To protect your own website from misuse, it can be useful to include a CAA entry (="Certificate Authority Authorization") in the DNS settings of your own domain. This DNS type determines which certificate authorities are authorized to issue an SSL/TLS oder S/MIME certificate for a domain.
In March 2017, the CA/Browser Forum issued a guideline that requires all certificate authorities to check a domain's CAA records before issuing and renewing a certificate as of 09/09/2017. If no CAA record has been created for a domain, then any certification authority may issue a corresponding certificate for that domain. However, if a CAA record exists, then the certification authority may only issue a certificate if it has been authorized by such a record.
CAA records are checked from the subdomain level upwards. This means that if a subdomain does not have a CAA entry, then the certification authority checks the next higher domain level until the main domain has been reached. Different CAA entries can apply to a subdomain than to the higher domain level. In this way, different certification authorities can theoretically be authorized. As a rule, however, a CAA record is only created for the main domain.
A CAA record may look like the following:
| yourdomain.tld | IN | CAA | 0 | issue | "trust-provider.com" |
| Domain name | DNS type | Flag | Property | Certification authority |
The target value of a CAA record consists of a flag, a property, and the certification authority to be approved.
The flag specifies how a certification authority should consider a CAA entry. A value of 0 to 255 can be entered here. The most important values here are 0, which stands for non-critical, and 128, which means critical. "Non-critical" means that the certification authorities should igonize all entries in the CAA entry if they cannot be evaluated. "Critical", in turn, stands for that the certification authorities should not issue a certificate if the entries in the CAA record cannot be evaluated.
There are 4 properties that can be used in the CAA entry:
To authorize us to create an SSL/TLS or S/MIME certificate for your domain, please use the term "trust-provider.com" in your DNS settings. The entry should then read as follows:
domain.tld IN CAA 0 issue "trust-provider.com"
domain.tld IN CAA 0 issuewild "trust-provider.com"
domain.tld IN CAA 0 issuemail "trust-provider.com"
Discover why SSL/TLS certificates are now expiring faster than ever—transforming from years to just 47 days! Learn how this shift boosts security, mandates automation, and what it means for web users and developers alike.
From personal information to financial information, SSL certificates ensure that data transmitted between a user's browser and a web server remains encrypted and secure. In our article, we give you an overview of the technology, show you how SSL works and what types of certificates there are.
Discover how post-quantum SSL can shield your website from future cyber threats and keep your data safe against quantum computing attacks. Learn to implement and benefit from this advanced security measure today!
LEI numbers are critical for trading and security in the financial sector. Learn how they are used, how to apply for them, and the consequences of not having a number. Read more about the future development of LEI numbers and how they can improve IT security. Register with EuropeanLEI to get your own LEI number.
Discover the importance of SSL certificates for small and medium-sized enterprises (SMBs) in protecting against cyberattacks and building customer trust. Learn how SSL certificates work and their impact on search engine rankings and reputational damage.