{"id":2901,"date":"2022-11-21T09:53:22","date_gmt":"2022-11-21T09:53:22","guid":{"rendered":"https:\/\/knowledge.progist.net\/?p=2901"},"modified":"2024-06-07T05:27:03","modified_gmt":"2024-06-07T05:27:03","slug":"how-to-set-up-dkim-a-comprehensive-guide-for-dkim-setup","status":"publish","type":"post","link":"https:\/\/knowledge.progist.net\/index.php\/2022\/11\/21\/how-to-set-up-dkim-a-comprehensive-guide-for-dkim-setup\/","title":{"rendered":"How To Set Up DKIM \u2013 A Comprehensive Guide for DKIM Setup."},"content":{"rendered":"\n<p>DomainKeys Identified Mail, or <a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/03\/18\/how-dkim-works\/\" target=\"_blank\" rel=\"noopener\" title=\"\">DKIM<\/a> is an email authentication technique that allows the receiver to check that an email was indeed sent and authorized by the owner of that domain<\/p>\n\n\n\n<p>It uses asymmetric cryptography mechanism to add digital signature to the header of your outbound emails , allowing you to sign your email with your domain name to protects against phishing, email spoofing, and email spam. This lets receiving servers verify that messages aren&#8217;t forged, and weren&#8217;t changed during transit.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How does DKIM work?<\/strong><\/h2>\n\n\n\n<p>DKIM relies on asynchronous encryption that means it allows you to use a private\/public key pair.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The\u00a0private key\u00a0(which is unique to your domain and available exclusively to you. It allows you to encrypt your signature in the header of your messages.)<\/li>\n\n\n\n<li>The\u00a0public key\u00a0(which you add to your DNS records using DKIM standard, in order to allow your recipient\u2019s server retrieve it and decrypt your hidden signature from the header of your message).<\/li>\n<\/ul>\n\n\n\n<p>When a message is sent by an outbound mail server, the server generates and attaches a unique Private DKIM signature to the email message header. The signature is generated in a unique textual string called a \u201chash value\u201d and is encrypted with a private key.<\/p>\n\n\n\n<p>When the recipient\u2019s inbound mail server receives an email, it runs a DNS query to search for the sender domain\u2019s public key. The inbound server then uses this key to detect and decrypt the message\u2019s DKIM signature in header of the message and perform the authenticity of email.<\/p>\n\n\n\n<p>If Public key matches with Private key \u2013 DKIM validation checks pass<\/p>\n\n\n\n<p>If Public key does not match with Private key &#8211; DKIM validation checks failed<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why should you use DKIM?<\/strong><\/h2>\n\n\n\n<p>The main function of a DKIM record is to verify the authenticity of the sender. Below are the Benefits of DKIM which performs the major role in email validation.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It protects the message integrity.<\/li>\n<\/ul>\n\n\n\n<p>Adding a DKIM digital signature to your messages helps verify that the message is from your domain, and that it hasn\u2019t been altered in transit. This protects your recipients from spoofing attacks, where someone could send malicious or spammy messages on your behalf.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Improves Delivery Performance\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Digital signature signed emails are more trustworthy and helps to prevent real emails from being classified as spam and improves email deliverability.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>DKIM Allows Recipients to Trust Your Email<\/li>\n<\/ul>\n\n\n\n<p>DKIM signature lets your recipient know that your message came from an authentic and legitimate domain thus builds the trust with your email vendor\/partner. It also ensures that recipient will not be the part of spoofing attack<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>DKIM Setup: How to configure DKIM in 3 simple steps<\/strong>.<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Generate the key pair(Private key and Public key) on outbound email server<\/li>\n\n\n\n<li>Placing the public key as a TXT record in the DNS panel. Some DNS providers are more difficult to set up\/navigate than others. Our <a href=\"https:\/\/progist.net\/products\/prodmarc.html\" target=\"_blank\" rel=\"noopener\">ProDMARC<\/a> Support team will gladly assist you along the way.<\/li>\n\n\n\n<li>Generate and Save the DKIM-Signature. Ensure email delivery by applying a unique signature to your messages.<\/li>\n<\/ul>\n\n\n\n<p>Make sure to confirm that all of your outgoing domains adhere to the DKIM protocol if your business sends emails from third-party providers. Let us know how we can assist your company in achieving 100% DKIM compliance (as well as <a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/03\/18\/what-is-spf\/\" target=\"_blank\" rel=\"noopener\" title=\"SPF\">SPF<\/a> and <a href=\"https:\/\/blog.progist.net\/dmarc-prevents-fraud-using-multi-pronged-approach\/\" target=\"_blank\" rel=\"noopener\">DMARC<\/a> compliance).<\/p>\n\n\n\n<p>Below are the DKIM configuration settings for some of the authorized emailing platforms:<\/p>\n\n\n\n<p>Cisco Ironport(ESA)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2022\/04\/04\/configuring-dkim-on-cisco-ironport-esa\/\" target=\"_blank\" rel=\"noopener\" title=\"CIsco ESA\">Cisco Ironport(ESA)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/12\/13\/enable-dkim-signing-from-the-gsuite-admin-panel\/\" target=\"_blank\" rel=\"noopener\" title=\"Gsuite Admin panel\">Gsuite Admin panel<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/09\/01\/set-up-spf-and-dkim-for-microsoft-dynamics-365\/\" target=\"_blank\" rel=\"noopener\" title=\"Microsoft Dynamics 365\">Microsoft Dynamics 