Improving the Domain Name Security
By default, any public Certificate Authority is authorized to issue a
certificate for any public domain name, provided they are able to prove they’re
in control of the domain name. This can be considered as a risk, mostly because
a CA’s validation process might be buggy. To lower this risk,
RFC8657 suggests to use a CAA DNS record.
A CAA DNS record allows to specify the CA(s) allowed to generate a TLS
certificate for your domain name.
To create one, add a CAA RR to your zone file. It should look like this:
@ IN CAA 0 issue "letsencrypt.org"
In the above example, Let’s Encrypt is the only CA allowed to issue TLS certificates for the domain name and its sub-domains.
- If you entrust the management of your certificates to Scalingo, and since we are using Let’s Encrypt as CA, the value must be set to letsencrypt.org (see the example above).
- Otherwise, please refer to your TLS certificate provider for the appropriate value.
Last update: 05 Jan 2026
Suggest edits