-3.29L81.79,0Z"/><path class="cls-1" d="m96.89,9.43h3.58l-8.23,19.59h-3.58l2.88-6.62-5.33-12.96h3.77l3.43,9.29,3.48-9.29Z"/><path class="cls-1" d="m105.62,22.73h-3.36v-13.3h3.36v2.06c.84-1.37,2.23-2.26,4.08-2.26v3.53h-.89c-1.99,0-3.19.77-3.19,3.34v6.62Z"/></svg>