To resolve this issue, suggest selecting 'use my domain' instead of 'use Trend Micro domain'. Refer to the following configuration:
- Use AWS Route 53 to apply a new customized domain, like 1st-app.sase-ztna-qa-testing.com.
- Add Zero Trust Secure Access (Private Access) CNAME int-test.edge.int.ztna.trendmicro.com to the AWS Route 53 domain record. Zero Trust Secure Access (Private Access) CNAME can be obtained here:
- Configure a new S3 bucket, the name of which should be equal to the customized domain, like 1st-app.sase-ztna-qa-testing.com.
- Enable Static Website Hosting function. Write down its FQDN, like "1st-app.sase-ztna-qa-testing.com.s3-website-us-west-2.amazonaws.com".
- Add ACL to only permit Private Access Connector's Global IP.
- Complete the Zero Trust Secure Access Internal Application (browser access type).
- Protocol: HTTP
- External domain type: use my domain
- External domain: 1st-app.sase-ztna-qa-testing.com
- Internal domain: 1st-app.sase-ztna-qa-testing.com.s3-website-us-west-2.amazonaws.com
- Internal port: 80
- Verify browser access.
If you still prefer to use 'Trend Micro' domain, refer to the following workaround:
- When creating the bucket, make its name the same as the External URL filled in.
- In the case mentioned on the article, just create a bucket called "mywebapp-trendbr.edge.us.ztna.trendmicro.com".
- When searching for bucket name, AWS will find it as it will have the same name as the HTTP Hostname.