Skip to content

Commit e94aae6

Browse files
[CF4SaaS, Pages] Add ssl.com to CAA records (#19224)
* Add ssl.com CAA examples to SSL4SaaS troubleshooting * Add ssl.com to CAA records in debugging-pages.mdx * Remove Comodo CA from CAA records in debugging-pages
1 parent 22ef64c commit e94aae6

File tree

3 files changed

+9
-5
lines changed

3 files changed

+9
-5
lines changed

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/reference/troubleshooting.mdx

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,11 +66,14 @@ You will need to ensure that the required CAA records for the selected Certifica
6666
For example, here are the records required to issue [Let's Encrypt](https://letsencrypt.org/docs/caa/) and [Google Trust Services](https://pki.goog/faq/#caa) certificates:
6767

6868
```
69+
example.com CAA 0 issue "pki.goog; cansignhttpexchanges=yes"
70+
example.com CAA 0 issuewild "pki.goog; cansignhttpexchanges=yes"
71+
6972
example.com CAA 0 issue "letsencrypt.org"
7073
example.com CAA 0 issuewild "letsencrypt.org"
7174
72-
example.com CAA 0 issue "pki.goog; cansignhttpexchanges=yes"
73-
example.com CAA 0 issuewild "pki.goog; cansignhttpexchanges=yes"
75+
example.com CAA 0 issue "ssl.com"
76+
example.com CAA 0 issuewild "ssl.com"
7477
```
7578

7679
More details can be found on the [CAA records FAQ](/ssl/edge-certificates/troubleshooting/caa-records/).

src/content/docs/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/validate-certificates/troubleshooting.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,9 @@ CAA is a DNS resource record type defined in [RFC 6844](https://datatracker.ietf
2626
If your customer has CAA records set on their domain, they will either need to add the following or remove CAA entirely:
2727

2828
```txt
29-
example.com. IN CAA 0 issue "letsencrypt.org"
3029
example.com. IN CAA 0 issue "pki.goog"
30+
example.com. IN CAA 0 issue "letsencrypt.org"
31+
example.com. IN CAA 0 issue "ssl.com"
3132
```
3233

3334
While it is possible for CAA records to be set on the subdomain your customer wishes to use with your service, it will usually be set on the domain apex. If they have CAA records on the subdomain, those will also have to be removed.

src/content/docs/pages/configuration/debugging-pages.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -156,12 +156,12 @@ In the above example, there is only a single CAA record which is allowing Amazon
156156
To resolve this, you will need to add the following CAA records which allows all of the Certificate Authorities (CAs) Cloudflare uses to issue certificates:
157157
158158
```
159-
example.com. 300 IN CAA 0 issue "comodoca.com"
160159
example.com. 300 IN CAA 0 issue "letsencrypt.org"
161160
example.com. 300 IN CAA 0 issue "pki.goog; cansignhttpexchanges=yes"
162-
example.com. 300 IN CAA 0 issuewild "comodoca.com"
161+
example.com. 300 IN CAA 0 issue "ssl.com"
163162
example.com. 300 IN CAA 0 issuewild "letsencrypt.org"
164163
example.com. 300 IN CAA 0 issuewild "pki.goog; cansignhttpexchanges=yes"
164+
example.com. 300 IN CAA 0 issuewild "ssl.com"
165165
```
166166
167167
### Zone holds

0 commit comments

Comments
 (0)