Managing DNS connectors
Configure a DNS connector
Once installed, DNS connectors must be configured to connect to your DNS provider. Multiple DNS providers can be connected to a single connector.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Cloudflare provider.
sectigo-dcs.exe provider add -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Amazon Route 53 provider.
sectigo-dcs.exe provider add -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Azure DNS provider.
sectigo-dcs.exe provider add -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the GoDaddy DNS provider.
sectigo-dcs.exe provider add -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Akamai Edge DNS provider.
sectigo-dcs.exe provider add -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the DNSimple DNS provider.
sectigo-dcs.exe provider add -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the OVHcloud provider.
sectigo-dcs.exe provider add -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Cloudflare, the value must be
cloudflare.nameThe name used to represent the DNS provider in SCM.
tokenThe authentication token specific to your Cloudflare user or account.
This token is required to authorize the DNS connector to interact with Cloudflare’s API on behalf of your account.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Amazon Route 53, the value must be
route53.nameThe name used to represent the DNS provider in SCM.
access-key-idThe AWS access key ID generated for your AWS account. This key is used to authenticate API requests.
regionThe AWS region where your Route 53 resources are located.
Some examples of AWS region IDs include
us-east-1,eu-west-1, and so on.secret-keyThe AWS secret access key generated for your AWS account. This key, along with the access key ID, is used to sign API requests.
session-token(Optional) The session token for temporary security credentials. This is included if you are using temporary credentials from AWS STS (Security Token Service).
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Azure DNS, the value must be
azure.nameThe name used to represent the DNS provider in SCM.
resource-groupThe name of the Azure resource group that contains your DNS zone.
subscriptionThe Azure subscription ID associated with your account. This identifies your subscription within Azure.
tenant-idThe Microsoft Entra ID (formerly Azure Active Directory) tenant ID.
client-idThe client ID of the Microsoft Entra application. This is used for authentication.
client-secretThe client secret associated with the Microsoft Entra application. This is used for authentication.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For GoDaddy DNS, the value must be
godaddy.nameThe name used to represent the DNS provider in SCM.
api-keyThe API key generated from your GoDaddy account. This key is used to authenticate API requests.
api-secretThe API secret associated with your GoDaddy API key. This secret, along with the API key, is used to sign API requests.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Akamai Edge DNS, the value must be
akamai.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your Akamai account. This token is used to authenticate API requests.
client-secretThe client secret associated with your Akamai API client. This secret, along with the client token, is used to sign API requests.
client-tokenThe client token generated from your Akamai account. This token, along with the client secret, is used to authenticate API requests.
hostThe host URL for the Akamai API endpoint. This specifies the server to which API requests are sent.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For DNSimple DNS, the value must be
dnsimple.nameThe name used to represent the DNS provider in SCM.
access-tokenThe access token generated from your DNSimple account. This token is used to authenticate API requests.
account-idThe account ID associated with your DNSimple account. This ID is used to specify which account the API requests should be applied to.
-
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>"The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For OVHcloud, the value must be
ovh.nameThe name used to represent the DNS provider in SCM.
endpointThe OVH region ID indicating where your services are hosted.
Some examples of OVHcloud region IDs include
ovh-eu,ovh-ca, andovh-us.app-keyThe Application Key (AK) provided by OVHcloud when you register your application. This key is used to identify your application in API requests.
app-secretThe Application Secret (AS) provided by OVHcloud alongside the Application Key. This secret, along with the application key, is used to sign API requests.
consumer-keyThe Consumer Key (CK) obtained after authenticating your application with OVHcloud’s API using your Application Key and Application Secret. This key grants your application permission to make API requests on behalf of a user’s account.
