Learn how DKIM works and how to monitor your DKIM configuration with DMARC Monitor.
DKIM (DomainKeys Identified Mail) is an email authentication method that adds a digital signature to outgoing emails. This signature allows receiving servers to verify that the email was actually sent by an authorized server and wasn't modified in transit.
DKIM-SignatureDKIM uses a TXT record at a specific selector subdomain. For example, if your selector is "google":
Type: TXT
Host: google._domainkey
Value: v=DKIM1; k=rsa; p=MIIBIjANBgkqh...
The "p=" part contains your public key. Each email service (Google, Microsoft, SendGrid, etc.) has its own selector and key.
DKIM setup varies by email provider. Here are the most common:
| Tag | Description |
|---|---|
| v=DKIM1 | Version identifier (required) |
| k=rsa | Key type (rsa is most common) |
| p= | Public key (base64 encoded) |
| t=s | Testing mode (optional) |
| h=sha256 | Hash algorithm |
Some DNS providers have character limits. You may need to split the key into multiple strings or use 1024-bit keys instead of 2048-bit.
Each email service uses different selectors. Make sure you're using the correct selector name (e.g., "google", "selector1", "s1").
After adding DKIM records, wait up to 48 hours for DNS propagation before enabling authentication.
DKIM is one of two mechanisms DMARC uses to authenticate email (the other being SPF). For an email to pass DMARC, it needs:
Tip: Set up both SPF and DKIM for maximum protection. If one fails, the other can still authenticate your email.