Back to Integrations
integrationAWS Certificate Manager node
integrationSlack node

AWS Certificate Manager and Slack integration

Save yourself the work of writing custom integrations for AWS Certificate Manager and Slack and use n8n instead. Build adaptable and scalable Development, Communication, and HITL workflows that work with your technology stack. All within a building experience you will love.

How to connect AWS Certificate Manager and Slack

  • Step 1: Create a new workflow
  • Step 2: Add and configure nodes
  • Step 3: Connect
  • Step 4: Customize and extend your integration
  • Step 5: Test and activate your workflow

Step 1: Create a new workflow and add the first step

In n8n, click the "Add workflow" button in the Workflows tab to create a new workflow. Add the starting point – a trigger on when your workflow should run: an app event, a schedule, a webhook call, another workflow, an AI chat, or a manual trigger. Sometimes, the HTTP Request node might already serve as your starting point.

AWS Certificate Manager and Slack integration: Create a new workflow and add the first step

Step 2: Add and configure AWS Certificate Manager and Slack nodes

You can find AWS Certificate Manager and Slack in the nodes panel. Drag them onto your workflow canvas, selecting their actions. Click each node, choose a credential, and authenticate to grant n8n access. Configure AWS Certificate Manager and Slack nodes one by one: input data on the left, parameters in the middle, and output data on the right.

AWS Certificate Manager and Slack integration: Add and configure AWS Certificate Manager and Slack nodes

Step 3: Connect AWS Certificate Manager and Slack

A connection establishes a link between AWS Certificate Manager and Slack (or vice versa) to route data through the workflow. Data flows from the output of one node to the input of another. You can have single or multiple connections for each node.

AWS Certificate Manager and Slack integration: Connect AWS Certificate Manager and Slack

Step 4: Customize and extend your AWS Certificate Manager and Slack integration

Use n8n's core nodes such as If, Split Out, Merge, and others to transform and manipulate data. Write custom JavaScript or Python in the Code node and run it as a step in your workflow. Connect AWS Certificate Manager and Slack with any of n8n’s 1000+ integrations, and incorporate advanced AI logic into your workflows.

AWS Certificate Manager and Slack integration: Customize and extend your AWS Certificate Manager and Slack integration

Step 5: Test and activate your AWS Certificate Manager and Slack workflow

Save and run the workflow to see if everything works as expected. Based on your configuration, data should flow from AWS Certificate Manager to Slack or vice versa. Easily debug your workflow: you can check past executions to isolate and fix the mistake. Once you've tested everything, make sure to save your workflow and activate it.

AWS Certificate Manager and Slack integration: Test and activate your AWS Certificate Manager and Slack workflow

Generate SSL/TLS certificate expiry reports with AWS ACM and AI for Slack & email

Automated SSL/TLS Certificate Expiry Report for AWS

> Automatically generates a weekly report of all AWS ACM certificates, including status, expiry dates, and renewal eligibility. The workflow formats the data into both Markdown (for PDF export to Slack) and HTML (for email summary), helping teams stay on top of certificate compliance and expiration risks.

Who’s it for
This workflow is designed for DevOps engineers, cloud administrators, and compliance teams who manage AWS infrastructure and need automated weekly visibility into the status of their SSL/TLS certificates in AWS Certificate Manager (ACM). It's ideal for teams that want to reduce the risk of expired certs, track renewal eligibility, and maintain reporting for audit or operational purposes.

How it works / What it does
This n8n workflow performs the following actions on a weekly schedule:

Trigger: Automatically runs once a week using the Weekly schedule trigger.
Fetch Certificates: Uses Get many certificates action from AWS Certificate Manager to retrieve all certificate records.
Parse Data: Processes and reformats certificate data (dates, booleans, SANs, etc.) into a clean JSON object.
Generate Reports:
📄 Markdown Report: Uses the Certificate Summary Markdown Agent (OpenAI) to generate a Markdown report for PDF export.
🌐 HTML Report: Uses the Certificate Summary HTML Agent to generate a styled HTML report for email.
Deliver Reports:
Converts Markdown to PDF and sends it to Slack as a file.
Sends HTML content as a formatted email.

How to set up

Configure AWS Credentials in n8n to allow access to AWS ACM.
Create a new workflow and use the following nodes in sequence:
Schedule Trigger: Weekly (e.g., every Monday at 08:00 UTC)
AWS ACM → Get many certificates
Function Node → Parse ACM Data: Converts and summarizes certificate metadata
OpenAI Chat Node (Markdown Agent) with a system/user prompt to generate Markdown
Configure Metadata → Define file name and MIME type (.md)
Create document file → Converts Markdown to document stream
Convert to PDF
Slack Node → Upload the PDF to a channel
(Optional) Add a second OpenAI Chat Node for generating HTML and sending it via email

Connect Output:
Markdown report → Slack file upload
HTML report → Email node with embedded HTML

