Domain Keys Identified Mail (DKIM) authentication allows the recipient to detect modification of the message body, including the from address, and attachments. DKIM uses a digital signature stored in the email envelope that can be used by the recipient to authenticate the message.
DKIM is set-up in the mail server, so you will need to follow the instructions for your mail server. Setting up DKIM typically involves:
- Generating cryptographics keys for your domain.
- Adding a record to you DNS based on the cryptographic keys you generated.
- Turning DKIM signing on.
It may sound complicated, however, most mail systems that support DKIM profile will guide you through this step by step.
DKIM support articles for some common mail providers
- Google G Suite – Enhancing email security, Authenticate email with DKIM - Set up DKIM to prevent email spoofing.
- Microsoft 365 – Protecting against threats, Use DKIM to validate outbound email sent from your custom domain.
- Zoho mail – Email hosting setup, DKIM - DomainKeys Identified Mail
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article