Hi! I thought upgrading Certbot from 0.27 to 1.27 would help a lot, but still I do have a hard time to get it to work. Let me explain the situation:
We have a multi-tenant web app so every new user, will need to be added to the certificate of the app's domain. This is a wildcard domain (*.domain.com) but now every time the certificate needs to be renewed, or whenever a new client needs to be added to the certificate, we need to add new TXT records to all the domains. For most of the domains we don't even have access to the domain so we need to call them, during the process of renewing, to add a TXT record.
Isn't there an easier way? Is this really working like expected? This is almost not manageable since the needed TXT records will also change everytime whenever I startup certbot to renew/expand.
If you are looking to support customer domains, I think doing one certificate per customer domain, and authenticating them by HTTP rather than DNS, is probably the easiest thing.
What you are trying to do (a wildcard for your main domain + a normal FQDN for every customer domain) is made especially hard for you because Certbot doesn't really support mixing authentication methods for a single certificate (apart from with --manual auth hooks).
Nonetheless, for certificate management, it is going to be a lot less complicated to handle each customer domain separately. The downside of that approach is that you have to configure your webserver for each certificate, but how easy this is, varies. For example, haproxy and nginx have some pretty nifty ways to achieve this, without having to copy-paste virtual hosts.
Our issuance policy allows for up to 100 names per certificate. Whether you use a separate certificate for every hostname, or group together many hostnames on a small number of certificates, is up to you.
Using separate certificates per hostname means fewer moving parts are required to logically add and remove domains as they are provisioned and retired. Separate certificates also minimize certificate size, which can speed up HTTPS handshakes on low-bandwidth networks.
On the other hand, using large certificates with many hostnames allows you to manage fewer certificates overall. If you need to support older clients like Windows XP that do not support TLS Server Name Indication (SNI), you’ll need a unique IP address for every certificate, so putting more names on each certificate reduces the number of IP addresses you’ll need.
For most deployments both choices offer the same security.
I requested for a separate certificate for the new domain (which is hosted/own by a client) and used the apache web server plugin for authentication. Now I did get the certificate without having to add anything.. Thats perfect, but I wonder why I do need to add records whenever I tried adding this domain to a certificate with a wildcard on it.
I will look up how to configure the server for separate SSL certificates for each third party domain. We are running on apache