Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Certificate Manager
  • Getting started
    • All guides
      • Adding a certificate
      • Getting the contents of a certificate
      • Passing a domain rights check
      • Renewing a certificate
      • Editing a certificate
      • Deleting a certificate
    • Backups
    • Adding an alert for a certificate
    • Configuring access permissions for a certificate
    • Viewing operations with a certificate
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Release notes
  • FAQ
  1. Step-by-step guides
  2. Let's Encrypt certificate
  3. Getting the contents of a certificate

Getting the contents of a Let's Encrypt certificate

Written by
Yandex Cloud
Updated at April 30, 2026

You can save a certificate chain and a private key to use for your own purposes, e.g., when configuring a web server on a VM.

To get the contents of a certificate:

Management console
CLI
Terraform
API
  1. In the management console, select the folder with your certificate.

  2. Navigate to Certificate Manager.

  3. In the row with the certificate, click and select Export certificate.

    You can only export certificates with the Issued status.

  4. Select one of the export options. The certificate.pem file will contain the following data in Base64 encoded text format:

    • End-entity certificate and chain: Certificate chain (root and end-user certificates) and private key with standard framing:

      -----BEGIN CERTIFICATE-----
      MIIE5zCCA8+gAwI...
      -----END CERTIFICATE-----
      -----BEGIN CERTIFICATE-----
      MIIFFjCCAv6gAwIBAg...
      -----END CERTIFICATE-----
      -----BEGIN PRIVATE KEY-----
      MIIEvgIBADANBgk...
      -----END PRIVATE KEY-----
      
    • Certificate without private key: Certificate chain (root and end-user certificates):

       -----BEGIN CERTIFICATE-----
       MIIE5zCCA8+gAwI...
       -----END CERTIFICATE-----
       -----BEGIN CERTIFICATE-----
       MIIFFjCCAv6gAwIBAg...
       -----END CERTIFICATE-----
      
    • End-entity certificate:

      -----BEGIN CERTIFICATE-----
      MIIFFjCCAv6gAwIBAg...
      -----END CERTIFICATE-----`
      
    • Private key only:

      -----BEGIN PRIVATE KEY-----
      MIIEvgIBADANBgk...
      -----END PRIVATE KEY-----`
      
  5. Click Download certificate.

The command will display a certificate chain and a private key and save their contents to the --chain and --key files, respectively.

  • --id: Certificate ID; make sure you set either the --id or --name flag.
  • --name: Certificate name; make sure you set either the --id or --name flag.
  • --chain: File to save the certificate chain to, in PEM format. This is an optional flag.
  • --key: File to save the private key to, in PEM format. This is an optional flag.
yc certificate-manager certificate content \
  --id fpqcsmn76v82******** \
  --chain certificate_full_chain.pem \
  --key private_key.pem

With Terraform, you can quickly create a cloud infrastructure in Yandex Cloud and manage it using configuration files. These files store the infrastructure description written in HashiCorp Configuration Language (HCL). If you change the configuration files, Terraform automatically detects which part of your configuration is already deployed, and what should be added or removed.

Terraform is distributed under the Business Source License. The Yandex Cloud provider for Terraform is distributed under the MPL-2.0 license.

For more information about the provider resources, see the relevant documentation on the Terraform website or its mirror.

If you do not have Terraform yet, install it and configure the Yandex Cloud provider.

To get the contents of a custom certificate using Terraform:

  1. In the Terraform configuration file, describe the resources you want to create:

    data "yandex_cm_certificate_content" "cert_by_id" {
      certificate_id = "<certificate_ID>"
    }
    
    output "certificate_chain" {
      value = data.yandex_cm_certificate_content.cert_by_id.certificates
    }
    
    output "certificate_key" {
      value     = data.yandex_cm_certificate_content.cert_by_id.private_key
      sensitive = true
    }
    

    Where:

    • data "yandex_cm_certificate_content": Description of the data source for the certificate contents:
      • certificate_id: Certificate ID.
    • output sections: certificate_chain output variables with the certificate chain and the certificate_key private key:
      • value: Return value.
      • sensitive: Label data as sensitive.

    For more information about the yandex_cm_certificate_content data source properties, see this provider guide.

  2. Create the resources:

    1. In the terminal, navigate to the configuration file directory.

    2. Make sure the configuration is correct using this command:

      terraform validate
      

      If the configuration is valid, you will get this message:

      Success! The configuration is valid.
      
    3. Run this command:

      terraform plan
      

      You will see a list of resources and their properties. No changes will be made at this step. Terraform will show any errors in the configuration.

    4. Apply the configuration changes:

      terraform apply
      
    5. Type yes and press Enter to confirm the changes.

    Terraform will create all the required resources. To check the results, run these commands:

    • Get the certificate chain:

      terraform output certificate_chain
      
    • Get the private key value:

      terraform output -raw certificate_key
      

To get the certificate contents, use the get REST API method for the CertificateContent resource or the CertificateContentService/Get gRPC API call.

For Let's Encrypt certificates, the exported chain contains your domain's end-user certificate and intermediate certificate. The root certificate is not included because it is already built into the trusted stores of operating systems and browsers. This chain is sufficient to configure web servers, such as Nginx or Apache. If you need the full chain with the root certificate, you can download it from the Let's Encrypt website.

Note

To read the certificate contents, assign the certificate-manager.certificates.downloader role to the service account.

Was the article helpful?

Previous
Adding a certificate
Next
Passing a domain rights check
© 2026 Direct Cursus Technology L.L.C.