The CAA record (Certification Authority Authorization) specifies which certificate authorities (CAs) are allowed to issue SSL/TLS certificates for your domain. This prevents unauthorized CAs from issuing certificates, adding an extra layer of security against fraudulent certificates.
Check CAA records for any domain using our free DNS lookup tool.
Look Up CAA Records →Since 2017, certificate authorities are required to check CAA records before issuing certificates. If a CAA record exists, the CA can only issue a certificate if it's listed in the record. This protects against:
A CAA record consists of three parts:
| Component | Description | Example |
|---|---|---|
| Flags | 0 = non-critical, 128 = critical | 0 |
| Tag | Property type (issue, issuewild, iodef) | issue |
| Value | CA domain or reporting email | letsencrypt.org |
example.com. 3600 IN CAA 0 issue "letsencrypt.org"
This record allows only Let's Encrypt to issue certificates for example.com.
Specifies CAs that can issue certificates for the domain:
example.com. CAA 0 issue "digicert.com"
example.com. CAA 0 issue "letsencrypt.org"
Specifies CAs that can issue wildcard certificates (*.domain.com):
example.com. CAA 0 issuewild "digicert.com"
If no issuewild record exists, the issue record applies to wildcards too.
Where to report CAA violations:
example.com. CAA 0 iodef "mailto:[email protected]"
example.com. CAA 0 iodef "https://example.com/caa-report"
| Certificate Authority | CAA Value |
|---|---|
| Let's Encrypt | letsencrypt.org |
| DigiCert | digicert.com |
| Sectigo (Comodo) | sectigo.com |
| GlobalSign | globalsign.com |
| GoDaddy | godaddy.com |
| Amazon (AWS) | amazon.com |
| Google Trust Services | pki.goog |
| Cloudflare | digicert.com; comodoca.com; letsencrypt.org |
example.com. CAA 0 issue "letsencrypt.org"
example.com. CAA 0 iodef "mailto:[email protected]"
example.com. CAA 0 issue "digicert.com"
example.com. CAA 0 issue "letsencrypt.org"
example.com. CAA 0 issuewild "digicert.com"
example.com. CAA 0 issue ";"
example.com. CAA 0 issue "letsencrypt.org"
example.com. CAA 0 issuewild ";"
This allows regular certificates but blocks wildcard certificates.
CAA records are inherited by subdomains. If no CAA record exists for a subdomain, the parent domain's CAA record applies:
www.example.com checks for CAA at www.example.comTo set different policies for subdomains, create CAA records at the subdomain level.
Common issues and solutions:
DNS Explorer monitors CAA records, validates CA authorization, and alerts you to certificate security issues.
Start free DNS Explorer trial14-day full-feature trial
Use our DNS Record Finder to look up CAA records for any domain.
Look Up CAA Records →