Skip to content

Commit ec03453

Browse files
committed
unsign finished
1 parent a75cb1c commit ec03453

File tree

5 files changed

+44
-6
lines changed

5 files changed

+44
-6
lines changed

articles/dns/dnssec-unsign.md

Lines changed: 42 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,22 +32,60 @@ To unsign a zone using the Azure portal:
3232
2. Select your DNS zone, and then from the zone's **Overview** page, select **DNSSEC**. You can select **DNSSEC** from the menu at the top, or under **DNS Management**.
3333
3. If you have successfully removed the DS record at your registrar for this zone, you see that the DNSSEC status is **Signed but not delegated**. Do not proceed until you see this status.
3434

35+
![Screenshot of confirming to disable DNSSEC.](./media/dnssec-how-to/ds-removed.png)
36+
37+
4. Clear the **Enable DNSSEC** checkbox and select **OK** in the popup dialog box confirming that you wish to disable DNSSEC.
38+
39+
![Screenshot of DNSSEC status.](./media/dnssec-how-to/disable-dnssec.png)
40+
41+
5. In the **Disable DNSSEC** pane, type the name of your domain and then select **Disable**.
42+
43+
![Screenshot of the disable DNSSEC pane.](./media/dnssec-how-to/disable-pane.png)
44+
45+
6. The domain is now successfully unsigned.
46+
3547
## [Azure CLI](#tab/sign-cli)
3648

37-
Sign a zone using the Azure CLI:
49+
Unsign a DNSSEC-signed zone using the Azure CLI:
50+
51+
1. To unsign a signed zone, issue the following commands. Replace the values for resource group and zone name with your resource group and zone name.
3852

3953
```azurepowershell-interactive
40-
commands here
54+
# Ensure you are logged in to your Azure account
55+
az login
56+
57+
# Select the appropriate subscription
58+
az account set --subscription "your-subscription-id"
59+
60+
# Disable DNSSEC for the DNS zone
61+
az network dns dnssec-config delete --resource-group "your-resource-group" --zone-name "adatum.com"
62+
63+
# Verify the DNSSEC configuration has been removed
64+
az network dns dnssec-config show --resource-group "your-resource-group" --zone-name "adatum.com"
4165
```
4266

67+
2. Confirm that **(NotFound) DNSSEC is not enabled for DNS zone 'adatum.com'** is displayed after the last command. The zone is now unsigned.
68+
4369
## [PowerShell](#tab/sign-powershell)
4470

45-
Sign a zone using PowerShell:
71+
1. Unsign and a zone and view the zone status using PowerShell:
4672

4773
```PowerShell
48-
commands here
74+
# Connect to your Azure account (if not already connected)
75+
Connect-AzAccount
76+
77+
# Select the appropriate subscription
78+
Select-AzSubscription -SubscriptionId "your-subscription-id"
79+
80+
# Disable DNSSEC for the DNS zone
81+
Remove-AzDnsDnssecConfig -ResourceGroupName "your-resource-group" -ZoneName "adatum.com"
82+
83+
# View the DNSSEC configuration
84+
Get-AzDnsDnssecConfig -ResourceGroupName "your-resource-group" -ZoneName "adatum.com"
4985
```
5086

87+
2. Confirm that DNSSEC is not enabled for DNS zone 'adatum.com' is displayed after the last command. The zone is now unsigned.
88+
5189
## Next steps
5290

5391
- Learn how to [sign a DNS zone with DNSSEC](dnssec-how-to.md).

articles/dns/dnssec.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.author: greglin
1111

1212
# DNSSEC overview (Preview)
1313

14-
This article provides a overview of Domain Name System Security Extensions (DNSSEC) and includes an introduction to [DNSSEC terminology](#dnssec-terminology). Benefits of DNSSEC zone signing are described and examples are provided for viewing DNSSEC related resource records. When you are ready to sign your Azure public DNS zone, see the following how-to guides:
14+
This article provides an overview of Domain Name System Security Extensions (DNSSEC) and includes an introduction to [DNSSEC terminology](#dnssec-terminology). Benefits of DNSSEC zone signing are described and examples are provided for viewing DNSSEC related resource records. When you are ready to sign your Azure public DNS zone, see the following how-to guides:
1515

1616
- [How to sign your Azure Public DNS zone with DNSSEC (Preview)](dnssec-how-to.md).
1717
- [How to unsign your Azure Public DNS zone (Preview)](dnssec-unsign.md)
@@ -99,7 +99,7 @@ The DNSSEC validation process works with trust anchors as follows:
9999

100100
### Authoritative servers
101101

102-
Authoritative DNS servers maintain a chain of trust through the use of delegation signer (DS) records. DS records are used to verify the authenticity of child zones zone in the DNS hierarchy.
102+
Authoritative DNS servers maintain a chain of trust through the use of delegation signer (DS) records. DS records are used to verify the authenticity of child zones in the DNS hierarchy.
103103
- In order for DNSSEC validation to occur on a signed zone, the parent of the signed zone must also be signed. The parent zone also must have a DS record for the child zone.
104104
- During the validation process, a zone's parent is queried for the DS record. If the DS record is not present, or the DS record data in the parent does not match the DNSKEY data in the child zone, the chain of trust is broken and validation fails.
105105

23.1 KB
Loading
79.6 KB
Loading
157 KB
Loading

0 commit comments

Comments
 (0)