Custom domains, DNS, SSL,
all the terms explained.
Working definitions of the terms SaaS teams keep running into when they ship custom domains. No fluff, no marketing copy, links to the real-world implementation where it matters.
114 terms across 8 categories.
Custom Domains & SaaS
22 terms- ALIAS record
A non-standard DNS record type that behaves like a CNAME but is allowed at the apex. Implemented by several DNS providers under different names.
- ANAME record
DNS Made Easy's branded version of ALIAS / CNAME flattening. Same purpose: CNAME-like behavior at the apex, returning A records to resolvers.
- Apex domain (naked / root domain)
The bare domain without any subdomain prefix. The DNS standard doesn't allow CNAME records here, which is the root cause of a lot of custom-domain setup pain.
- Bring your own domain (BYOD)
A SaaS feature where users provide a domain they already own and the SaaS makes it work, instead of the SaaS selling them the domain.
- CNAME flattening
A DNS provider feature that lets you publish a CNAME-like record at the apex by resolving it server-side and returning A records to the resolver.
- Custom domain
A domain a customer points at a SaaS product so their content serves under their own brand instead of the SaaS's default URL.
- Custom domain API
A REST API that lets a SaaS product accept and serve traffic on customer-owned hostnames, including TLS, routing, and DNS monitoring.
- Custom domains as a service
The category of SaaS that abstracts custom-domain infrastructure (TLS, routing, DNS monitoring) behind an API so other SaaS don't have to build it.
- DNS API
An API that lets you read and write DNS records programmatically. The underlying primitive most custom-domain SaaS products build on top of.
- DNS provisioning
Programmatic creation and management of DNS records via API. The plumbing under any 'connect your domain' flow in a SaaS app.
- Domain API
A REST API for buying, transferring, and managing domain names programmatically. The registrar's automation layer for resellers and SaaS apps.
- Domain aliasing
Mapping one domain to another so requests for the alias are served by the target. Implemented at DNS (CNAME), HTTP (redirect), or routing layer (transparent proxy).
- Domain forwarding
An HTTP redirect that sends users from one domain to another. The address bar changes. Different from domain mapping, which is invisible to users.
- Domain mapping
Configuring a domain so requests to it are routed to a different destination at the application layer (e.g. proxied to your SaaS) rather than redirected via HTTP.
- Domain redirect (301 vs 302)
Two HTTP status codes for redirects. 301 means 'permanent, update your bookmarks'; 302 means 'temporary, keep coming to the original'. The choice affects SEO.
- Multi-tenant custom domains
The architecture pattern for a SaaS serving thousands of customer-owned hostnames from a shared application backend, including per-domain TLS and per-domain routing.
- Subdomain
A label prefixed to a domain, like 'shop' in shop.example.com. Used to delegate sections of a domain to different services or tenants.
- Vanity URL
A branded short URL. Often used loosely as a synonym for vanity domain; more precisely a path-based or shortener-style branded link.
- Vanity domain
A branded version of a SaaS-provided URL. Often a synonym for custom domain, sometimes used specifically for subdomains of the SaaS host.
- Webhook (DNS / domain events)
Webhooks that fire when DNS or domain state changes (verified, cert issued, expired). The plumbing for keeping your app in sync with the domain platform.
- White-label domain
A custom domain served by a SaaS in a way that completely hides the SaaS's name from end-users. The certificate, the HTTP headers, and the UI all read as the customer's brand.
- Wildcard domain
A DNS record like *.example.com that matches every single-label subdomain. The foundation of cheap multi-tenant SaaS routing.
DNS Concepts
28 terms- A record
The DNS record type that maps a hostname to an IPv4 address. The fundamental routing primitive of the internet.
- AAAA record
The IPv6 equivalent of an A record. Maps a hostname to an IPv6 address (128-bit, written in colon-separated hex groups).
- Anycast DNS
DNS hosting where the same IP is announced from many physical locations. Queries route to the nearest. The reason Cloudflare and Route 53 are fast everywhere.
- Authoritative DNS
The DNS servers that hold the canonical records for a zone. Where the buck stops when a resolver needs an authoritative answer.
- CAA record
A DNS record that whitelists which Certificate Authorities can issue certs for your domain. A security control that prevents rogue cert issuance.
- CNAME record
A DNS record that maps a hostname to another hostname. The standard way to delegate a custom domain to a SaaS edge.