Requirements

🟩 n8n instance (self-hosted or cloud)
🟦 AWS account with access to ACM
🟨 OpenAI API key (for ChatGPT Agent)
🟥 Slack webhook or OAuth credentials (for file upload)
📧 Email integration (e.g., SMTP or SendGrid)
📝 Permissions to write documents (Google Drive / file node)

How to customize the workflow

Change report frequency**: Adjust the Weekly schedule trigger to daily or monthly as needed.
Filter certificates**:
Modify the function node to only include EXPIRED, IN_USE, or INELIGIBLE certs.
Add tags or domains to include/exclude.
Add visuals**: Enhance the HTML version with colored rows, icons, or company branding.
Change delivery channels**:
Replace Slack with Microsoft Teams, Discord, or Telegram.
Send Markdown as email attachment instead of PDF.
Integrate ticketing**:
Create a JIRA/GitHub issue for each certificate that is EXPIRED or INELIGIBLE.

Nodes used in this workflow

Popular AWS Certificate Manager and Slack workflows

+3

Generate SSL/TLS Certificate Expiry Reports with AWS ACM and AI for Slack & Email

Automated SSL/TLS Certificate Expiry Report for AWS > Automatically generates a weekly report of all AWS ACM certificates, including status, expiry dates, and renewal eligibility. The workflow formats the data into both Markdown (for PDF export to Slack) and HTML (for email summary), helping teams stay on top of certificate compliance and expiration risks. Who’s it for This workflow is designed for DevOps engineers, cloud administrators, and compliance teams who manage AWS infrastructure and need automated weekly visibility into the status of their SSL/TLS certificates in AWS Certificate Manager (ACM). It's ideal for teams that want to reduce the risk of expired certs, track renewal eligibility, and maintain reporting for audit or operational purposes. How it works / What it does This n8n workflow performs the following actions on a weekly schedule: Trigger: Automatically runs once a week using the Weekly schedule trigger. Fetch Certificates: Uses Get many certificates action from AWS Certificate Manager to retrieve all certificate records. Parse Data: Processes and reformats certificate data (dates, booleans, SANs, etc.) into a clean JSON object. Generate Reports: 📄 Markdown Report: Uses the Certificate Summary Markdown Agent (OpenAI) to generate a Markdown report for PDF export. 🌐 HTML Report: Uses the Certificate Summary HTML Agent to generate a styled HTML report for email. Deliver Reports: Converts Markdown to PDF and sends it to Slack as a file. Sends HTML content as a formatted email. How to set up Configure AWS Credentials in n8n to allow access to AWS ACM. Create a new workflow and use the following nodes in sequence: Schedule Trigger: Weekly (e.g., every Monday at 08:00 UTC) AWS ACM → Get many certificates Function Node → Parse ACM Data: Converts and summarizes certificate metadata OpenAI Chat Node (Markdown Agent) with a system/user prompt to generate Markdown Configure Metadata → Define file name and MIME type (.md) Create document file → Converts Markdown to document stream Convert to PDF Slack Node → Upload the PDF to a channel (Optional) Add a second OpenAI Chat Node for generating HTML and sending it via email Connect Output: Markdown report → Slack file upload HTML report → Email node with embedded HTML Requirements 🟩 n8n instance (self-hosted or cloud) 🟦 AWS account with access to ACM 🟨 OpenAI API key (for ChatGPT Agent) 🟥 Slack webhook or OAuth credentials (for file upload) 📧 Email integration (e.g., SMTP or SendGrid) 📝 Permissions to write documents (Google Drive / file node) How to customize the workflow Change report frequency**: Adjust the Weekly schedule trigger to daily or monthly as needed. Filter certificates**: Modify the function node to only include EXPIRED, IN_USE, or INELIGIBLE certs. Add tags or domains to include/exclude. Add visuals**: Enhance the HTML version with colored rows, icons, or company branding. Change delivery channels**: Replace Slack with Microsoft Teams, Discord, or Telegram. Send Markdown as email attachment instead of PDF. Integrate ticketing**: Create a JIRA/GitHub issue for each certificate that is EXPIRED or INELIGIBLE.

