Find cheap domain names for your website - namesilo.com
Namesilo Blog
Blog

Custom Hostnames at Scale: Rate Limits, Ownership Proof Rotation, and Safe Offboarding

NS
NameSilo Staff

11/13/2025
Share
Offering custom hostnames, letting customers use their own domains to access your SaaS platform, transforms user experience from customer123.yourplatform.com to app.customer.com. This feature elevates perceived professionalism and enables white-label scenarios. It also introduces significant technical complexity around domain verification, certificate provisioning, routing, and lifecycle management that must work reliably across thousands or millions of customer domains.
Building custom hostname features that scale requires navigating DNS verification patterns, ACME certificate rate limits, ownership proof rotation, propagation delays, and safe offboarding that prevents service disruption. Understanding these challenges helps you architect solutions that work reliably while avoiding common pitfalls.

Domain Ownership Verification Patterns

Before routing traffic to customer domains, you must verify they actually control those domains. Two primary patterns dominate: TXT record verification and CNAME verification, each with distinct operational characteristics.
TXT Record Verification
TXT record verification requires customers to add a specific TXT record to their DNS containing a token you provide. Your platform periodically queries for this record, and once confirmed, considers the domain verified.
This pattern works well because TXT records don't affect existing services. Customers can verify ownership without changing how their domain currently resolves. The verification record typically lives at a subdomain like _yourplatform-verification.customer.com, completely isolated from production traffic.
The challenge is persistence. Customers sometimes remove verification records after initial setup, either accidentally during DNS cleanup or intentionally believing verification was one-time. Your platform needs continuous verification, checking periodically that ownership records remain in place, to detect when domains should be deprovisioned.
Verification tokens should be unique per customer and unpredictable. Simple patterns like hashing the domain name are vulnerable to enumeration attacks where malicious actors verify domains they don't own by guessing verification tokens.
CNAME Verification
CNAME verification requires customers to point their custom domain to your platform's infrastructure via CNAME record. Verifying the CNAME exists simultaneously confirms ownership and routes traffic correctly.
This pattern is operationally simpler, one DNS record serves both verification and routing. It's easier to explain to customers and reduces configuration steps. The CNAME target typically points to your edge infrastructure: customer.com CNAME proxy.yourplatform.com.
However, CNAME verification carries risks. If you accept CNAMEs without additional verification, attackers could point domains they don't own to your infrastructure, potentially using your platform for phishing or abuse. Layering TXT verification on top of CNAME requirements provides defense in depth.
CNAME records also prevent using the apex domain (example.com without subdomain) due to DNS protocol constraints. Customers must use subdomains (www.example.com or app.example.com), which some find restrictive.
Hybrid Approaches
Many platforms use hybrid verification: require CNAME for routing but also verify a TXT record to confirm ownership separately from routing configuration. This combines CNAME's routing simplicity with TXT's stronger ownership proof.
For organizations offering hosting services that integrate custom domains, hybrid verification provides robust protection against domain hijacking attempts while maintaining user-friendly setup.

ACME Certificate Rate Limits

Automated certificate provisioning via ACME (Let's Encrypt) enables offering SSL certificates for customer domains, but ACME rate limits constrain how many domains you can provision simultaneously.
Understanding the Limits
Let's Encrypt enforces several critical rate limits: 50 certificates per registered domain per week, 300 new orders per account per 3 hours, 5 duplicate certificates per week for identical names, and failed validation limits that can temporarily block domains.
For SaaS platforms, the "50 certificates per registered domain" limit is particularly challenging. If customers share common domain registrars or corporate infrastructure, multiple customers using subdomains under the same parent domain all count against this shared limit.
Architectural Strategies
Distribute certificate requests across multiple ACME accounts. Rather than a single platform account, create account pools that spread load and prevent any single rate limit from blocking large-scale provisioning.
Batch certificate requests intelligently. When customers add domains, queue them for certificate provisioning rather than requesting immediately. Process queues in batches that respect rate limits, prioritizing new customers or expiring certificates.
Implement retry logic with exponential backoff. Rate limit errors should trigger delays before retrying, not immediate retry loops that worsen the problem. Track which domains hit rate limits and retry them after limit windows reset.
Monitor rate limit consumption proactively. Before hitting limits, slow new certificate issuance or alert operations teams. Reactive rate limit handling means some customers wait unexpectedly; proactive handling prevents surprises.
Regional Distribution
Use multiple edge infrastructures with separate certificate provisioning. Geographic distribution naturally spreads load across different validation paths and can help avoid single-source rate limit exhaustion.

