Build Certificate Manager configurations with managed certificates, DNS authorizations, and certificate maps.
Last verified: May 2026
Build Certificate Manager configurations with managed certificates, DNS authorizations, and certificate map entries.
Required Fields
namemanaged.domainsscopeOutput will appear here...Build Certificate Manager configurations with managed certificates, DNS authorizations, and certificate maps. This tool helps GCP engineers generate valid configurations quickly without consulting documentation, reducing errors and accelerating infrastructure deployment. All processing runs in your browser with no data sent to external servers.
Your team is hosting 30 customer subdomains on a single global load balancer (multi-tenant SaaS). Without Certificate Manager, you'd manage 30 cert renewals manually — guaranteed to expire something eventually. The builder generates: 30 Google-managed certificates with DNS authorizations, a certificate map with 30 entries mapping each domain to its cert, single load balancer reference. Auto-renewal happens automatically; cert expiration incidents become impossible. Operational burden drops to zero.
Google-managed certificates are FREE and auto-renew. Use them for any HTTPS endpoint where Google can validate domain ownership via DNS authorization. The DNS authorization model is more flexible than HTTP-01 challenges — you can validate domains pointing to other clouds or CDNs.
Self-managed certificates are the right answer for cases where Google-managed doesn't work: certificates from a specific CA (e.g., your enterprise PKI), wildcard certs requiring specific signing, or certs needing specific extensions. Upload via Certificate Manager API and manage rotation yourself.
Certificate maps tie certificates to load balancer endpoints. A single certificate map can hold dozens of certificates for different domains; the load balancer presents the right cert based on SNI. This eliminates the per-load-balancer cert config complexity in multi-domain setups.
The builder constructs Certificate Manager configurations: certificate resource (managed type with DNS authorization OR self-managed type with PEM cert + private key), DNS authorization resource (links domain to validation), certificate map (groups certs for SNI-based selection at load balancer), and certificate map entries (domain → certificate bindings). Output is generated as gcloud certificate-manager commands and Terraform google_certificate_manager_certificate + google_certificate_manager_certificate_map resources.
Was this tool helpful?
Disclaimer: This tool runs entirely in your browser. No data is sent to our servers. Always verify outputs before using them in production. AWS, Azure, and GCP are trademarks of their respective owners.