Skip to main content

Certify DNS

Certify DNS is an optional service used to answer DNS challenges when your domains normal DNS provider isn't supported for automation. It can be used with any acme-dns compatible ACME client. The service requires a separately purchased Certify DNS license and is not bundled with Certify Certificate Manager.

  • The service is a cloud hosted version of the acme-dns protocol and uses CNAME delegation of acme challenge TXT records to a dedicated challenge response service.
  • You can purchase a Certify DNS license**, via the License Keys tab (when signed in). It is not included in other product licenses from us you may already have, e.g. other products like Certify Certificate Manager do not include a license for Certify DNS.
  • Certify DNS is not required in order to use the Certify Certificate Manager app, it's only required if you specifically want to use DNS challenges and can't use standard DNS automation.
  • The service is compatible with most other existing acme-dns clients so it can be used with other ACME clients on all operating systems.

With Certify DNS, you create a special CNAME record in your domain DNS, instead of a TXT record. This CNAME record points to the Certify DNS cloud service and handles ACME challenge responses for your domain.

Using Certify DNS in Certify Certificate Manager

  • Purchase a Certify DNS license key under your profile (License Keys > Add a License Key, choose Certify DNS).
  • In the app, Select Certify DNS as the DNS update method under Authorization.
  • Create your Certify DNS credentials using your account email address (as API Username) and license key (as API Key). You only need to do this once.
  • Click Request Certificate to perform a one-time registration with the Certify DNS service (per domain). If you receive an error such as Failed to register with Certify DNS you have probably not used the correct Certify DNS license key credentials.
  • You will be prompted to create a CNAME pointing to the TXT record hosted by the Certify DNS service. If you miss this prompt check back in the log file for your managed certificate (see the Status tab).
  • Once you have created your CNAME record, delete any existing _acme-challenge TXT record in the same zone to avoid confusion.
  • Resume the request using Request Certificate, the Certify DNS service will automatically provide the required TXT record responses on your behalf.
  • Automatic renewals will then perform this process again without manual intervention.

Using Certify DNS with other acme-dns compatible clients

  • Once activated on your account as special URL will be shown under the License Keys tab. This passes your license key info as basic credentials to the Certify DNS service.
  • Follow the normal instructions for your acme-dns client, using the provided URL as the base URL for the acme-dns service.

Example: Certbot with (linux)

  • Install Certbot and download (
  • Update to set ACMEDNS_URL = "https://<your key credentials>". Your url with credentials if found on your License Keys tab when Certify DNS is enabled.
  • Run certbot with the required auth hook, e.g.: sudo certbot certonly --manual --manual-auth-hook /etc/letsencrypt/ --preferred-challenges dns --debug-challenges -d
  • On first run you will be prompted to create a specific CNAME in your domains DNS after registration completes.


If the error in the app is NXDOMAIN for _acme-challenge... , the Certificate Authority has been unable to find or follow the CNAME you have configured in your DNS. You should review your DNS records to ensure you have created the required CNAME record.

Cloudflare users: If you have Universal SSL configured for your domain in Cloudflare, this will result in hidden TXT records being created for your domain and subdomain (called This will directly conflict with the CNAME record you need to create for Certify DNS to work. You should either disable Universal SSL in Cloudflare or contact Cloudflare for other solutions.

A common source of confusion is the difference between your Certify DNS license key and your Certify Certificate Manager license key. Each one is unique and specific to the product type.

Sharing CNAME registrations across multiple machines

If you need to have multiple machines fetch certificates for the same domain (such as a wildcard cert) you will find that your CNAME record needs to be the same Certify DNS pointer, which in turn means you need to share the Certify DNS registration config across each machine. To do this, copy the respective config file from C:\ProgramData\certify\certifydns\ (or acme-dns on managed certificates configured using older versions) on one machine all of to the other machines (into C:\ProgramData\certify\certifydns). Thereafter their renewals will all use the same Certify DNS registration for that domain.

Migrating from acme-dns to Certify DNS or vice-versa

To switch from acme-dns to Certify DNS, first delete the respective domain config from C:\ProgramData\certify\acmedns and switch the DNS provider to Certify DNS. Perform a normal renewal - the first renewal will prompt for a CNAME record to be updated pointing to the service. You can also check the log for this managed certificate and find the new CNAME value you need to populate. Thereafter you can then renew normally.

Securing Issuance

Delegating DNS validation to an external service theoretically allows the service to complete validation for certificates on your domain. To guard against issuance by a different account some CAs implement the CAA extensions for RFC8657

For example, to restrict specific-domain issuance (for non-wildcard certs) to only when using account 1234 and only using DNS validation (dns-01), add a CAA record with the account URI and validation method set : CAA 0 issue "; accounturi=; validationmethods=dns-01"

To restrict wildcard issuance use issuewild: CAA 0 issuewild "; accounturi=; validationmethods=dns-01"

This feature requires support from your chosen CA. Your CA account URI is available from the Certify command line using certify acmeaccount list.

Advantages and Disadvantages

There are a number of factors to consider before delegating validation to a service like Certify DNS (or any acme-dns style service).


  • Easy setup and can be used with any DNS provider even if they don't have an API
  • Least privileged updates to DNS. Your existing DNS zone only needs initial CNAME records created and thereafter no further updates are required to your DNS.


  • Delegating DNS validation to an external service theoretically allows the service to complete validation for certificates on your domain. This is a security risk and you must trust the service provider. An alternative is to host your own internet facing acme-dns server. You should review the requirements for doing that and assess whether it's the best choice for your organisation. Your CA can implement issuance features for the DNS CAA record standard adds a way to limit updates to only be performed by specific CA accounts. Let's Encrypt now support this CAA extension.


Certify DNS is a commercial service and the following pricing options are available.

TypeRenewal FrequencyDomainsPrice
Standard License12 Months500$60 USD
Cloud Licensed via AzureMonthly500$4.99 USD

The standard license can be purchased through your account on the License Keys tab. The Cloud License option is purchased via your normal Microsoft Azure billing.