Digital Certificates

You need a TLS certificate to transfer data over HTTPS. Using the HTTPS protocol with a certificate ensures that your customers’ data is securely transferred over the Internet, demonstrates the reliability of your website and the authenticity of your domain, and improves your website’s position in search engines like Google.

At Azion, you can rely on the following TLS certificate options for HTTPS traffic:

  • Azion SAN: register your domain as a Subject Alternate Name (SAN) under Azion’s certificate.
  • Custom certificate: add your personal TLS certificate obtained from a Certificate Authority (CA) or a Trusted CA.
  • Let’s Encrypt certificate: request the issuance of a Let’s Encrypt™ certificate managed automatically by Azion.
go to acquire and register a digital certificate guide

You can also issue a Certificate Signing Request (CSR) via Azion to request a certificate from a CA.

Azion also supports Certificate Revocation List (CRL) via Azion API.

ScopeResource
About DomainsDomains
About mTLSmTLS

When using Azion Edge Application, our TLS certificate for HTTPS traffic is available at no additional cost. When you create a domain for an edge application in Azion Console, your application is assigned an address in the azionedge.net zone.

If you wish, you may use the assigned domain to deliver your static content over HTTPS, avoiding the costs of issuing TLS certificates for approval environments or URLs whose domain can be shared with other Azion customers. This way, your domain will be registered as a Subject Alternative Name (SAN) under Azion’s TLS certificate.


If you want to use a custom domain, you can add your own TLS certificate (X.509) and private key encoded in ASCII PEM format to Azion Console at no additional cost. The private key can’t be protected by passphrase.

When a certificate is added, a chain validation will occur and Azion will complete the registration with the full certificate chain. If necessary, it’s possible to inform the full chain while adding the certificate.

When you bring your certificate to Azion, domains that use the certificate use the Server Name Indication (SNI) extension of the TLS protocol is used. Check the browser list with SNI support.

There are three types of validations that you can choose:

Domain Validation (DV)Organization Validation (OV)Extended Validation (EV)
Validates your right to use the domain and it’s the simplest of the three options. This is the option recommended by Azion for most companies.Validates your right to use the domain and some further validations about the requesting organization.It’s an extended validation, which requires additional documentation to prove the physical, legal, and operational existence of the requesting organization and the most complex of the three options.

Azion currently works with two types of certificates: RSA and ECC/ECDSA. Each certificate has its characteristics and its security level, and Azion allows you to choose the option that best fits your scenario.

Rivest-Shamir-Adleman (RSA) is one of the earliest public key cryptography systems and it is widely used for the secure transmission of data. In this encryption system, the encryption key is public and is different from the decryption key that is secret (private). Any message encrypted using a public key can only be decrypted using the respective private key.

RSA is a relatively slow algorithm and is therefore less used to directly encrypt user data. Most often, RSA passes shared encrypted keys to symmetric key encryption, which in turn can perform mass encryption-decryption operations at a much faster rate.

Elliptical Curve Cryptography (ECC), specifically Elliptic Curve Digital Signature Algorithm (ECDSA) for digital certificate encryption, is an approach to public key cryptography based on the algebraic structure of elliptical curves. Public key cryptography is based on creating mathematical puzzles that are difficult to solve, therefore it becomes much more secure than other types of certificates such as RSA.

Smaller keys are less computationally intensive to generate signatures because they involve smaller mathematical numbers. ECC is faster in generating signatures and has better performance than RSA.

A Trusted CA is an entity that is authorized to issue digital certificates that can be used for the Mutual Transport Layer Security (mTLS) security protocol. You may upload Trusted CA certificates and intermediate certificates.


Let’s Encrypt™ is a nonprofit global CA that allows people and organizations to obtain, renew, and manage TLS certificates for free. When creating a Domain with Azion, you may choose to obtain a TLS certificate signed by Let’s Encrypt. You can request Let’s Encrypt certificates for domains hosted in Edge DNS or in a third-party DNS provider.

Once you create a domain with Azion, you can choose the option Let’s Encrypt to automatically generate a Let’s Encrypt certificate. An entry for this certificate will be listed in the Digital Certificates page in Azion Console. After the certificate undergoes DNS validation, issuance, and storage, it’ll become active.

See How to generate a Let’s Encrypt for your domain to know how to validate this type of certificate.

Active Let’s Encrypt certificates will be renewed automatically before the expiration date of 90 days, provided that you don’t bind a custom certificate to the domain or delete the associated domain. Certificates that were unbound from a domain can be rebound if they remain valid.

go to add TXT record for Let's Encrypt certificate guide

When you create a domain with Azion Domains and select the Let’s Encrypt certificate option, you can list the CNAMEs that’ll be bound to the certificate. CNAMEs listed after a top-level domain are registered as Subject Alternative Names (SAN).

When you modify the CNAME list on the domain settings, Azion will create a new certificate based on the modified set of CNAMEs, and the old entry won’t be renewed by the certificate manager.

If any of the CNAMEs hosted in external providers fail the DNS-01 challenge, the certificate won’t be generated and will remain with the Pending status.

You can use wildcard CNAMEs (*.domain.com) or mix wildcard and non-wildcard CNAMEs in the same Domain. However, when using the wildcard notation, you don’t have to specify subdomains that are already covered by the wildcard. For instance, if you decide that the certificate should be applied to *.domain.com, you don’t need to include blog.domain.com in the CNAME list.

The hostname resolution follows Azion’s standard rules: specific domains have precedence over wildcard ones. For example, a Let’s Encrypt certificate for a Domain blog.domain.com will take precedence over another certificate for the Domain *.domain.com.


A Certificate Signing Request (CSR) is one of the first steps towards getting your own TLS certificate. You may submit a CSA to a CA to receive your certificate.

You’ll need to inform:

  • CNAME: the main domain for the certificate. Must be in FQDN format; for example: yourdomain.com.
  • Country/region: the country or region of your organization. Must be in ISO 3166 format.
  • State/province: the state or province of your organization.
  • City/locality: the city or locality of your organization.
  • Organization: the name of your organization.
  • Organizational unit: the person, department, or unit responsible for the certificate.
  • Email: the email of the unit responsible for the certificate.
  • Private Key Type: the type of private key desired.
  • Subject Alternate Names (SAN): a list of other CNAMEs to be registered as alternate names.

For customers with contracted FIPS 140 support, the private key will be stored in an HSM that uses a cryptographic module certified in the FIPS-140 Level 3 standard.


Certificate Revocation List (CRL)

Section titled Certificate Revocation List (CRL)

A Certificate Revocation List (CRL) is a list of digital certificates revoked before their expiration date. It works as a block list that you can add to your account to state those certificates can’t be trusted. The issuing certificate authority (CA) signs this list to guarantee its security.

The CRL works when associated with an mTLS CA Certificate. Therefore, you must have mTLS enabled in the domain you want to associate it with.

The CRL is automatically validated before the creation is successful in the Azion Edge Computing Platform. The management, including creation, of a CRL is available via Azion API.

If you want to add multiple CRLs, you must make one POST request for each CRL.

Also note that the raw_crl field in the POST request is a string. In a request in JSON format, JSON strings require an escape (\n) to break lines. Make sure you add an escape to represent each line in your JSON.

create CRL via API

You can associate one or more CRLs with a domain via API.


Let’s Encrypt is a trademark of Internet Security Research Group. All rights reserved.


Contributors