Free tool · Cert governance
CAA record generator
Pick the certificate authorities you actually use from a preset list. We emit publish-ready CAA records (BIND zone format) you paste into your DNS provider. Restricts who can issue TLS certs in your name. No signup.
CAs allowed for ordinary certs (issue)
Tick every CA you actually use. Missing one will silently kill your next renewal.
Records to publish
Fill in a domain + tick at least one CA to see the records.
What this tool checks
CAA records narrow your cert-issuance surface from ~80 globally-trusted CAs down to the specific ones you use. Without CAA, a compromised registrar, social-engineered domain-validation challenge, or CA misissuance bug anywhere produces a working TLS cert for an attacker.
This generator only emits the records - you publish them in your DNS provider. After publishing, run the CAA checker to confirm they resolve correctly.
How to read the results
Before publishing: make sure every CA you actually use today is on your list - missing one silently kills the next renewal. Common pitfalls:
- You use AWS Certificate Manager for one service and Let's Encrypt for another - both need to be on the list.
- Your DR / failover site uses a different CA - include it.
- Wildcards have separate rules under
issuewild- if you don't set issuewild it falls back to issue rules.