- DNS TTL (time to live)
How many seconds a DNS resolver caches a record before re-querying the authoritative server. Lower TTL means faster changes; higher TTL means less load and faster lookups.
- DNS cache
Stored DNS answers held by resolvers (and the OS, and apps) to skip future lookups. The reason DNS scales; also the reason changes take time to propagate.
- DNS flush
Clearing the locally-cached DNS answers so the next query goes back out to the network. Useful for debugging when 'I just changed DNS but I'm still seeing the old value'.
- DNS lookup
The process of converting a hostname like example.com into an IP address. The user-visible side of every web request.
- DNS over HTTPS (DoH)
DNS queries tunneled over HTTPS. Encrypts the DNS lookup so network operators can't see which domains you're resolving, and can't tamper with the answers.
- DNS over TLS (DoT)
DNS queries tunneled over TLS on port 853. Same goal as DoH (encrypt DNS) but uses a dedicated port instead of hiding inside HTTPS traffic.
- DNS propagation
The window of time during which a DNS change has been made at the authoritative server but not yet reached every recursive resolver. Usually minutes to hours.
- DNS resolution
The end-to-end process of turning a domain name into an IP, including caching and the chain from recursive resolver to authoritative server.
- DNS zone / zone file
A DNS zone is a delegated chunk of the domain namespace. A zone file is the on-disk text representation of one. The fundamental unit of DNS administration.
- DNSSEC
DNS Security Extensions. A way to cryptographically sign DNS records so resolvers can verify they haven't been tampered with in transit.
- DS record
Delegation Signer. A DNS record at the parent zone that confirms the child zone's DNSSEC key. The link that makes DNSSEC work across zone boundaries.
- GeoDNS / Geo-routing
DNS that returns different IPs based on the geographic location of the querier. Used to route users to the closest region.
- MX record
A DNS record that tells the world where to deliver email for a domain. Has a priority number; multiple MXs for failover.
- NS record
A DNS record that lists the authoritative nameservers for a zone. Tells the rest of the internet where to ask about records in this zone.
- PTR record
The reverse-DNS record. Maps an IP address back to a hostname. Used by mail servers, logs, and security scanners.
- Recursive DNS resolver
The DNS server that walks the chain from root → TLD → authoritative on behalf of a client and returns the final answer. Caches results aggressively.
- Reverse DNS (rDNS)
Looking up the hostname associated with an IP address, the inverse of normal DNS. Used heavily by mail servers and security tools.
- SOA record
The 'Start of Authority' DNS record at the zone apex. Holds metadata about the zone: primary NS, admin email, serial number, refresh timers.
- SRV record
A DNS record that maps a service name to a host and port. Used by SIP, XMPP, and modern service-discovery tools.
- Split-horizon DNS
DNS that returns different answers depending on who's asking. Used to serve internal IPs to corporate users and public IPs to everyone else.
- TLSA record
A DNS record that pins a TLS certificate to a hostname via DANE. Lets clients verify the cert via DNSSEC instead of the public CA system.
- TXT record
A DNS record that stores arbitrary text. Used for domain ownership verification, SPF email policies, DKIM signatures, and ACME certificate validation.
SSL / Certificates
24 terms- ACME protocol
RFC 8555: the standard protocol for automating certificate issuance and renewal. The reason Let's Encrypt and other free CAs work without humans in the loop.
- Certificate authority (CA)
An organization that issues TLS certificates and whose root key is trusted by browsers and operating systems. The 'who signs your cert' in HTTPS.
- Certificate expired error
The cert's Not After date has passed. Browsers refuse to load the page. The only fix is renewal — there's no client-side workaround that doesn't compromise security.
- Certificate provisioning
The end-to-end process of getting a fresh certificate onto your edge for a newly added domain. The bottleneck of scaling a custom-domain SaaS.
- Certificate renewal
Re-issuing a TLS certificate before it expires. With Let's Encrypt (90-day certs), this is an unavoidable recurring task; at SaaS scale, it must be automated.
- Certificate transparency (CT logs)
Public append-only logs of every TLS certificate issued by trusted CAs. Browsers refuse certs that aren't in CT logs. Lets you find every cert issued for your domain.
- HSTS
HTTP Strict Transport Security. A response header that tells browsers 'never load this domain over plain HTTP again'. Forces HTTPS-only.
