Skip to content

Validation Workflows

When requesting certificates from Public CAs (Let’s Encrypt, DigiCert, Sectigo), you must prove you own the domain. This process is called “Domain Validation” (DV). SSL-CLM supports multiple automated workflows.

This is the most common method for web servers.

How it works:

  1. Challenge: The CA says: “If you own example.com, place a specific file at http://example.com/.well-known/acme-challenge/<TOKEN>.”
  2. Action: SSL-CLM (or the Agent) creates this file on your web server.
  3. Verify: The CA makes an HTTP request to that URL.
  4. Result: If the content matches, the certificate is issued.

Pros: Simple, works for any web server. Cons: Requires port 80 to be open to the public internet. Does not work for Wildcard certificates.

This is required for Wildcard certificates (*.example.com).

How it works:

  1. Challenge: The CA says: “Create a DNS TXT record at _acme-challenge.example.com with value <RANDOM_STRING>.”
  2. Action: SSL-CLM connects to your DNS Provider (Route53, Cloudflare, Azure DNS) via API and creates the record.
  3. Verify: The CA queries public DNS.
  4. Result: If the record exists, the certificate is issued.
  5. Cleanup: SSL-CLM deletes the TXT record.

Pros: Secure, doesn’t require open inbound ports. Works for Wildcards. Cons: Requires API credentials for your DNS provider. Slower (DNS propagation).

Legacy method.

  • Process: The CA sends an email to admin@example.com or hostmaster@example.com.
  • Action: A human must click the link in the email.
  • Automation: Not supported for full automation. Avoid if possible.