Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    primarykey
    data
    text
    <p><strong>PLEASE NOTE THE EDITS &amp; UPDATES BELOW</strong> <del>I am resurrecting this because Amazon is running a survey (as of this writing) which asks customers on feedback for their produce roadmap.</p> <p><s>See the post on this survey being available: <a href="https://forums.aws.amazon.com/thread.jspa?threadID=26488&amp;tstart=30" rel="nofollow noreferrer">https://forums.aws.amazon.com/thread.jspa?threadID=26488&amp;tstart=30</a></p> <p>and the direct survey link: <a href="http://aws.qualtrics.com/SE/?SID=SV_9yvAN5PK8abJIFK" rel="nofollow noreferrer">http://aws.qualtrics.com/SE/?SID=SV_9yvAN5PK8abJIFK</a></s></del></p> <p><strong><del>EDIT: Noticed a post from June 11, 2012 that AWS had updated the survey link:</del></strong></p> <p><del>See the post on this survey being available: <a href="https://forums.aws.amazon.com/thread.jspa?messageID=363869" rel="nofollow noreferrer">https://forums.aws.amazon.com/thread.jspa?messageID=363869</a></del></p> <p><del>New Survey Link: <a href="http://aws.qualtrics.com/SE/?SID=SV_e4eM1cRblPaccFS" rel="nofollow noreferrer">http://aws.qualtrics.com/SE/?SID=SV_e4eM1cRblPaccFS</a></del></p> <p><del>I think it is worth the time to provide them feedback about making CNAME + SSL a supported feature.</del></p> <p><strong>EDIT: Announced on June 11, 2013, <em>custom SSL Certs with dedicated IPs</em> are now supported with CloudFront on AWS:</strong></p> <p>See the feature announcement on the AWS Blog: <a href="http://aws.typepad.com/aws/2013/06/custom-ssl-domain-names-root-domain-hosting-for-amazon-cloudfront.html" rel="nofollow noreferrer">http://aws.typepad.com/aws/2013/06/custom-ssl-domain-names-root-domain-hosting-for-amazon-cloudfront.html</a></p> <p>One item of consideration before counting on going this route, you need to see significant value from deviating from the <a href="https://[distribution].cloudfront.net" rel="nofollow noreferrer">https://[distribution].cloudfront.net</a> route as the pricing is $600 USD per month for hosting custom SSL certs.</p> <p><strong>EDIT: Announced on March 5, 2014, <em>custom SSL Certs using Server Name Indication (SNI)</em> are now supported with CloudFront on AWS -- NO ADDITIONAL CHARGE:</strong></p> <p>As wikichen noted below, AWS now supports custom SSL Certs via SNI. This is HUGE as it opens the possibility of leveraging AWS' existing infrastructure (IP addresses). As such, AWS does not charge extra for this service! To learn more, read about it on the AWS blog post: <a href="http://aws.typepad.com/aws/2014/03/server-name-indication-sni-and-http-redirection-for-amazon-cloudfront.html" rel="nofollow noreferrer">http://aws.typepad.com/aws/2014/03/server-name-indication-sni-and-http-redirection-for-amazon-cloudfront.html</a></p> <p>One item that should be noted though, Server Name Indication (SNI) does have some drawbacks that should be considered before relying on it completely. In particular it is not supported by some older browsers. If want to understand this better, see: <a href="https://stackoverflow.com/questions/5154596/is-ssl-sni-actually-used-and-supported-in-browsers">Is SNI actually used and supported in browsers?</a></p> <p><strong>EDIT: AWS announced on January 21, 2016, they supply custom SSL Certs for FREE!</strong></p> <p>To read about the full announcement on the AWS site: <a href="https://aws.amazon.com/blogs/aws/new-aws-certificate-manager-deploy-ssltls-based-apps-on-aws/" rel="nofollow noreferrer">https://aws.amazon.com/blogs/aws/new-aws-certificate-manager-deploy-ssltls-based-apps-on-aws/</a></p> <p>Amazon has announced a new service called AWS Certificate Manager, offering free SSL/TLS certificates for AWS resources.</p> <p>These certificates are usually purchased from third-party certificate providers like Symantec, Comodo and RapidSSL and can cost anywhere from $50 to hundreds of dollars, depending on the level of identity verification performed.</p> <p>The process of obtaining a new certificate has always been a bit messy, requiring the generation of a Certificate Signing Request on the server being protected, sending that request to a certificate provider, and then installing the certificate once it is received. Since Amazon is managing the whole process, all of that goes away and certificates can be quickly issued and provisioned on AWS resources automatically.</p> <p>There are a few limitations to the certificates. Amazon only provides domain validated certificates, a simple verification where domain validation takes place via email. If you want an Extended Validation certificate, you may stick with their current certificate providers. In addition, the certificates cannot be used for code signing or email encryption.</p>
    singulars
    1. This table or related slice is empty.
    plurals
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. VO
      singulars
      1. This table or related slice is empty.
    2. VO
      singulars
      1. This table or related slice is empty.
    3. VO
      singulars
      1. This table or related slice is empty.
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload