Certificate Security • Last Updated 3rd April 2026 3 min read

What are CAA records?

Learn what CAA records contain, how issue and issuewild tags work, and how CAA helps control which certificate authorities can issue for your domain.

Tools For This Topic

What a CAA record is

A CAA (Certification Authority Authorization) record lets a domain owner define which certificate authorities are allowed to issue TLS certificates for the domain.

It acts as a DNS-based policy control that certificate authorities are expected to check before issuing a certificate.

While not mandatory, CAA is widely used as a hardening measure to reduce the risk of unintended or unauthorized certificate issuance.

What a CAA record looks like

A typical CAA record contains a flag, a tag, and a value.

example.com. 3600 IN CAA 0 issue "letsencrypt.org"

This example allows letsencrypt.org to issue standard (non-wildcard) certificates for the domain.

Unlike some other DNS records, the structure is compact but carries important policy meaning.

What the fields mean

  • Flags: usually set to 0 in most deployments, but can enforce stricter processing if required
  • Tag: defines the type of authorization, such as issue, issuewild, or iodef
  • Value: specifies the authorized certificate authority or reporting endpoint

Common tags

  • issue: authorizes standard certificate issuance
  • issuewild: authorizes wildcard certificate issuance
  • iodef: defines where certificate-related incident reports should be sent

How CAA is evaluated

When a certificate authority receives a request, it performs a DNS lookup for CAA records on the requested domain.

If no CAA record exists, any trusted CA may proceed with issuance. If a CAA record is present, the CA must check whether it is explicitly authorized.

CAA evaluation also walks up the DNS hierarchy, meaning parent domains may influence policy if no record exists at the exact hostname.

Why CAA matters

CAA adds a layer of governance to certificate issuance. It allows organisations to define which providers are trusted for their domain.

This is particularly valuable in environments with strict security or compliance requirements, where certificate issuance should be tightly controlled.

It also helps reduce the blast radius of misconfiguration or compromise at a certificate authority.

Common mistakes

  • Not updating CAA records after switching certificate providers
  • Forgetting to allow wildcard issuance when needed
  • Blocking a CA that is still in active use
  • Publishing CAA without understanding existing certificate workflows

CAA and certificate troubleshooting

If certificate issuance fails unexpectedly, CAA is a common cause. A CA may refuse to issue if it is not explicitly authorized in the record.

In these cases, checking the current CAA policy and comparing it with the intended certificate provider is essential.

Use These DNS Pro Tools

If you want to validate this topic in practice, these DNS Pro tools are the fastest next step.

Related Tools

Related Articles