The Skysnag Blog

How to Set Up DKIM for Jilt?

October 1, 2022  |  < 1 min read
Jilt

DKIM works by adding a digital signature to outgoing email messages. This signature can be verified by the receiving email server, which can then determine whether or not the message has been tampered with during transit. In order for DKIM to work, the sending email server must generate a cryptographic key pair, which consists of a private key and a public key. The private key is used to sign outgoing email messages, while the public key is published in the Domain Name System (DNS). When an email message is signed with DKIM, the signature is added as a header to the message. The receiving email server can then use the public key to verify the signature and confirm that the message has not been altered.

Steps to Configure DKIM for Jilt

  • Sign in to your Jilt account.
  • Select on From Addresses after expanding the Setting choices.
  • Find the domain you want to enable DKIM for on this page, then select Authenticate >  Continue
  • Your DKIM keys will be shown in a dialog window.
  • Copy the record to the clipboard

How to Get Your DKIM Public Key Available for Jilt

  1. Sign in as the administrator to your DNS provider’s administration console.
  2. Go to the DNS records section of each of your domains.
  3. Depending on the type of DKIM record that has been provided to you, generate a TXT or CNAME record.
  4. Copy and paste the hostname and value
  5. Save your record’s modifications and wait 48–72 hours for your DNS to take effect.

Use our free DKIM record lookup tool to validate the published DKIM record.

You can use Skysnag’s free DKIM Checker to check the health of your DKIM record here

Enable DMARC for your domains to protect against spoofing. Sign up for a free trial today!

Enforce DMARC, SPF and DKIM in days - not months

Skysnag helps busy engineers enforce DMARC, responds to any misconfigurations for SPF or DKIM which increases email deliverability, and eliminates email spoofing and identity impersonation.

Check your domain’s DMARC security compliance