CAA Records and the 47-Day SSL Shift: What Agencies Should Check Now
Learn why CAA records matter more as SSL lifetimes shorten and how agencies should review certificate authority signals across client domains.
Updated 9 May 2026
See exactly where your client domains stand.
Run a free audit on up to 10 domains — SSL expiry, domain expiry, and DNS health in one report. No signup needed.
CAA records tell certificate authorities which CAs are allowed to issue certificates for a domain. As certificate lifetimes shorten, agencies need fewer surprises around renewal readiness, DNS ownership, and CA authorization. A CAA record that blocks the active issuer can turn a routine renewal into an urgent handoff between the agency, host, DNS owner, and client IT team.
This tool checks public trust signals only. It is not a security audit, vulnerability scan, malware scan, or compliance check.
Use CertPilot's Client Website Trust Check for a fast public CAA signal review. Use 47-Day Renewal Pre-Flight when you need a deeper SSL, ACME, port 80, redirect, and CAA readiness pass for shorter renewal cycles.
Quick answer: CAA records and shorter SSL lifetimes
CAA records matter more when renewals happen more often because every renewal depends on the certificate authority being allowed to issue for the domain. If the domain publishes CAA records that do not include the CA used by the host or automation workflow, the renewal may fail until DNS is corrected.
For agencies, the practical review is:
- Does the domain publish CAA records?
- Do the records allow the expected CA?
- Are wildcard certificates covered by
issuewildwhere needed? - Does the DNS owner understand who manages certificate renewal?
- Is the renewal workflow documented before shorter lifetimes create more frequent events?
What a CAA record does
A CAA record is a DNS record that names which certificate authorities may issue certificates for a domain. If no CAA record exists, public CAs follow their normal validation process. If CAA records exist, the CA must check whether it is authorized before issuing.
The common tags are:
issue: authorizes issuance for regular certificates.issuewild: authorizes issuance for wildcard certificates.iodef: gives a reporting destination for CAA-related reports.
Let's Encrypt has a useful CAA documentation page explaining how its CAA checks work.
Why CAA matters more under frequent renewal cycles
Shorter certificate lifetimes increase the number of renewal events. More renewal events mean more chances for DNS drift, hosting changes, issuer changes, or ownership confusion to surface.
Agencies often sit between several owners:
- The agency manages the website.
- The host manages certificate automation.
- The client owns DNS.
- The client's IT provider manages domain records.
- A CDN may terminate TLS at the edge.
CAA creates a dependency across those owners. If the DNS record names one CA but the host uses another, the agency may only discover the mismatch when renewal fails. The better workflow is to review CAA before the renewal window.
issue vs issuewild
issue and issuewild are related but not identical.
| CAA signal | What it means | Renewal-readiness impact | Agency action |
|---|---|---|---|
| No CAA record | No CA restriction is published | Renewal may proceed through normal CA validation | Decide whether the client needs CAA governance |
| issue present | Listed CA may issue regular certificates | Renewal depends on active CA being listed | Compare record with hosting CA |
| issuewild absent | Wildcard issuance may fall back based on CAA rules | Wildcard renewal may need review | Confirm wildcard needs with host |
| issuewild present | Listed CA may issue wildcard certificates | Wildcard automation depends on listed CA | Match record to wildcard provider |
| Unexpected CA | DNS names a CA the team does not use | Future renewals may need DNS or host changes | Ask DNS owner and host to reconcile |
| Multiple CAs | More than one CA is authorized | May support migrations or multiple platforms | Document why each CA is listed |
If a client uses *.example.com, the agency should explicitly ask whether issuewild is needed and which provider handles wildcard issuance.
CAA and Let's Encrypt
Many agencies rely on platforms that use Let's Encrypt behind the scenes. Managed WordPress hosts, static-site platforms, app hosts, and CDN providers may all use automated certificates.
If CAA exists, the DNS record should allow the CA used by the platform. For Let's Encrypt, that commonly means an issue value that authorizes letsencrypt.org. The exact setup should be verified with the host or platform documentation because some providers use different CAs or multiple issuers.
CAA review is especially important after:
- Moving a site to a new host.
- Adding Cloudflare or another CDN.
- Changing DNS providers.
- Moving from a purchased certificate to automated certificates.
- Adding wildcard subdomains.
- Consolidating client domains under a care plan.