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Bind DNS provider.
sectigo-dcs.exe provider add -name "<yourProviderName>" -type bind -host <yourHost> -key-file <yourPathToKeyFile> -port <yourPortNumber>The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Bind, the value must be
bind.nameThe name used to represent the DNS provider in SCM.
hostThe hostname or IP address of the Bind server.
key-fileThe path to the Transaction SIGnature(TSIG) key file used for authentication.
port(Optional) The port number on which the Bind server is listening (default
53). -
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Infoblox DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Infoblox, the value must be
infoblox.nameThe name used to represent the DNS provider in SCM.
hostThe Infoblox server host name (FQDN or IP address).
usernameThe Infoblox account name used by the connector to authenticate to the API.
passwordThe Infoblox account password.
dns-view(Optional) The Infoblox DNS View where records are managed. (default
External).port(Optional) The port number (default
443).version(optional) The Infoblox API version to use for requests..
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
-
In a command prompt window, navigate to the DNS connector install location.
-
Add the Google Cloud DNS provider.
sectigo-dcs.exe provider add -name <yourProviderName> -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>'The command options are outlined in the following table.
Option Description typeThe type of DNS provider that is being added.
For Google Cloud, the value must be
google.nameThe name used to represent the DNS provider in SCM.
projectThe Google Cloud Project ID.
cred-fileThe path to the Google Cloud credentials JSON file.
-
Verify the provider is added.
sectigo-dcs.exe debug provider ping -name "<yourProviderName>"
|
You can view additional CLI commands with the sectigo-dcs provider help |
Managing DNS providers
Modify a DNS provider
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Cloudflare provider.
sectigo-dcs.exe provider modify -type cloudflare -name "<yourProviderName>" -token "<yourCloudflareToken>" -
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Amazon Route 53 provider.
sectigo-dcs.exe provider modify -type route53 -name "<yourProviderName>" -access-key-id "<yourAccessKeyID>" -region "<yourAWSRegion>" -secret-key "<yourSecretKey>" -session-token "<yourSessionToken>" -
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Azure DNS provider.
sectigo-dcs.exe provider modify -type azure -name "<yourProviderName>" -resource-group "<yourResourceGroupName>" -subscription "<yourSubscriptionID>" -tenant-id "<yourTenantID>" -client-id "<yourClientID>" -client-secret "<yourClientSecret>" -
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the GoDaddy DNS provider.
sectigo-dcs.exe provider modify -type godaddy -name "<yourProviderName>" -api-key "<yourAPIKey>" -api-secret "<yourAPISecret>" -
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Akamai Edge DNS provider.
sectigo-dcs.exe provider modify -type akamai -name "<yourProviderName>" -access-token "<yourAccessToken>" -client-secret "<yourClientSecret>" -client-token "<yourClientToken>" -host "<yourHost>" -
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the DNSimple DNS provider.
sectigo-dcs.exe provider modify -type dnsimple -name "<yourProviderName>" -access-token "<yourAccessToken>" -account-id "<yourAccountID>" -
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the OVHcloud provider.
sectigo-dcs.exe provider modify -type ovh -name "<yourProviderName>" -endpoint <yourOVHendpoint> -app-key "<yourAPIkey>" -app-secret "<yourAppSecret>" -consumer-key "<yourConsumerKey>" -
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Bind DNS provider.
sectigo-dcs.exe provider modify -name "<yourProviderName>" -type bind -host <yourBindHost> -key-file <yourPathToKeyFile> -port <yourPortNumber> -
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Infoblox DNS provider.
sectigo-dcs.exe provider modify -name <yourProviderName> -type infoblox -host '<yourHost>' -username '<yourUserName>' -password '<yourPassword>' -dns-view '<yourDNSView>' -port <yourPort> -version '<yourVersion>' -
Verify the provider’s details.
sectigo-dcs.exe provider list
-
In a command prompt window, navigate to the DNS connector install location.
-
Modify the Google Cloud DNS provider.
sectigo-dcs.exe provider modify -name "<yourProviderName>" -type google -project '<yourProjectId>' -cred-file '<yourCredentialsFilePath>' -
Verify the provider’s details.
sectigo-dcs.exe provider list