Google Cloud DNS requirements for domain validation¶
When using Google Cloud DNS with a certificate authority (CA) that supports the DNS-01 challenge method—such as Google Trust Services (GTS) or a custom ACMEv2 CA—Certificate Manager - SaaS automates domain control validation by creating and deleting TXT records through the Google Cloud DNS API.
Required Google Cloud properties¶
These Google Cloud properties are required to enable secure automation with Google Cloud DNS:
| Field | Purpose |
|---|---|
| Service account JSON file | Authenticates API access to Google Cloud DNS using a service account credential. |
Required permissions¶
To allow Certificate Manager - SaaS to create and manage TXT records automatically, the service account must include the following permissions in Google Cloud IAM.
Project-level permissions¶
| Permission | Purpose |
|---|---|
dns.managedZones.list | Lists available managed zones in the project. |
dns.projects.get | Retrieves project information and DNS quotas. |
DNS zone–level permissions¶
| Permission | Purpose |
|---|---|
dns.changes.create | Creates DNS record changes for DNS-01 validation. |
dns.changes.get | Retrieves details about DNS changes. |
dns.resourceRecordSets.create | Adds TXT records required for validation. |
dns.resourceRecordSets.delete | Removes TXT records after validation completes. |
dns.resourceRecordSets.get | Reads specific DNS record details. |
dns.resourceRecordSets.list | Lists existing DNS records in the zone. |
dns.managedZonesOperations.list | Lists the status of long-running operations, such as DNS record updates, within a managed zone. Required for tracking asynchronous DNS changes during validation. |
dns.resourceRecordSets.update | Updates existing DNS records when a new validation TXT record replaces an older entry or when a record must be modified instead of recreated. |
Tip
Need help configuring IAM roles?
See Google’s guides for Creating and Managing Service Accounts and Access Control for Cloud DNS.
You may need assistance from a Google Cloud administrator to create a service account and assign custom roles.