Glossary

DKIM

Updated

DKIM, or DomainKeys Identified Mail, is an email authentication standard that adds a cryptographic signature to outgoing messages so receiving servers can verify the message was authorized by the sending domain and was not altered after it was signed.

Also known as: DomainKeys Identified Mail, DKIM authentication

Key takeaways

  • DKIM is an authentication method: It helps receiving servers verify that an email was authorized by the sending domain and was not materially changed after signing.
  • DKIM uses keys and DNS: A private key signs outgoing mail, while a public key is published in DNS for receivers to validate the signature.
  • DKIM is not encryption: It does not hide message contents. It supports authenticity and integrity, not message secrecy.
  • Proper setup improves trust: Correct DKIM signing helps support deliverability, domain reputation, and DMARC enforcement.

Understanding DKIM

DKIM helps prove that an email came from a system authorized to send on behalf of a domain and that important parts of the message were not changed after signing. It works by attaching a digital signature to the email headers, which can then be checked by the receiving server.

In practice, the sending platform signs the message with a private key. The matching public key is published in DNS under a selector record, usually in the format selector._domainkey.example.com. When the email arrives, the recipient server looks up that public key and verifies the signature.

DKIM matters because authentication signals affect trust, filtering, and overall deliverability. A valid DKIM signature can support inbox placement and helps strengthen DMARC when the signing domain is properly aligned with the visible From domain.

It is also important to understand what DKIM does not do. DKIM does not encrypt email contents for privacy, and it does not by itself tell receivers how to handle failures. It is one part of a broader authentication setup that usually includes SPF and DMARC.

Example

If your provider signs mail for example.com using the selector mktg, the receiving server may look up mktg._domainkey.example.com in DNS to verify the DKIM signature on the message.

How DKIM works

DKIM relies on a signing key, a DNS record, and a receiving server that validates the result. These parts work together to confirm message authenticity.

Message is signed

The sending platform uses a private key to create a DKIM signature that is added to the outgoing email headers.

Public key is published in DNS

The sender’s domain publishes a DKIM TXT record so receivers can find the matching public key for verification.

Receiver validates the signature

The recipient server checks the signature against the DNS record to confirm the message is valid and unmodified in transit.

Note: A passing DKIM result is strongest when the signing domain is aligned with the visible From domain used in the message.

Decision tree: what to do when DKIM is missing or failing

Authentication result

DKIM missing or DKIM fail

Is the DKIM DNS record published correctly for the right selector and domain?

Next steps: Review how SPF and DMARC work with DKIM.

Key implications

Authentication trust can improve

Correct DKIM signing helps receivers validate email legitimacy and can support better inbox trust.

DMARC depends on alignment

A DKIM pass is most useful when the signed domain aligns with the visible From domain used in the message.

Misconfiguration can hurt deliverability

Missing records, wrong selectors, or broken signing setups can reduce authentication reliability and filtering performance.

Common challenges

Selector or DNS record mismatch

A common issue is publishing the wrong selector or public key, which causes verification to fail.

Multiple sending platforms

Different ESPs and tools may each need their own DKIM setup, selector, or signing configuration.

Confusing DKIM with encryption

DKIM helps prove authenticity and integrity, but it does not keep message contents private.

DKIM vs SPF vs DMARC

TypeWhat it doesCommon risk
DKIMVerifies a cryptographic signature on the emailBroken signing or DNS records can reduce authentication trust
SPFChecks whether the sending server is authorized for the domainForwarding and misconfigured includes can create SPF failures
DMARCApplies policy and alignment rules on top of SPF and DKIMStrict enforcement without proper setup can block legitimate mail

FAQs

What is DKIM?

DKIM, or DomainKeys Identified Mail, is an email authentication standard that adds a cryptographic signature to outgoing email so receiving servers can verify the message was authorized by the sending domain and was not altered after signing.

How does DKIM work?

The sending system signs the email with a private key, and the matching public key is published in DNS. The receiving server uses that public key to validate the DKIM signature on the message.

Does DKIM encrypt email?

No. DKIM does not encrypt the message body for privacy. It helps verify authenticity and message integrity, not confidentiality.

What happens if DKIM fails?

If DKIM fails, the receiving server may treat the email as less trustworthy. Depending on SPF, DMARC, and the recipient’s filtering policies, the message could still be delivered, sent to spam, or rejected.

How is DKIM different from SPF and DMARC?

DKIM verifies a cryptographic signature on the message, SPF checks whether the sending server is allowed to send for the domain, and DMARC tells receivers how to evaluate alignment and what to do when authentication fails.

Do I need DKIM on every sending domain?

In most cases, yes. Any domain used to send email should have DKIM configured correctly, especially for marketing, transactional, and sales outreach streams that affect reputation and trust.