Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

Customer managed policies

Focus mode
Customer managed policies - AWS Private Certificate Authority

As a best practice, don't use your AWS account root user to interact with AWS, including AWS Private CA. Instead use AWS Identity and Access Management (IAM) to create an IAM user, IAM role, or federated user. Create an administrator group and add yourself to it. Then log in as an administrator. Add additional users to the group as needed.

Another best practice is to create a customer managed IAM policy that you can assign to users. Customer managed policies are standalone identity-based policies that you create and which you can attach to multiple users, groups, or roles in your AWS account. Such a policy restricts users to performing only the AWS Private CA actions that you specify.

The following example customer-managed policy allows a user to create a CA audit report. This is an example only. You can choose any AWS Private CA operations that you want. For more examples, see Inline policies.

To create a customer managed policy
  1. Sign in to the IAM console using the credentials of an AWS administrator.

  2. In the navigation pane of the console, choose Policies.

  3. Choose Create policy.

  4. Choose the JSON tab.

  5. Copy the following policy and paste it into the editor.

    { "Version":"2012-10-17", "Statement":[ { "Effect":"Allow", "Action":"acm-pca:CreateCertificateAuthorityAuditReport", "Resource":"*" } ] }
  6. Choose Review policy.

  7. For Name, type PcaListPolicy.

  8. (Optional) Type a description.

  9. Choose Create policy.

An administrator can attach the policy to any IAM user to limit what AWS Private CA actions the user can perform. For ways to apply a permissions policy, see Changing Permissions for an IAM User in the IAM User Guide.

PrivacySite termsCookie preferences
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.