Auto-Renew AWS Certificates with Slack Approval Workflow

AWS Certificate Manager (ACM) Auto-Renew with Slack notify & approval Who’s it for SRE/DevOps teams managing many ACM certs. Cloud ops who want hands-off renewals with an approval step in Slack. MSPs that need auditable reminders and renewals on schedule. How it works / What it does Schedule Trigger – runs daily (or your cadence). Get many certificates – fetches ACM certs (paginate if needed). Filter: expiring in next 7 days – keeps items where: NotAfter before today + 7d NotBefore before today (already valid) Send message and wait for response (Slack) – posts a certificate summary and pauses until Approve/Reject. Renew a certificate – on Approve, calls the renew action for the item. How to set up Credentials AWS in n8n with permissions to list/read/renew certs. Slack OAuth (bot in the target channel). Schedule Trigger Set to run once per day (e.g., 09:00 local). Get many certificates Region: your ACM region(s). If you have several regions, loop regions or run multiple branches. Filter (IF / Filter node) Add these two conditions (AND): {{ $json.NotAfter.toDateTime('s') }} is before {{ $today.plus(7,'days') }} {{ $json.NotBefore.toDateTime('s') }} is before {{ $today }} Slack → Send & Wait Message (text input): :warning: ACM Certificate Expiry Alert :warning: Domain: {{ $json.DomainName }} SANs: {{ $json.SubjectAlternativeNameSummaries }} ARN: {{ $json.CertificateArn }} Algo: {{ $json.KeyAlgorithm }} Status: {{ $json.Status }} Issued: {{ $json.IssuedAt | toDate | formatDate("YYYY-MM-DD HH:mm") }} Expires: {{ $json.NotAfter | toDate | formatDate("YYYY-MM-DD HH:mm") }} Approve to start renewal. Add two buttons: Approve / Reject (the node will output which was clicked). Renew a certificate Map the CertificateArn from the Slack Approved branch. Requirements n8n (current version with Slack Send & Wait). AWS IAM permissions (read + renew ACM), e.g.: acm:ListCertificates, acm:DescribeCertificate, acm:RenewCertificate (plus region access). Slack bot with permission to post & use interactivity in the target channel. How to customize the workflow Window size:** change 7 to 14 or 30 days in the filter. Catch expired: add an OR path {{ $json.NotAfter.toDateTime('s') }} is before {{ $today }} → send a **red Slack alert. Auto-renew w/o approval:** bypass Slack and renew directly for low-risk domains. Multiple regions/accounts:** iterate over a list of regions or assume roles per account. Logging:** add a Google Sheet/DB append after Slack click with user, time, result. Escalation:** if no Slack response after N hours, ping @oncall or open a ticket. Notes The Slack node pauses execution until a button is clicked—perfect for change control. Time conversions above assume NotAfter/IssuedAt are Unix seconds ('s'). Adjust if your data differs.

Build your own AWS Certificate Manager and Slack integration

Create custom AWS Certificate Manager and Slack workflows by choosing triggers and actions. Nodes come with global operations and settings, as well as app-specific parameters that can be configured. You can also use the HTTP Request node to query data from any app or service with a REST API.

AWS Certificate Manager supported actions

Delete
Delete a certificate
Get
Get a certificate
Get Many
Get many certificates
Get Metadata
Get certificate metadata
Renew
Renew a certificate

Slack supported actions

Archive
Archives a conversation
Close
Closes a direct message or multi-person direct message
Create
Initiates a public or private channel-based conversation
Get
Get information about a channel
Get Many
Get many channels in a Slack team
History
Get a conversation's history of messages and events
Invite
Invite a user to a channel
Join
Joins an existing conversation
Kick
Removes a user from a channel
Leave
Leaves a conversation
Member
List members of a conversation
Open
Opens or resumes a direct message or multi-person direct message
Rename
Renames a conversation
Replies
Get a thread of messages posted to a channel
Set Purpose
Sets the purpose for a conversation
Set Topic
Sets the topic for a conversation
Unarchive
Unarchives a conversation
Get
Get Many
Get & filters team files
Upload
Create or upload an existing file
Delete
Get Permalink
Search
Send
Send and Wait for Response
Update
Add
Adds a reaction to a message
Get
Get the reactions of a message
Remove
Remove a reaction of a message
Add
Add a star to an item
Delete
Delete a star from an item
Get Many
Get many stars of autenticated user
Get
Get information about a user
Get Many
Get a list of many users
Get User's Profile
Get a user's profile
Get User's Status
Get online status of a user
Update User's Profile
Update a user's profile
Add Users
Create
Disable
Enable
Get Many
Get Users
Update

FAQs

  • Can AWS Certificate Manager connect with Slack?

  • Can I use AWS Certificate Manager’s API with n8n?

  • Can I use Slack’s API with n8n?

  • Is n8n secure for integrating AWS Certificate Manager and Slack?

  • How to get started with AWS Certificate Manager and Slack integration in n8n.io?

Need help setting up your AWS Certificate Manager and Slack integration?

Discover our latest community's recommendations and join the discussions about AWS Certificate Manager and Slack integration.
Nicolas N
Muhammed Iqbal P B
Nicolas N

Looking to integrate AWS Certificate Manager and Slack in your company?

Over 3000 companies switch to n8n every single week

Why use n8n to integrate AWS Certificate Manager with Slack

Build complex workflows, really fast

Build complex workflows, really fast

Handle branching, merging and iteration easily.
Pause your workflow to wait for external events.

Code when you need it, UI when you don't

Simple debugging

Your data is displayed alongside your settings, making edge cases easy to track down.

Use templates to get started fast

Use 1000+ workflow templates available from our core team and our community.

Reuse your work

Copy and paste, easily import and export workflows.

Implement complex processes faster with n8n

red iconyellow iconred iconyellow icon