Skip to content

Commit 9620ca9

Browse files
[SSL] Add subdomain delegation to DCV troubleshooting (#20871)
* [SSL] Update troubleshooting.mdx CUSTESC-46925 * Small text and Style Guide touch-ups --------- Co-authored-by: Rebecca Tamachiro <[email protected]>
1 parent e5746f7 commit 9620ca9

File tree

2 files changed

+3
-2
lines changed

2 files changed

+3
-2
lines changed

src/content/docs/dns/dnssec/multi-signer-dnssec/setup.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ For the purpose of this tutorial, you will update your registrar with the DS rec
3737
4. Also enable **Multi-signer DNSSEC** and **Multi-provider DNS**.
3838
5. Go to **DNS** > **Records** and create the following records at your zone apex (meaning you should use `@` in the record **Name** field):
3939
- A [DNSKEY record](/dns/manage-dns-records/reference/dns-record-types/#ds-and-dnskey) with the zone signing key(s) (ZSKs) of your external provider(s).
40-
- A [NS record](/dns/manage-dns-records/reference/dns-record-types/#ns) with your external provider nameservers.
40+
- An [NS record](/dns/manage-dns-records/reference/dns-record-types/#ns) with your external provider nameservers.
4141

4242
</TabItem>
4343
<TabItem label="API">

src/content/docs/ssl/edge-certificates/changing-dcv-method/troubleshooting.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,8 @@ Consider the following when troubleshooting:
5252

5353
- [DNSSEC](https://www.cloudflare.com/learning/dns/dns-security/) must be configured correctly. You can use [DNSViz](https://dnsviz.net/) to understand and troubleshoot the deployment of DNSSEC.
5454
- Your [CAA records](/ssl/edge-certificates/caa-records/) should allow Cloudflare's partner [certificate authorities (CAs)](/ssl/reference/certificate-authorities/) to issue certificates on your behalf.
55-
- The HTTP verification process is done preferably over **IPv6**, so if any `AAAA` record exists and does not point to the same dual-stack location as the `A` record, the validation will fail.
55+
- The HTTP verification process is done preferably over **IPv6**, so if any AAAA record exists and does not point to the same dual-stack location as the A record, the validation will fail.
56+
- If an [NS record](/dns/manage-dns-records/reference/dns-record-types/#ns) is present for the hostname or its parent, DNS resolution will be managed externally by the DNS provider defined in the NS target. In this case, you must either add the DCV TXT record at the external DNS provider, or remove the NS record at Cloudflare.
5657

5758
## CA errors
5859

0 commit comments

Comments
 (0)