diff --git a/docs/cspell.json b/docs/cspell.json
index 2ddaa56e1657d..9f6451175d5ed 100644
--- a/docs/cspell.json
+++ b/docs/cspell.json
@@ -73,6 +73,7 @@
"Goland",
"Grafana's",
"Gtczk",
+ "highavailabilitycertmanageraddcommonname",
"HKEY",
"HSTS",
"Hqlo",
@@ -145,6 +146,7 @@
"Pbbd",
"Pluggable",
"Println",
+ "privateca",
"Quickstart",
"Quicktime's",
"REDISCLI",
@@ -184,6 +186,7 @@
"Tatham",
"Tele",
"Templating",
+ "tlsexistingcasecretname",
"Tmkx",
"Toboth",
"Traefik",
diff --git a/docs/pages/deploy-a-cluster/helm-deployments/aws.mdx b/docs/pages/deploy-a-cluster/helm-deployments/aws.mdx
index e35031fed3946..2070db4e944ef 100644
--- a/docs/pages/deploy-a-cluster/helm-deployments/aws.mdx
+++ b/docs/pages/deploy-a-cluster/helm-deployments/aws.mdx
@@ -82,6 +82,9 @@ these options:
You can use `cert-manager` to provision and automatically renew TLS credentials
by completing ACME challenges via Let's Encrypt.
+You can also use `cert-manager` with AWS Private Certificate Authority (PCA) in EKS using the
+`aws-privateca-issuer` plugin.
+
This method uses a Kubernetes `LoadBalancer`, which will provision an underlying AWS Network Load
Balancer (NLB) to handle incoming traffic.
@@ -330,6 +333,15 @@ highAvailability:
podSecurityPolicy:
enabled: false
```
+
+If using an AWS PCA with cert-manager, you will need to
+[ensure you set](../../reference/helm-reference/teleport-cluster.mdx#highavailabilitycertmanageraddcommonname)
+`highAvailability.certManager.addCommonName: true` in your values file. You will also need to get the certificate authority
+certificate for the CA (`aws acm-pca get-certificate-authority-certificate --certificate-authority-arn `),
+upload the full certificate chain to a secret, and
+[reference the secret](../../reference/helm-reference/teleport-cluster.mdx#tlsexistingcasecretname)
+with `tls.existingCASecretName` in the values file.
+
```yaml
@@ -411,6 +423,15 @@ enterprise: true # Indicate that this is a Tele
podSecurityPolicy:
enabled: false
```
+
+If using an AWS PCA with cert-manager, you will need to
+[ensure you set](../../reference/helm-reference/teleport-cluster.mdx#highavailabilitycertmanageraddcommonname)
+`highAvailability.certManager.addCommonName: true` in your values file. You will also need to get the certificate authority
+certificate for the CA (`aws acm-pca get-certificate-authority-certificate --certificate-authority-arn `),
+upload the full certificate chain to a secret, and
+[reference the secret](../../reference/helm-reference/teleport-cluster.mdx#tlsexistingcasecretname)
+with `tls.existingCASecretName` in the values file.
+
```yaml