- HTTP 525 error
Cloudflare-specific error: TLS handshake between Cloudflare and your origin server failed. Almost always a certificate or SNI problem at the origin.
- HTTP 526 error
Cloudflare error: TLS handshake to your origin succeeded but the origin's certificate isn't trusted. Means a self-signed or expired origin cert.
- Let's Encrypt
A free, automated, public Certificate Authority. The default issuer for most modern SaaS custom-domain setups.
- Multi-domain certificate
Another name for a SAN certificate. A single cert valid for multiple hostnames listed in the Subject Alternative Name field.
- NET::ERR_CERT_COMMON_NAME_INVALID
Chrome error when the hostname you typed doesn't match any name on the server's certificate. The user's only fix is the site owner re-issuing the cert.
- SAN certificate
A TLS certificate that covers multiple hostnames in one file via the Subject Alternative Name extension. The standard way to cover several names per cert.
- SNI (Server Name Indication)
Server Name Indication. A TLS extension that lets the client tell the server which hostname it's connecting to, before the cert is presented. Required for hosting many TLS sites on one IP.
- SSL certificate
A digital file that binds a public key to a domain and is signed by a trusted Certificate Authority. The proof browsers use to trust HTTPS connections.
- SSL handshake failed
A generic error that means the TLS handshake between the client and your server didn't complete. Usually one of four root causes; mostly fixable.
- SSL/TLS handshake
The negotiation at the start of every HTTPS connection where client and server agree on a cipher, exchange keys, and verify the certificate.
- Self-signed certificate
A cert signed by its own private key, not by a trusted CA. Useful for testing; browsers reject it for production sites.
- TLS certificate
The proper name for what most people call an SSL certificate. SSL was deprecated in 2015; today's connections use TLS, but the 'SSL' name stuck.
- TLS handshake failed
The error that fires when a browser and server can't agree on how to set up a TLS connection. Usually means cert, protocol, or cipher mismatch.
- TLS termination
The point in your infrastructure where the TLS handshake completes and the data is decrypted. Usually at the edge or load balancer, not the app servers.
- Wildcard SSL certificate
A cert valid for *.example.com — covering any single-label subdomain. Useful for tenant subdomains; not useful for unrelated customer domains.
- X.509
The standard format for public-key certificates. Every TLS certificate, every PKI artifact you've ever encountered, is X.509.
- mTLS (mutual TLS)
Mutual TLS. Both client and server present a certificate during the handshake. Used for machine-to-machine auth without API keys.
Domain Verification
7 terms- DNS as code
Managing DNS records in a Git repo and applying them via CI/CD. Treats DNS like Terraform-managed infra instead of clicky-clicky panel state.
- DNS challenge (ACME DNS-01)
DNS-01 proves domain control by publishing a TXT record. The only ACME challenge that works for wildcard certs and on hosts not reachable on port 80.
- DNS template
A reusable set of DNS records you apply to many domains. Cuts the per-customer DNS setup from a 10-record checklist to a single apply.
- DNS verification
The step in custom-domain onboarding where a SaaS confirms the customer actually owns or controls the domain by checking a record only they could have set.
- Domain Connect protocol
An open standard that lets SaaS apps configure DNS at the customer's DNS provider with a single click, no copy-paste of records required.
- Domain Connect template
A JSON document hosted by a SaaS app that lists DNS records to apply at the customer's DNS provider. The contract for a Domain Connect integration.
- HTTP-01 challenge
HTTP-01 proves domain control by serving a file at a special URL on port 80. Simplest ACME challenge but breaks on firewalled or wildcard hostnames.
Email & Deliverability
12 terms- ARC (Authenticated Received Chain)
ARC lets intermediaries (mailing lists, forwarders) preserve authentication signals so DMARC doesn't break when mail is relayed.
- BIMI (Brand Indicators)
BIMI displays your brand logo next to authenticated emails in supported inboxes. Requires DMARC enforcement plus a Verified Mark Certificate.
- DKIM (DomainKeys Identified Mail)
A cryptographic signature on outgoing email headers, verified against a public key in DNS. Proves the email actually came from someone authorized at the claimed sender domain.
- DKIM selector
A DKIM selector lets one domain publish many DKIM keys at once. Each selector is a subdomain that holds a separate public key.
- DMARC
A policy a domain publishes saying what receivers should do with mail that fails SPF and DKIM. The top layer of the email-authentication stack.
