Custom Domains & SSL Architecture
Learn how ArylHive securely manages unmetered Custom Domains using Cloudflare Custom Hostnames (SSL for SaaS) and dynamic routing logic at the Edge.
1. SSL for SaaS Provisioning Lifecycle
To provide seamless wildcard support and zero-configuration SSL certificates, ArylHive utilizes Cloudflare's Enterprise SSL for SaaS endpoint architecture. Users simply add a domain, point a CNAME, and everything else is completely automated down to certificate renewals.
2. Edge Router Resolution Logic
When a user connects to a custom domain (e.g., https://my-blog.com), the Edge Controller needs to understand which internal project it belongs to.
- The Edge Controller reads the
Hostheader of the incoming request. - Instead of the standard subdomain
project.aryl.app, the script identifies it as an alien custom domain. - It queries the Turso DB
projectstable by attempting to match thecustom_domaincolumn instead of thesubdomaincolumn. - Once the project is resolved, the deployment logic resumes normally.
3. Domain Ownership Verification
To protect against domain hijacking, users who want to connect Apex domains (example.com) must verify their ownership via a generated TXT record. Subdomains (docs.example.com) utilize CNAME chaining to automatically pass ownership verification since pointing the CNAME intrinsically proves DNS control.
4. Advanced: Wildcard Propagation
The platform fallback endpoints (*.aryl.app and *.aryl.cloud) utilize wildcard DNS and wildcard Universal SSL. This means that a user instantly gets HTTPS coverage the exact millisecond they create a new project—there is no waiting for SSL propagation on default hostnames.
Next: Learn about Environment Variables →