Per-Tenant Certificates vs Wildcards

Architecture decisions around certificate scope significantly impact operational complexity and security posture.
Individual Certificates Per Domain
Issuing separate certificates for each customer domain provides strong isolation. Certificate compromise for one customer doesn't affect others. Revocation affects only the compromised domain. This isolation matches tenant boundaries cleanly.
However, operational overhead scales with customer count. Managing millions of certificates, tracking expiration, handling renewal, coordinating updates, requires robust automation. Storage and certificate management infrastructure costs increase linearly with tenant count.
Wildcard Certificates
Using wildcard certificates (*.yourplatform.com) for subdomain-based custom hostnames (customer.yourplatform.com) simplifies certificate management dramatically. One certificate covers all customers, eliminating per-tenant certificate provisioning entirely.
The security tradeoff is significant. A compromised wildcard private key affects all tenants. Revocation impacts everyone, not just compromised tenants. Wildcard certificates work well for platforms where all customers use subdomains of your domain, but they don't support true custom domains where customers use their own registered domains.
Hybrid Models
Many platforms use wildcard certificates for default subdomains (customer.yourplatform.com) but individual certificates for custom domains (app.customer.com). This balances operational simplicity for the common case with proper isolation for custom domains.
For SaaS platforms managing email infrastructure alongside web services, certificate strategy must account for both HTTP services and mail server requirements, as these often require different certificate configurations.

DNS Propagation and Caching

Customer DNS changes don't take effect instantly. Propagation delays and caching behaviors create timing challenges in custom hostname provisioning.
Verification Timing
After customers add verification records, wait appropriately before checking. Immediate verification often fails because records haven't propagated. Typical waiting periods range from 60 seconds to several minutes depending on the verification DNS provider's infrastructure.
Implement progressive verification that checks periodically with increasing intervals. Check after 30 seconds, then 60, then 120, backing off if records still don't exist. This balances quick success for well-configured DNS with patience for slower propagation.
Don't cache negative results aggressively. If verification fails because records don't exist yet, retry sooner rather than assuming failure is permanent. Many platforms successfully verify on the second or third check after initial failure.
Certificate Provisioning Delays
ACME validation requires DNS records to propagate to Let's Encrypt's validators. Even if your verification checks confirm records exist, certificate issuance might fail if Let's Encrypt's validators query before propagation reaches them.
Build waiting periods between verification success and certificate requests. This buffer ensures records have time to propagate globally before ACME validation begins.
Traffic Routing Updates
After certificates are provisioned, routing updates must propagate to all edge nodes before traffic flows correctly. Internal cache invalidation, configuration distribution, and routing table updates all take time.
Avoid race conditions where customer traffic arrives at edge nodes that haven't yet received updated routing configuration. Either delay considering domains "active" until routing is confirmed across your infrastructure, or implement fallback routing that gracefully handles unknown hostnames.

Ownership Proof Rotation

Security requires periodically rotating verification tokens to prevent stale credentials from enabling unauthorized access.
Rotation Strategies
Regular rotation, changing verification tokens on a schedule (monthly, quarterly), ensures stale tokens expire. Customers must update their DNS to maintain verified status, confirming they still control domains.
Event-triggered rotation occurs after security events, customer plan changes, or administrative actions. If suspicious activity is detected, rotating verification tokens forces reconfirmation of domain ownership.
Grace periods give customers time to update DNS after rotation begins. Rather than immediately invalidating old tokens, support both old and new tokens for a transition period. After the grace period expires, domains not updated to new tokens lose verification.
Communication
Advance notice prevents surprise service disruptions. Notify customers before verification token rotation, explain what they need to update, and provide clear instructions. Poor communication around rotation causes support burden as confused customers experience unexpected issues.
Automated monitoring detects when customers haven't updated tokens before grace periods expire. Proactive outreach to at-risk customers reduces involuntary deprovisioning.

