Skip to content

ACM PCA

CloudMock emulates AWS Certificate Manager Private Certificate Authority (ACM PCA), supporting private CA lifecycle management, certificate issuance, revocation, and permissions.

OperationStatusNotes
CreateCertificateAuthoritySupportedCreates a private CA
DescribeCertificateAuthoritySupportedReturns CA details
ListCertificateAuthoritiesSupportedLists all private CAs
DeleteCertificateAuthoritySupportedDeletes a private CA
UpdateCertificateAuthoritySupportedUpdates CA configuration
IssueCertificateSupportedIssues a certificate from the CA
GetCertificateSupportedReturns an issued certificate
RevokeCertificateSupportedRevokes a certificate
GetCertificateAuthorityCsrSupportedReturns the CSR for a CA
TagCertificateAuthoritySupportedAdds tags to a CA
UntagCertificateAuthoritySupportedRemoves tags from a CA
ListTagsSupportedLists tags for a CA
CreatePermissionSupportedGrants permissions on a CA
ListPermissionsSupportedLists permissions for a CA
DeletePermissionSupportedRemoves permissions from a CA
import { ACMPCAClient, CreateCertificateAuthorityCommand } from '@aws-sdk/client-acm-pca';
const client = new ACMPCAClient({
endpoint: 'http://localhost:4566',
region: 'us-east-1',
credentials: { accessKeyId: 'test', secretAccessKey: 'test' },
});
const result = await client.send(new CreateCertificateAuthorityCommand({
CertificateAuthorityConfiguration: {
KeyAlgorithm: 'RSA_2048',
SigningAlgorithm: 'SHA256WITHRSA',
Subject: { CommonName: 'My Private CA' },
},
CertificateAuthorityType: 'ROOT',
}));
console.log(result.CertificateAuthorityArn);
import boto3
client = boto3.client('acm-pca',
endpoint_url='http://localhost:4566',
region_name='us-east-1',
aws_access_key_id='test',
aws_secret_access_key='test')
response = client.create_certificate_authority(
CertificateAuthorityConfiguration={
'KeyAlgorithm': 'RSA_2048',
'SigningAlgorithm': 'SHA256WITHRSA',
'Subject': {'CommonName': 'My Private CA'},
},
CertificateAuthorityType='ROOT')
print(response['CertificateAuthorityArn'])
cloudmock.yml
services:
acmpca:
enabled: true
  • PKI operations generate stub certificates rather than cryptographically valid ones
  • CSR generation returns placeholder data
  • Certificate revocation updates status but does not maintain a real CRL