CAA and wildcard certificates
Wildcard certificates add another ownership question. They often require DNS-based validation and may be managed by a different team than the main website certificate.
For an agency, the review should ask:
- Is the site using a wildcard certificate now?
- Does the certificate cover only the root and
www, or additional subdomains? - Who controls DNS validation?
- Does CAA include
issuewildif the CA expects it? - Does the host or CDN automate renewal, or is the certificate manually renewed?
This is where a quick trust-signal check should feed into a deeper ACME readiness check when the ownership model is unclear.
Client-owned DNS and agency-owned websites
CAA problems often appear when the agency owns the website build but not the DNS zone. The agency may update the site, but the client IT team approves DNS changes. That split is manageable if it is documented. It becomes painful if nobody knows which CA the host uses or who can change CAA.
For care-plan clients, keep a simple note:
- DNS provider.
- DNS owner.
- Website host.
- Certificate provider or platform.
- CAA records present.
- Whether wildcard issuance is used.
- Renewal contact.
This helps the agency respond quickly when certificate readiness changes.
Common CAA mistakes
Common CAA issues are usually operational:
- CAA names an old certificate provider after a migration.
- Wildcard issuance is not considered.
- DNS owner and host do not agree on the active issuer.
- A CDN terminates TLS but the origin host also has certificates.
- Records were copied from another domain without review.
- The client cannot identify who owns DNS changes.
None of these require broad claims. They are ownership and readiness issues, and they are exactly the kind of practical work agencies can document.
What Client Website Trust Check reports
The Client Website Trust Check reports whether CAA records are visible for the checked domain and includes the result in a public trust-signal score. It is a quick review, not a full certificate automation assessment.
We make a small number of public requests to the domain you submit. We do not log in, scan plugins, or crawl the site.
Some signals are only visible if the site responds normally on the public URL being checked. Sites behind WAFs, geo-blocks, or aggressive bot protection may show unknown rather than missing.
For data-source and limitation notes, review the CertPilot methodology.
When to use 47-Day Pre-Flight instead
Use /trust-check when you want a quick public posture review that includes CAA as one signal among HTTPS/TLS, headers, cookies, and public metadata files.
Use 47-Day Renewal Pre-Flight when the question is specifically about shorter SSL renewal readiness. Pre-Flight is the better fit for ACME, CAA, port 80, redirect behavior, and renewal-cycle preparation. For a portfolio view, use the free agency audit to review up to 10 domains together.
Related Resources
- CAA records for client SSL renewals
- CAA records that block Let's Encrypt
- ACME readiness check
- 47-day SSL certificates agency guide
Frequently Asked Questions
What are CAA records?
CAA records are DNS records that tell certificate authorities which CAs may issue certificates for a domain. They are checked during certificate issuance. For agencies, CAA records are important because website hosting, DNS ownership, and certificate automation may belong to different people or vendors.
Why do CAA records matter for 47-day SSL?
CAA records matter for 47-day SSL because shorter lifetimes increase renewal frequency. If CAA records do not authorize the CA used by the host or automation workflow, renewals can require urgent DNS changes. Agencies should review CAA before frequent renewal cycles make those dependencies more visible.
Is a missing CAA record always a problem?
No. A missing CAA record means the domain has not published a CA restriction. Some organizations intentionally leave CAA absent. Others want CAA as part of domain governance. For agencies, the right action is to document the current state and ask whether the client has a preferred certificate authority policy.
What is the difference between issue and issuewild?
issue authorizes regular certificate issuance. issuewild relates to wildcard certificate issuance. If a client uses wildcard certificates, the agency should confirm whether the expected CA is allowed for wildcard issuance and whether DNS validation is managed by the right owner.
Should agencies edit CAA records directly?
Only if the agency is responsible for DNS and has client approval. CAA affects certificate issuance, so changes should be coordinated with the host, CDN, or IT provider that manages certificate automation. In many cases, the agency's role is to identify the mismatch and route it to the DNS owner.
How does Trust Check use CAA?
Trust Check includes CAA as one public DNS signal in a broader review. It helps agencies see whether CAA is present and whether the result deserves follow-up. For deeper renewal readiness, use Pre-Flight and review the host's certificate automation path.
Monitor every client domain from one dashboard.
CertPilot checks SSL expiry, DNS records, and domain registration daily — then sends one alert when action is needed. 14-day free trial, no card required.