Setup

DNS & Domain

The DNS records you need to add at your domain registrar (GoDaddy, Cloudflare, Namecheap, etc.) to wire up your public website and custom email domain. Click Verify All once the records are live.

The DNS & Domain page (/settings/dns) lists every DNS record you need to add at your domain registrar to make the website and email work. The records auto-populate after you configure Email Domain and add your domain on Website. You paste them at your registrar, wait for propagation, then click Verify All.

DNS Settings page with Website, Email, Security records grouped into cards and Verify All button highlighted
DNS Settings: (1) Website records (A), (2) Email records (MX/A/CNAME/SRV), (3) Security records (SPF/DKIM/DMARC), (4) Verify All button.

The records — what each one does

Website (2 records)

TypeNameValuePurpose
A@82.27.1.23Apex domain points at the SigmaDSA web server.
Awww82.27.1.23www subdomain → same server. Both yourdsa.com and www.yourdsa.com resolve.

Email (4 records)

TypeNameValuePurpose
MX@mail.yourdsa.com (priority 10)Routes incoming *@yourdsa.com mail to your SigmaDSA mail server.
Amail82.27.1.23mail.yourdsa.com subdomain → mail server IP.
CNAMEautodiscovermail.yourdsa.comOutlook auto-configuration.
SRV_autodiscover._tcp0 443 mail.yourdsa.comFallback auto-config for clients that don't use CNAME.

Security (3 records — SPF / DKIM / DMARC)

TypeNameValuePurpose
TXT@v=spf1 mx a ip4:82.27.1.23 ~allSPF — authorises the mail server to send for your domain.
TXT_dmarcv=DMARC1; p=quarantine; rua=mailto:postmaster@yourdsa.comDMARC — anti-spoofing policy + aggregate report destination.
TXTdefault._domainkeyv=DKIM1; k=rsa; p=<long key>DKIM — signing key for outgoing email integrity.

How to add the records at your registrar

The exact UI varies by registrar but the concepts are universal.

GoDaddy

DNS Management → Records section → Add. Each row maps:

  • Type → Type (A, MX, CNAME, SRV, TXT).
  • Host → Name (@, www, mail, etc.).
  • Points to / Value → Value.
  • TTL → 1 Hour (default).

Cloudflare

DNS → Records → Add record. Important: for MX / mail. A / autodiscover CNAME, click the Proxy status column and set to DNS only (grey cloud). The website A records can stay proxied (orange cloud) for CDN.

Namecheap

Advanced DNS → Add New Record. Same field mapping as GoDaddy.

Google Domains / Cloudflare Registrar

Similar flow — find the DNS panel, add records one by one matching Type / Name / Value.

Verify

Once records are added (and you've waited at least 5–10 minutes for propagation):

Click Verify All

Top of the page. SigmaDSA does an authoritative DNS lookup for each record and compares against the expected value.

Status per record

Each row's status flips to Verified ✓ or Failed ✗. Failed rows show the actual returned value next to the expected one — pinpointing the difference.

Re-run after fixing failures

Common fixes: trailing dot issues, Cloudflare proxy, DKIM line breaks. Edit at the registrar → wait 5 min → re-Verify All.

What works after all records verified

CapabilityRequires
Public website live at your domainWebsite A records verified + Publish toggled on (under Website page)
Send/receive email at *@yourdsa.comMX + mail-A records verified
Outlook auto-configures with email + passwordCNAME autodiscover + SRV records verified
Outgoing email lands in customer inbox (not spam)SPF + DKIM + DMARC records all verified
Customer mailbox shows the "verified domain" indicatorDMARC p=quarantine or p=reject policy

Common issues

  • MX value got domain appended — registrar requires either bare hostname OR fully-qualified with a trailing dot. Set to mail.yourdsa.com. (with trailing dot) at Cloudflare and Namecheap; mail.yourdsa.com (no dot) at GoDaddy and Google Domains.
  • DKIM TXT too long error — split into 255-char chunks at most registrars; Cloudflare allows up to 2048 chars in one value. If split, surround each chunk with quotes: "first-chunk" "second-chunk".
  • SPF ~all vs -all~all (soft fail) is the default — failing-SPF mail still arrives but gets flagged. After deliverability is stable, switch to -all (hard fail) to fully reject spoofed mail.
  • DMARC p=none for first month — if you're worried about over-quarantining your own legitimate mail, start with v=DMARC1; p=none; rua=... to monitor. Switch to p=quarantine once aggregate reports show no false positives.

Permission gating

Admin role. The Verify All action is non-destructive — no permissions needed for end users.

Next steps