Prerequisites
Before setting up AWS PCA integration, ensure you have:- An AWS account with AWS Private CA service access
- An AWS Private CA in ACTIVE status
- An AWS App Connection configured in Infisical with the required IAM permissions (see below)
IAM Permissions
Your AWS connection’s IAM role or user needs the following permissions on your Private CA resource(s):acm-pca:DescribeCertificateAuthorityacm-pca:GetCertificateAuthorityCertificateacm-pca:IssueCertificateacm-pca:GetCertificateacm-pca:RevokeCertificate
Resource to that CA’s ARN:
Resource array:
Using a specific CA ARN in
Resource is recommended over "*" to follow the principle of least privilege.Complete Workflow: From Setup to Certificate Issuance
Copy Your AWS PCA ARN
In the AWS Console, navigate to AWS Private CA and select your certificate authority. Copy the ARN from the CA details page.

Navigate to External Certificate Authorities
In your Infisical project, go to Certificate Authorities and scroll to the External Certificate Authorities section.

Create New AWS PCA Certificate Authority
Click Create CA and configure:
- CA Type: Choose AWS Private CA (PCA)
- Name: A slug name for this CA — lowercase letters, numbers, and hyphens only (e.g., “production-aws-pca”)
- AWS Connection: Select your AWS connection from the dropdown
- Certificate Authority ARN: Paste the ARN copied from the previous step
-
Region: Select the AWS region where your PCA is hosted
Troubleshooting
CA Not in ACTIVE Status- AWS PCA must be in the ACTIVE state before Infisical can issue certificates. Verify the status in the AWS Console under AWS Private CA.
- Ensure your AWS connection’s IAM role or user has the required
acm-pca:*permissions scoped to the correct CA ARN. See the IAM Permissions section above.
- Double-check the ARN format:
arn:aws:acm-pca:<region>:<account-id>:certificate-authority/<ca-id>.
