The Skysnag Blog

How to Set Up DKIM for Episerver?

September 30, 2022  |  < 1 min read
Episerver

DomainKeys Identified Mail (DKIM) is a method for email senders to digitally sign email messages in a way that can be verified by email receivers. This allows receivers to verify that the message truly came from the sender, and has not been tampered with. DKIM is intended to address some of the flaws in the existing email system, such as spoofing, phishing, and message tampering. 

How to Configure DKIM for Episerver

Multiple DNS records must be set up in order to use a preferred domain. The domain example.com is used as an example in the configuration procedures that follow.

1. To approve the subdomain and assure compatibility, configure a new CNAME-RR entry.

  • Domain: mailing._domainkey.t.example.com
  • Value: dkim.srv2.de.

2. To allow the Optimizely servers to use your domain when sending emails through Optimizely Campaign, create a new CNAME-RR entry.

  • Domain: mailing._domainkey.example.com
  • Value: dkim.srv2.de.

3. To set a DMARC record and shield your domain against email spoofing, create a new TXT-RR entry.

  • Domain: _dmarc.example.com
  • Value: v=DMARC1; p=reject; rua=mailto:dmarc@example.com;

4. Optional: You must add a CNAME record for validation if domain management self-service is enabled in your client. (Replace VERIFICATION CODE with the string presented in the Campaign UI; see Adding a domain in the User Guide for more information.)

  • Domain: VERIFICATION_CODE.t.example.com
  • Value: t.example.com.

Use our free DKIM record lookup tool to validate the published DKIM record.

Enable DMARC for your domains to protect against spoofing. Sign up for a free trial today!

For more information on Episerver DKIM setup, you can refer to their reference documentation

Enforce DMARC, SPF and DKIM in days - not months

Skysnag helps busy engineers enforce DMARC, responds to any misconfigurations for SPF or DKIM which increases email deliverability, and eliminates email spoofing and identity impersonation.

Check your domain’s DMARC security compliance