Skip to content
Start here

DNSSEC

DNSSEC Details
client.dns.dnssec.get(DNSSECGetParams { zone_id } params, RequestOptionsoptions?): DNSSEC { algorithm, digest, digest_algorithm, 11 more }
GET/zones/{zone_id}/dnssec
Edit DNSSEC Status
client.dns.dnssec.edit(DNSSECEditParams { zone_id, dnssec_multi_signer, dnssec_presigned, 2 more } params, RequestOptionsoptions?): DNSSEC { algorithm, digest, digest_algorithm, 11 more }
PATCH/zones/{zone_id}/dnssec
Delete DNSSEC records
client.dns.dnssec.delete(DNSSECDeleteParams { zone_id } params, RequestOptionsoptions?): DNSSECDeleteResponse
DELETE/zones/{zone_id}/dnssec
ModelsExpand Collapse
DNSSEC { algorithm, digest, digest_algorithm, 11 more }
algorithm?: string | null

Algorithm key code.

digest?: string | null

Digest hash.

digest_algorithm?: string | null

Type of digest algorithm.

digest_type?: string | null

Coded type for digest algorithm.

dnssec_multi_signer?: boolean

If true, multi-signer DNSSEC is enabled on the zone, allowing multiple providers to serve a DNSSEC-signed zone at the same time. This is required for DNSKEY records (except those automatically generated by Cloudflare) to be added to the zone.

See Multi-signer DNSSEC for details.

dnssec_presigned?: boolean

If true, allows Cloudflare to transfer in a DNSSEC-signed zone including signatures from an external provider, without requiring Cloudflare to sign any records on the fly.

Note that this feature has some limitations. See Cloudflare as Secondary for details.

dnssec_use_nsec3?: boolean

If true, enables the use of NSEC3 together with DNSSEC on the zone. Combined with setting dnssec_presigned to true, this enables the use of NSEC3 records when transferring in from an external provider. If dnssec_presigned is instead set to false (default), NSEC3 records will be generated and signed at request time.

See DNSSEC with NSEC3 for details.

ds?: string | null

Full DS record.

flags?: number | null

Flag for DNSSEC record.

key_tag?: number | null

Code for key tag.

key_type?: string | null

Algorithm key type.

modified_on?: string | null

When DNSSEC was last modified.

formatdate-time
public_key?: string | null

Public key for DS record.

status?: "active" | "pending" | "disabled" | 2 more

Status of DNSSEC, based on user-desired state and presence of necessary records.

One of the following:
"active"
"pending"
"disabled"
"pending-disabled"
"error"
DNSSECDeleteResponse = string