Yandex Cloud
Search
Discuss with expertTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Certificate Manager
  • Getting started
    • All guides
      • Adding a certificate
      • Getting the contents of a certificate
      • Passing a domain rights check
      • Renewing a certificate
      • Editing a certificate
      • Deleting a certificate
    • Backups
    • Adding an alert for a certificate
    • Configuring access permissions for a certificate
    • Viewing operations with a certificate
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Release notes
  • FAQ
  1. Step-by-step guides
  2. Let's Encrypt certificate
  3. Passing a domain rights check

Checking domain rights

Written by
Yandex Cloud
Updated at May 5, 2026

To pass a domain rights check:

Management console
CLI
Terraform
API
  1. In the management console, select the folder you added the certificate to.
  2. Navigate to Certificate Manager.
  3. Select and click the certificate you need checked.
  4. Under Check rights for domains, you will see the details required to pass the domain rights check.
  5. As soon as you pass the domain rights check, its status under Check rights for domains will change to Valid.
  6. After the check status for all the domains changes to Valid, a certificate will be issued and its status will change to Issued.

If you do not have the Yandex Cloud CLI yet, install and initialize it.

The folder used by default is the one specified when creating the CLI profile. To change the default folder, use the yc config set folder-id <folder_ID> command. You can also specify a different folder for any command using --folder-name or --folder-id. If you access a resource by its name, the search will be limited to the default folder. If you access a resource by its ID, the search will be global, i.e., through all folders based on access permissions.

  1. View the command description:

    yc certificate-manager certificate get --help
    
  2. Run this command:

    yc certificate-manager certificate get \
      --id fpq6gvvm6piu******** \
      --full
    

    Where:

    • --id: Certificate ID.
    • --full: Show the list of active domain rights checks.

    Result:

    id: fpq6gvvm6piu********
    folder_id: b1g7gvsi89m3********
    created_at: "2020-09-15T08:49:11.533771Z"
    name: mymanagedcert
    type: MANAGED
    domains:
    - example.com
    status: VALIDATING
    updated_at: "2020-09-15T08:49:11.533771Z"
    challenges:
    - domain: example.com
      type: HTTP
      created_at: "2020-09-15T08:49:11.533771Z"
      updated_at: "2020-09-15T08:51:44.991065Z"
      status: PENDING
      message: Create a file in your web server's base directory.
      http_challenge:
        url: http://example.com/.well-known/acme-challenge/3LiH-nrTC7GdMbRgVqttEvdTODeNeaD0TtX********
           content: 3LiH-nrTC7GdMbRgVqttEvdTODeNeaD0TtXteWgtAH8.ZHCju15sJiKBwT8G5FTl7UtfmJWp1gKNYYP********
    
  3. You can find the information you need to pass the rights check under http_challenge.

  4. As soon as you pass the domain rights check, its status will change to Valid:

    yc certificate-manager certificate get \
      --id fpq6gvvm6piu******** \
      --full
    

    Result:

    ...
    domains:
    - example.com
    status: VALID
    ...
    
  5. After the check status for all the domains changes to Valid, a certificate will be issued and its status will change to Issued:

    yc certificate-manager certificate get \
      --id fpq6gvvm6piu******** \
      --full
    

    Result:

    ...
    domains:
    - example.com
    status: ISSUED
    ...
    

With Terraform, you can quickly create a cloud infrastructure in Yandex Cloud and manage it using configuration files. These files store the infrastructure description written in HashiCorp Configuration Language (HCL). If you change the configuration files, Terraform automatically detects which part of your configuration is already deployed, and what should be added or removed.

Terraform is distributed under the Business Source License. The Yandex Cloud provider for Terraform is distributed under the MPL-2.0 license.

For more information about the provider resources, see the relevant documentation on the Terraform website or its mirror.

If you do not have Terraform yet, install it and configure the Yandex Cloud provider.

With Terraform, you can create a DNS record required to check your domain rights. Follow these steps:

  1. In the Terraform configuration file, describe the resources you want to create:

    resource "yandex_cm_certificate" "le-certificate" {
      name    = "<certificate_name>"
      domains = ["<domain>"]
    
      managed {
      challenge_type = "DNS_CNAME"
      }
    }
    
    resource "yandex_dns_recordset" "validation-record" {
      zone_id = "<zone_ID>"
      name    = yandex_cm_certificate.le-certificate.challenges[0].dns_name
      type    = yandex_cm_certificate.le-certificate.challenges[0].dns_type
      data    = [yandex_cm_certificate.le-certificate.challenges[0].dns_value]
      ttl     = <record_time_to_live_in_seconds>
    }
    
    data "yandex_cm_certificate" "example" {
      depends_on      = [yandex_dns_recordset.validation-record]
      certificate_id  = yandex_cm_certificate.le-certificate.id
      wait_validation = true
    }
    
    # Use data.yandex_cm_certificate.example.id to get a valid certificate.
    
    output "cert-id" {
      description = "Certificate ID"
      value       = data.yandex_cm_certificate.example.id
    }
    

    Where:

    • yandex_cm_certificate resource properties:
      • domains: Domain you need to create a certificate for.
      • challenge_type: Domain owner check method. The possible values are:
        • DNS_CNAME: Create a DNS record in CNAME format with the specified value. We recommend this method for automatic certificate renewal.
        • DNS_TXT: Create a DNS record in TXT format with the specified value.
    • yandex_dns_recordset resource properties:
      • zone_id: ID of the DNS zone to add the owner verification record to.
      • name: Record name.
      • type: DNS record type.
      • data: Record value.
      • ttl: Record time to live (TTL) in seconds before updating the record value.
      • description: Record set description. This is an optional setting.
    • yandex_dns_recordset data source properties:
      • depends_on: Indicates the dependence on another Terraform resource.
      • certificate_id: Certificate ID.
      • wait_validation: Certificate validation wait flag. If true, the operation will not be completed until the certificate is VALIDATING. The default value is false.

    For more information about resource parameters, see this Terraform provider guide.

  2. Create the resources:

    1. In the terminal, navigate to the configuration file directory.

    2. Make sure the configuration is correct using this command:

      terraform validate
      

      If the configuration is valid, you will get this message:

      Success! The configuration is valid.
      
    3. Run this command:

      terraform plan
      

      You will see a list of resources and their properties. No changes will be made at this step. Terraform will show any errors in the configuration.

    4. Apply the configuration changes:

      terraform apply
      
    5. Type yes and press Enter to confirm the changes.

This will create a certificate and DNS record in the specified folder. You can check the new certificate and its settings using the management console or this CLI command:

yc certificate-manager certificate get <certificate_name> --full

To get the information required to pass a domain rights check, use the get REST API method for the Certificate resource or the CertificateService/Get gRPC API call with the view=FULL flag.

Note

For a successful DNS domain rights check based on a CNAME record, make sure the _acme-challenge subdomain of the domain name you are checking has no other resource records except CNAME. For example, for the _acme-challenge.example.com. domain name, there should only be a CNAME record and no TXT record.

Was the article helpful?

Previous
Getting the contents of a certificate
Next
Renewing a certificate
© 2026 Direct Cursus Technology L.L.C.