You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/dns/dnssec-unsign.md
+42-4Lines changed: 42 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,22 +32,60 @@ To unsign a zone using the Azure portal:
32
32
2. Select your DNS zone, and then from the zone's **Overview** page, select **DNSSEC**. You can select **DNSSEC** from the menu at the top, or under **DNS Management**.
33
33
3. If you have successfully removed the DS record at your registrar for this zone, you see that the DNSSEC status is **Signed but not delegated**. Do not proceed until you see this status.
34
34
35
+

36
+
37
+
4. Clear the **Enable DNSSEC** checkbox and select **OK** in the popup dialog box confirming that you wish to disable DNSSEC.
38
+
39
+

40
+
41
+
5. In the **Disable DNSSEC** pane, type the name of your domain and then select **Disable**.
42
+
43
+

44
+
45
+
6. The domain is now successfully unsigned.
46
+
35
47
## [Azure CLI](#tab/sign-cli)
36
48
37
-
Sign a zone using the Azure CLI:
49
+
Unsign a DNSSEC-signed zone using the Azure CLI:
50
+
51
+
1. To unsign a signed zone, issue the following commands. Replace the values for resource group and zone name with your resource group and zone name.
38
52
39
53
```azurepowershell-interactive
40
-
commands here
54
+
# Ensure you are logged in to your Azure account
55
+
az login
56
+
57
+
# Select the appropriate subscription
58
+
az account set --subscription "your-subscription-id"
59
+
60
+
# Disable DNSSEC for the DNS zone
61
+
az network dns dnssec-config delete --resource-group "your-resource-group" --zone-name "adatum.com"
62
+
63
+
# Verify the DNSSEC configuration has been removed
64
+
az network dns dnssec-config show --resource-group "your-resource-group" --zone-name "adatum.com"
41
65
```
42
66
67
+
2. Confirm that **(NotFound) DNSSEC is not enabled for DNS zone 'adatum.com'** is displayed after the last command. The zone is now unsigned.
68
+
43
69
## [PowerShell](#tab/sign-powershell)
44
70
45
-
Sign a zone using PowerShell:
71
+
1. Unsign and a zone and view the zone status using PowerShell:
46
72
47
73
```PowerShell
48
-
commands here
74
+
# Connect to your Azure account (if not already connected)
Copy file name to clipboardExpand all lines: articles/dns/dnssec.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.author: greglin
11
11
12
12
# DNSSEC overview (Preview)
13
13
14
-
This article provides a overview of Domain Name System Security Extensions (DNSSEC) and includes an introduction to [DNSSEC terminology](#dnssec-terminology). Benefits of DNSSEC zone signing are described and examples are provided for viewing DNSSEC related resource records. When you are ready to sign your Azure public DNS zone, see the following how-to guides:
14
+
This article provides an overview of Domain Name System Security Extensions (DNSSEC) and includes an introduction to [DNSSEC terminology](#dnssec-terminology). Benefits of DNSSEC zone signing are described and examples are provided for viewing DNSSEC related resource records. When you are ready to sign your Azure public DNS zone, see the following how-to guides:
15
15
16
16
-[How to sign your Azure Public DNS zone with DNSSEC (Preview)](dnssec-how-to.md).
17
17
-[How to unsign your Azure Public DNS zone (Preview)](dnssec-unsign.md)
@@ -99,7 +99,7 @@ The DNSSEC validation process works with trust anchors as follows:
99
99
100
100
### Authoritative servers
101
101
102
-
Authoritative DNS servers maintain a chain of trust through the use of delegation signer (DS) records. DS records are used to verify the authenticity of child zones zone in the DNS hierarchy.
102
+
Authoritative DNS servers maintain a chain of trust through the use of delegation signer (DS) records. DS records are used to verify the authenticity of child zones in the DNS hierarchy.
103
103
- In order for DNSSEC validation to occur on a signed zone, the parent of the signed zone must also be signed. The parent zone also must have a DS record for the child zone.
104
104
- During the validation process, a zone's parent is queried for the DS record. If the DS record is not present, or the DS record data in the parent does not match the DNSKEY data in the child zone, the chain of trust is broken and validation fails.
0 commit comments