- DMARC alignment
DMARC alignment is the rule that SPF or DKIM has to validate against a domain that matches the From: header. Without alignment, spoofers slip through.
- DMARC policy
The DMARC policy tag tells receivers what to do with failing mail: do nothing, quarantine to spam, or reject outright. Most domains never make it past 'none'.
- DMARC reports (RUA / RUF)
DMARC's `rua=` collects aggregate XML reports; `ruf=` collects per-message forensic reports. You need rua to see what's going on; ruf is mostly dead.
- MTA-STS
MTA-STS forces sending mail servers to use TLS when delivering to your domain. Closes the downgrade-attack hole in SMTP.
- SPF (Sender Policy Framework)
A TXT record that lists which servers are allowed to send email from your domain. The first of the three email-authentication standards (SPF, DKIM, DMARC).
- SPF flattening
SPF flattening replaces include: references with raw IPs to dodge SPF's 10-DNS-lookup limit. Necessary evil for big senders; comes with maintenance debt.
- TLS-RPT
TLS-RPT collects daily reports of TLS delivery failures on your inbound mail. The visibility layer for MTA-STS deployments.
Domain Registration
9 terms- Domain expiration / grace period
After a domain expires, there's a ~30-day grace period where you can still renew at normal price. Miss that and you're in the $100-redemption window.
- Domain registrar
An ICANN-accredited company that sells domain names to the public. The middleman between you and the registry that operates a TLD.
- Domain transfer
Moving a domain from one registrar to another. Takes 5-7 days, requires unlocking the domain, getting an auth code, and approving the transfer.
- EPP auth code
The EPP auth code is the password that lets you transfer a domain between registrars. Always rotates after a transfer for security.
- ICANN
ICANN is the nonprofit that coordinates the global DNS root, accredits registrars, and decides what new TLDs get created.
- RDAP
RDAP is the modern, REST/JSON replacement for WHOIS. Same domain registration data, parseable format, with auth and rate limits built in.
- Registrar lock
A status flag at the registry that blocks transfers, deletions, and certain changes. The first line of defense against domain hijacking.
- TLD vs gTLD vs ccTLD
TLD is the umbrella term. gTLDs are generic (.com, .app, .shop), ccTLDs are country-coded (.uk, .de, .fr). Different rules and registrars apply.
- WHOIS
WHOIS is the legacy protocol for looking up who registered a domain. Mostly redacted now thanks to GDPR. RDAP is the modern replacement.
Performance & Routing
5 terms- CDN (Content Delivery Network)
A globally distributed cache that serves static (and sometimes dynamic) content from edge locations close to users. Reduces origin load and request latency.
- DNS failover
Auto-switching DNS to a backup origin when the primary fails health checks. Cheap multi-region failover, but DNS TTLs cap how fast it can be.
- DNS load balancing
Distributing traffic across multiple servers by returning different IPs in DNS responses. Cheap, but TTL caching makes it imprecise.
- Edge network
Distributed servers close to users that terminate TLS, run cache, and sometimes execute code. The serving layer in front of your origin.
- Latency-based routing
DNS routing that sends users to the nearest origin region by measured latency, not geography. The standard pattern for multi-region apps.
Security
7 terms- DNS hijacking
Attacker takes control of a domain's DNS to redirect traffic. Happens via stolen registrar credentials, BGP attacks, or compromised DNS hosts.
- DNS spoofing / cache poisoning
Injecting forged DNS responses into a resolver's cache so it returns the wrong IP for a domain. Mitigated by DNSSEC and source-port randomization.
- Dangling DNS record
A DNS record pointing at a target that's no longer under your control. The exact precondition for subdomain takeover.
- Domain reputation
How email providers, browsers, and search engines score a domain's trustworthiness. Affects deliverability, ranking, and whether warnings show in browsers.
- Email spoofing
Forging the From: address on email to impersonate a domain. The exact attack DMARC was designed to stop, when DMARC is actually enforced.
- Subdomain takeover
A vulnerability where a domain still points at a service that no longer owns the hostname, letting an attacker claim it. Custom-domain SaaS prevents this with re-verification.
- Typosquatting
Registering domains that are misspellings of legitimate brands (gooogle.com, paypa1.com) to trick users. Defended via defensive registration and UDRP.
Need an API for the things in this glossary?
Custom domains, automatic SSL, CNAME flattening, DNS monitoring, webhook events. One API. 50 hostnames + 100 GB bandwidth free.