Cloudflare Target
The Cloudflare Target stores Cloudflare credentials in Akeyless. It is used as a DNS provider in certificate automation flows that rely on ACME DNS-01 validation.
Akeyless uses a Cloudflare credentials target as the DNS provider reference (dns-target-creds) when creating or updating Public Certificate Authority (CA) targets.
How Cloudflare Fits in Akeyless
Cloudflare is part of the certificate lifecycle path, not a standalone public CA in Akeyless.
Use a Cloudflare target with the following target types:
In these flows:
- The public CA target handles ACME issuance.
- The Cloudflare credentials target handles DNS TXT record updates for DNS-01 validation.
- The PKI Issuer issues and stores certificates through Akeyless.
Create a Cloudflare Target with the CLI
akeyless target create cloudflare \
--name <Target Name> \
--api-token <Cloudflare API Token> \
--account-id <Cloudflare Account ID>Where:
-
name: A unique name for the target. The name can include a path to a virtual folder by using slash/separators. If the folder does not exist, Akeyless creates it with the target. -
api-token: Required. A Cloudflare API token with permission to create and delete DNS TXT records in the relevant zone. -
account-id: Optional. The Cloudflare account ID associated with the token. -
key: Optional. Use this when you want to encrypt target secret values with a specific protection key instead of the account default key.
View the complete list of parameters for this command.
Create a Cloudflare Target in the Console
-
Log in to the Akeyless Console, and go to Targets, then New, then Cloudflare.
-
Define the Name of the target, and specify the Location as a path to the virtual folder where you want to create the new target, using slash
/separators. If the folder does not exist, it will be created together with the target. -
Select a Protection key with a Customer Fragment to enable Zero-Knowledge and click Next. Read more about Zero-Knowledge Encryption.
-
Define the following parameters:
-
API Token: Required. A Cloudflare API token with permission to create and delete DNS TXT records.
-
Account ID: Optional. The Cloudflare account ID associated with the token.
- Click Finish.
Use the Cloudflare Target in ACME Flows
When using DNS-01 challenge with Cloudflare, configure the Public CA target with:
--dns-target-creds: The name of the Cloudflare target.--dns-zone: The Cloudflare DNS zone name used for DNS-01 records.
For parameter-level details, see CLI Reference - Akeyless Targets.
Related Akeyless Capabilities
Cloudflare-connected certificate automation works together with:
- PKI Issuers and Certificate Issuance
- Certificate Storage
- Event Center for pending expiration and expired certificate events
- Gateway when required by target and forwarding architecture
Implementation Flow
- Create a Cloudflare target using either the CLI command above or the Console flow.
- Create a public CA target (Let's Encrypt, DigiCert, or Google CA) with
--acme-challenge=dns. - Set
--dns-target-credsto the Cloudflare target name and set--dns-zone. - Create or update your PKI Issuer to use that public CA target.
- Configure certificate expiration notifications in Event Center forwarders.
Updated 37 minutes ago
