Wildcard SSL Certificates — Setup and Pitfalls
Learn how wildcard SSL certificates work, when to use them, and common mistakes to avoid.
Diagnose your site now
Problem
You want to secure multiple subdomains with a single SSL certificate but aren’t sure how wildcard certificates work or if they’ll cover your use case.
How Wildcard SSL Works
- A wildcard certificate for
*.example.comsecures one level of subdomains. - Covered:
www.example.com,api.example.com,app.example.com - Not covered:
example.com(root),staging.api.example.com(two levels)
Top 3 Pitfalls
- Assuming root domain is covered — Always check the SAN list. Most CAs include
example.com+*.example.com, but some don’t. - Multi-level subdomains —
*.example.comdoes NOT matcha.b.example.com. You need a separate cert or multi-SAN certificate. - DNS-01 challenge automation — Wildcard certs from Let’s Encrypt require DNS-01 validation. If your DNS provider doesn’t support API-based TXT record updates, auto-renewal will fail.
Diagnosis with DechoNet
- SSL Check — Verify the certificate’s SAN list to confirm which domains are covered.
- DNS Lookup — Check if
_acme-challengeTXT records exist for Let’s Encrypt validation.
Resolution Checklist
- Confirm the wildcard cert covers both
*.example.comandexample.comin the SAN list. - For multi-level subdomains, issue a separate certificate or use a multi-SAN cert.
- Automate DNS-01 challenge with your DNS provider’s API (Cloudflare, Route53, etc.).
- Set up auto-renewal with certbot or ACME client and test with
--dry-run. - After installation, verify the full chain with DechoNet SSL Check.
Related Tools
Related Guides
Share this guide
[Ad] Guide Detail Inline