You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
I'm frustrated when LZA can create a certificate for me with DNS validation, but even with a suitable hosted zone within the account (where the certificate is created), I still need to validate the certificate myself.
In a multi-account architecture, this is not ideal.
The console provides a "do it for me" button.
Describe the feature you'd like
Automatically provide DNS validation of certificates within the same account Bonus - validation in a different account
Additional context
This may be applicable in design of feature:
Hi @richardkeit! What's likely occurring here, and as you pointed out, the "do it for me" functionality in console is adding the CNAME record to the hosted zone in Route53 as documented. This is a pattern that I think would be useful for large extensive environments especially. We're aiming for extending Route 53 Public and Private Hosted Zones in the early part of next year, and can probably get this added around the same timeline. I will keep this issue open in the meantime should you have any other related questions or concerns.
Is your feature request related to a problem? Please describe.
I'm frustrated when LZA can create a certificate for me with DNS validation, but even with a suitable hosted zone within the account (where the certificate is created), I still need to validate the certificate myself.
In a multi-account architecture, this is not ideal.
The console provides a "do it for me" button.
![Screenshot 2024-12-16 at 11 41 56 am](https://private-user-images.githubusercontent.com/17537115/395979272-17863a88-a963-4a50-be62-837e828d9021.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.ZZBZJXhwFwzxp_JmnwKhbgR1sUTaDzoQysr7oGyNmd0)
Describe the feature you'd like
Automatically provide DNS validation of certificates within the same account
Bonus - validation in a different account
Additional context
This may be applicable in design of feature:
The text was updated successfully, but these errors were encountered: