0
NOTE: I am a marketing strategy consultant not a technology consultant, so:
I have a client for whom we are using a 3rd party's cloud hosting solution to create small (single page) websites for their customers. In the end client sector, it will be very difficult for all customers to get their own MyWebSite.com name, which is one factor why my client wants to use sub-domains for these sites: XYZ.MyClient.com. End customers are fine with this solution from what we have seen.
The 3rd party cloud hosting firm we are using says we should just use a wildcard A NAME (e.g. *.MyClient.com), and this will route all sub-domain traffic through their platform and to the correct site without affecting the main domain at all (www.MyClient.com).
My client's outsourced IT firm maintains that no, this wildcard solution will in fact route all www.MyClient.com traffic through the 3rd party hosting firm before getting to the right site. They assert the best solution is to create an A NAME record for each subdomain and to manage those moving forward for hundreds of sites.
I just need answers for I can facilitate the discussion between all parties - I don't really care what the answer is. I just want my client to have a secure, manageable, cost-effective solution. My questions then are:
- Will using an A NAME wildcard approach in fact route the core www.MyClient.com through the 3rd party hosting firm?
- If so, why is that a problem? Delay? Security? Other?
- I have read elsewhere (tho it was a 5 year old post) that it would be good to have a separate security certificate for the sub-domain setup. Is that so? If so, can anyone point me to a good reference on that?
- Managing hundreds of A NAME records for subdomains strikes me as creating a lot of work that will lend itself to errors and rework. True, or not?
- Am I missing something?
Thanks
1https://tools.ietf.org/html/rfc4592#section-2.2.1 has informations about this category of problems. I'd rather not write anything else to avoid any mistake – A.B – 2018-01-18T23:20:13.163