Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

CreateCertificateAuthorityRequest

import type { CreateCertificateAuthorityRequest } from "https://aws-api.deno.dev/v0.3/services/acmpca.ts?docs=full";
interface CreateCertificateAuthorityRequest {
CertificateAuthorityConfiguration: CertificateAuthorityConfiguration;
CertificateAuthorityType: CertificateAuthorityType;
IdempotencyToken?: string | null;
KeyStorageSecurityStandard?: KeyStorageSecurityStandard | null;
RevocationConfiguration?: RevocationConfiguration | null;
Tags?: Tag[] | null;
}

§Properties

§
CertificateAuthorityConfiguration: CertificateAuthorityConfiguration
[src]

Name and bit size of the private key algorithm, the name of the signing algorithm, and X.500 certificate subject information.

§
CertificateAuthorityType: CertificateAuthorityType
[src]

The type of the certificate authority.

§
IdempotencyToken?: string | null
[src]

Custom string that can be used to distinguish between calls to the CreateCertificateAuthority action. Idempotency tokens for CreateCertificateAuthority time out after five minutes. Therefore, if you call CreateCertificateAuthority multiple times with the same idempotency token within five minutes, ACM Private CA recognizes that you are requesting only certificate authority and will issue only one. If you change the idempotency token for each call, PCA recognizes that you are requesting multiple certificate authorities.

§
KeyStorageSecurityStandard?: KeyStorageSecurityStandard | null
[src]

Specifies a cryptographic key management compliance standard used for handling CA keys.

Default: FIPS_140_2_LEVEL_3_OR_HIGHER

Note: FIPS_140_2_LEVEL_3_OR_HIGHER is not supported in Region ap-northeast-3. When creating a CA in the ap-northeast-3, you must provide FIPS_140_2_LEVEL_2_OR_HIGHER as the argument for KeyStorageSecurityStandard. Failure to do this results in an InvalidArgsException with the message, "A certificate authority cannot be created in this region with the specified security standard."

§
RevocationConfiguration?: RevocationConfiguration | null
[src]

Contains information to enable Online Certificate Status Protocol (OCSP) support, to enable a certificate revocation list (CRL), to enable both, or to enable neither. The default is for both certificate validation mechanisms to be disabled. For more information, see the OcspConfiguration and CrlConfiguration types.

§
Tags?: Tag[] | null
[src]

Key-value pairs that will be attached to the new private CA. You can associate up to 50 tags with a private CA. For information using tags with IAM to manage permissions, see Controlling Access Using IAM Tags.