|
6 | 6 | label: Setup |
7 | 7 | --- |
8 | 8 |
|
9 | | -import { Tabs, TabItem } from "~/components"; |
| 9 | +import { Tabs, TabItem, APIRequest } from "~/components"; |
10 | 10 |
|
11 | 11 | This page explains how you can enable [multi-signer DNSSEC](/dns/dnssec/multi-signer-dnssec/about/) with Cloudflare, using the [model 2](/dns/dnssec/multi-signer-dnssec/about/#model-2) as described in [RFC 8901](https://www.rfc-editor.org/rfc/rfc8901.html). |
12 | 12 |
|
@@ -44,17 +44,14 @@ For the purpose of this tutorial, you will update your registrar with the DS rec |
44 | 44 |
|
45 | 45 | 1. Use the [Edit DNSSEC Status endpoint](/api/resources/dns/subresources/dnssec/methods/edit/) to enable DNSSEC and activate multi-signer DNSSEC for your zone. Set `status` to `active` and `dnssec_multi_signer` to `true`, as in the following example. |
46 | 46 |
|
47 | | -```bash |
48 | | -curl --request PATCH \ |
49 | | -"https://api.cloudflare.com/client/v4/zones/{zone_id}/dnssec" \ |
50 | | ---header "X-Auth-Email: <EMAIL>" \ |
51 | | ---header "X-Auth-Key: <API_KEY>" \ |
52 | | ---header "Content-Type: application/json" \ |
53 | | ---data '{ |
54 | | - "status": "active", |
55 | | - "dnssec_multi_signer": true |
56 | | -}' |
57 | | -``` |
| 47 | +<APIRequest |
| 48 | + path="/zones/{zone_id}/dnssec" |
| 49 | + method="PATCH" |
| 50 | + json={{ |
| 51 | + "status": "active", |
| 52 | + "dnssec_multi_signer": true, |
| 53 | + }} |
| 54 | +/> |
58 | 55 |
|
59 | 56 | 2. Add the ZSK(s) of your external provider(s) to Cloudflare by creating a DNSKEY record on your zone. |
60 | 57 |
|
@@ -135,16 +132,14 @@ For the purpose of this tutorial, you will update your registrar with the DS rec |
135 | 132 |
|
136 | 133 | 1. Use the [Edit DNSSEC Status endpoint](/api/resources/dns/subresources/dnssec/methods/edit/) to enable DNSSEC and activate multi-signer DNSSEC for your zone. Set `status` to `active` and `dnssec_multi_signer` to `true`, as in the following example. |
137 | 134 |
|
138 | | -```bash |
139 | | -$ curl --request PATCH 'https://api.cloudflare.com/client/v4/zones/{zone_id}/dnssec' \ |
140 | | ---header "X-Auth-Email: <EMAIL>" \ |
141 | | ---header "X-Auth-Key: <API_KEY>" \ |
142 | | ---header "Content-Type: application/json" \ |
143 | | ---data '{ |
144 | | - "status": "active", |
145 | | - "dnssec_multi_signer": true |
146 | | -}' |
147 | | -``` |
| 135 | +<APIRequest |
| 136 | + path="/zones/{zone_id}/dnssec" |
| 137 | + method="PATCH" |
| 138 | + json={{ |
| 139 | + "status": "active", |
| 140 | + "dnssec_multi_signer": true, |
| 141 | + }} |
| 142 | +/> |
148 | 143 |
|
149 | 144 | 2. Add the ZSK(s) of your external provider(s) to a DNSKEY record at your primary DNS provider. This record should be transferred successfully to Cloudflare. |
150 | 145 |
|
|
0 commit comments