365<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/07\/06\/forcepoint-websense-spf-and-dkim-set-up\/\" target=\"_blank\" rel=\"noopener\" title=\"Forcepoint\">Forcepoint<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/07\/05\/spf-and-dkim-set-up-on-trendmicro\/\" target=\"_blank\" rel=\"noopener\" title=\"TrendMicro\">TrendMicro<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/08\/04\/set-up-spf-and-dkim-for-mimecast\/\" target=\"_blank\" rel=\"noopener\" title=\"Mimecast\">Mimecast<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/06\/28\/spf-and-dkim-set-up-on-proofpoint-essentials\/\" target=\"_blank\" rel=\"noopener\" title=\"Proofpoint\">Proofpoint<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/06\/25\/set-up-spf-and-dkim-on-freshdesk\/\" target=\"_blank\" rel=\"noopener\">Freshdesk<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/06\/23\/zoho-spf-and-dkim-set-u\/\" target=\"_blank\" rel=\"noopener\">Zoho<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/06\/21\/mailgun-set-up-spf-and-dkim-records\/\" target=\"_blank\" rel=\"noopener\" title=\"Mailgun\">Mailgun<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/06\/18\/zendesk-spf-and-dkim-set-up\/\" target=\"_blank\" rel=\"noopener\">Zendesk<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/06\/17\/configure-spf-and-dkim-for-mandrill\/\" target=\"_blank\" rel=\"noopener\">Mandrill<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/06\/11\/setting-up-dkim-for-on-prem-exchange-server\/\" target=\"_blank\" rel=\"noopener\" title=\"On-Prem Exchange Server\">On-Prem Exchange Server<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/05\/19\/manually-upgrade-your-dkim-keys-in-microsoft-office-365-exchange-online\/\" target=\"_blank\" rel=\"noopener\" title=\"Microsoft Office 365 exchange online\">Microsoft Office 365 exchange online<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/03\/18\/dkim-configuration-for-sendgrid\/\" target=\"_blank\" rel=\"noopener\" title=\"Sendgrid\">Sendgrid<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/03\/18\/dkim-configuration-for-mailchimp\/\" target=\"_blank\" rel=\"noopener\">Mailchimp<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/03\/18\/dkim-configuration-for-symantec-cloud\/\" target=\"_blank\" rel=\"noopener\" title=\"Symantec cloud\">Symantec cloud<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/03\/18\/dkim-configuration-for-salesforce-cloud\/\" target=\"_blank\" rel=\"noopener\">Salesforce cloud<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/03\/18\/dkim-configuration-for-forcepoint-cloud\/\" target=\"_blank\" rel=\"noopener\">Forcepoint cloud<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/08\/04\/setting-up-a-spf-domain-custom-mail-from-domain-for-amazon-ses\/\" target=\"_blank\" rel=\"noopener\">amazonSES<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/08\/31\/set-up-spf-and-dkim-for-sap-successfactors\/\" target=\"_blank\" rel=\"noopener\">SAP SuccessFactors<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/07\/09\/configure-spf-and-dkim-set-up-for-oracle-dyn\/\" target=\"_blank\" rel=\"noopener\">Oracle Dyn<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/07\/01\/set-up-spf-and-dkim-for-shopify\/\" target=\"_blank\" rel=\"noopener\" title=\"Shopify\">Shopify<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/08\/30\/set-up-spf-and-dkim-for-zimbra\/\" target=\"_blank\" rel=\"noopener\">Zimbra<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/10\/07\/network-solutions-spf-and-dkim-set-up-2\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Network solution<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/09\/15\/set-up-spf-and-dkim-for-rackspace-cloud\/\" target=\"_blank\" rel=\"noopener\">Rackspace cloud<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/09\/14\/set-up-spf-and-dkim-for-bluehost\/\" target=\"_blank\" rel=\"noopener\">Bluehost<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/09\/08\/set-up-spf-and-dkim-for-hostmonster\/\" target=\"_blank\" rel=\"noopener\" title=\"Hostmonster\">Hostmonster<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/08\/30\/set-up-spf-and-dkim-for-hostinger\/\" target=\"_blank\" rel=\"noopener\" title=\"Hostinger\">Hostinger<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/08\/25\/set-up-spf-and-dkim-for-mailroute\/\" target=\"_blank\" rel=\"noopener\" title=\"Mailroute\">Mailroute<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2021\/08\/09\/to-set-up-spf-and-dkim-for-fastmail-follow-the-steps-given-below\/\" target=\"_blank\" rel=\"noopener\">Fastmail<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2024\/03\/01\/spf-and-dkim-set-up-for-zoho-campaigns\/\" target=\"_blank\" rel=\"noopener\" title=\"Zoho Campaign\">Zoho Campaigns<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/knowledge.progist.net\/index.php\/2024\/04\/29\/dkim-enabling-on-postfix-server\/\" target=\"_blank\" rel=\"noopener\" title=\"Postfix Server\">Postfix Server<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>DomainKeys Identified Mail, or DKIM is an email authentication technique that allows the receiver to check that an email was indeed sent and authorized by the owner of that domain<\/p>\n<p><a href=\"https:\/\/knowledge.progist.net\/index.php\/2022\/11\/21\/how-to-set-up-dkim-a-comprehensive-guide-for-dkim-setup\/\" class=\"more-link\">Continue Reading<span class=\"screen-reader-text\">How To Set Up DKIM \u2013 A Comprehensive Guide for DKIM Setup.<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[6],"tags":[39,41],"class_list":["post-2901","post","type-post","status-publish","format-standard","hentry","category-dkim","tag-dkim","tag-dkim-configuration"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/posts\/2901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/comments?post=2901"}],"version-history":[{"count":4,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/posts\/2901\/revisions"}],"predecessor-version":[{"id":3217,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/posts\/2901\/revisions\/3217"}],"wp:attachment":[{"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/media?parent=2901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/categories?post=2901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledge.progist.net\/index.php\/wp-json\/wp\/v2\/tags?post=2901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}