Chat +1-888-563-5277 Contact sales

Mailchimp Authentication Setup: Step by Step

Mailchimp is an automated email marketing platform that’s used by businesses to reach their target audience. In this informative post we’ll go over how to configure and set up MailChimp Authentication with DomainKeys Identified Mail (DKIM), we won’t be going over the SPF set up as of now MailChimp does not support SPF alignment.

Verifying and setting up DKIM for MailChimp

Head to your MailChimp portal and click on websites.

 

mailchimp website

 

And head to Domains.

 

mailchimp domains

 

From there you can start the authentication process.

 

start authentication process mailchimp

 

The first step would be to enter the domain provider that you’re using (NameCheap, GoDaddy…)

 

enter the domain provider that you’re using

 

Then head to your DNS zone to add or edit records.

 

DNS zone

 

In the third step, MailChimp will provide you with two CNAME records containing DomainKeys and selectors unique to your domain. 

Copy the records

 

CNAME records

 

Add a new CNAME record and paste the given two record data by MailChimp.

 

ADD DNS CNAME

 

Note: Turn off the proxy status if you’re using Cloudflare.

The next step would be to sit back and enjoy your coffee while MailChimp verifies everything, this could take a couple of hours up to a full day.

 

check status mailchimp

 

Once everything is set, MailChimp will let you know that your domain is authenticated and you can go forward with your marketing campaigns.

 

 

After MailChimp authenticates your domain you should be able to see the reports under the DMARC compliant section with DKIM passing.

 

 

Note: Wait for at least 24 hours after the authentication process is done to receive the updated reports.

For more 3rd party configuration steps:

What is an Impersonation Attack?

What is an Impersonation Attack?

An impersonation attack is a type of fraud where an attacker poses as a...

Read More
What is Email Encryption, and How Does it Work?

What is Email Encryption, and How Does it Work?

Over the years, email has become the dominant collaboration tool used by businesses and...

Read More
Advantages of Technology as a Business Strategy

Advantages of Technology as a Business Strategy

As technology evolves, businesses and organizations must continually adapt to an ever-shifting landscape. Everything...

Read More
×