Safe Offboarding and Cleanup

When customers stop using custom hostnames, whether canceling service, changing configuration, or being removed for non-payment, safe offboarding prevents both customer disruption and platform abuse.
Gradual Deprovisioning
Don't immediately delete all configuration when customers remove domains. Grace periods allow customers to restore accidentally deleted configurations without losing certificates and routing.
However, balance grace against security. Maintain ownership verification even during grace periods. If verification fails, treat it as intentional removal and proceed with full deprovisioning.
Certificate Handling
Revoke certificates for deprovisioned domains to prevent potential misuse if private keys were compromised. However, revocation can disrupt customers who are actively migrating. Clear policies around when revocation occurs balance security and customer experience.
Consider whether to delete certificates immediately or archive them temporarily. Some customers remove and re-add domains frequently. Retaining certificates briefly (7-30 days) enables faster re-provisioning without requesting new certificates.
Traffic Routing Cleanup
Remove routing configuration promptly to prevent domains from pointing to your infrastructure without active service. Stale routes can be exploited for abuse if domains are reassigned to other owners who point them to your platform expecting no response.
Verify removal propagates across all edge infrastructure. Partial cleanup where some nodes still route traffic while others don't creates inconsistent behavior and potential security issues.
Data Retention
Determine policies for retaining customer domain configuration history. Audit logs showing when domains were added, verified, and removed help investigate disputes or security incidents. However, retention must comply with data protection regulations and customer agreements.

Monitoring and Alerting

Comprehensive monitoring catches issues before they impact customers at scale.
Track verification success rates, certificate provisioning latency, renewal success rates, and rate limit consumption. Degradation in any metric indicates problems requiring investigation.
Alert on unexpected patterns: spike in verification failures suggests DNS issues or targeted attacks, increased certificate provisioning time indicates rate limiting or ACME service degradation, and verification re-confirmation failures warn of customers inadvertently breaking their configuration.
Per-customer monitoring tracks individual domain health. Some platforms dashboard each customer's custom domain status, verification state, certificate expiration, recent errors, enabling support teams to diagnose issues quickly.

Architectural Patterns at Scale

Successful custom hostname platforms implement several common architectural patterns.
Dedicated infrastructure for hostname management separates this complex subsystem from core application logic. Services focused solely on verification, certificate provisioning, and routing updates operate independently with clear APIs.
Event-driven workflows handle hostname lifecycle operations asynchronously. Adding a domain triggers verification jobs, successful verification triggers certificate provisioning, certificate success triggers routing updates, each step proceeding independently without blocking user operations.
Configuration state machines track where each domain is in the provisioning lifecycle. Clear state transitions (pending, verifying, verified, provisioning_cert, active, suspended, deprovisioned) make system behavior predictable and debugging straightforward.
For platforms managing domain registration alongside custom hostname features, tight integration between registration services and hostname verification streamlines customer experience, domains registered through your platform can be auto-verified without manual DNS configuration.

The Operational Reality

Custom hostname features at scale require significant engineering investment and operational maturity. The difference between a working proof-of-concept and production-grade infrastructure serving thousands of customers is substantial.
Success requires robust automation, comprehensive monitoring, clear customer communication, and defensive design that gracefully handles the unexpected behaviors customers inevitably introduce. DNS misconfigurations, certificate edge cases, and timing-dependent race conditions all demand careful handling.
However, the feature enables compelling product differentiation and customer value. Organizations investing in proper custom hostname architecture unlock white-label scenarios, professional customer deployments, and platform flexibility that basic subdomain-only offerings can't match. The operational complexity is real, but so is the competitive advantage for products where custom domain support matters.
ns
NameSilo StaffThe NameSilo staff of writers worked together on this post. It was a combination of efforts from our passionate writers that produce content to educate and provide insights for all our readers.
More articleswritten by NameSilo
Jump to
Smiling person asking you to sign up for newsletter
Namesilo Blog
Crafted with Care by Professionals

Millions of customers rely on our domains and web hosting to get their ideas online. We know what we do and like to share them with you.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.