Chat +1-888-563-5277 Contact sales

Mailchimp Authentication Setup: Step by Step

Mailchimp is an automated email marketing platform that’s used by businesses to reach their target audience. In this informative post we’ll go over how to configure and set up MailChimp Authentication with DomainKeys Identified Mail (DKIM), we won’t be going over the SPF set up as of now MailChimp does not support SPF alignment.

Verifying and setting up DKIM for MailChimp

Head to your MailChimp portal and click on websites.

 

mailchimp website

 

And head to Domains.

 

mailchimp domains

 

From there you can start the authentication process.

 

start authentication process mailchimp

 

The first step would be to enter the domain provider that you’re using (NameCheap, GoDaddy…)

 

enter the domain provider that you’re using

 

Then head to your DNS zone to add or edit records.

 

DNS zone

 

In the third step, MailChimp will provide you with two CNAME records containing DomainKeys and selectors unique to your domain. 

Copy the records

 

CNAME records

 

Add a new CNAME record and paste the given two record data by MailChimp.

 

ADD DNS CNAME

 

Note: Turn off the proxy status if you’re using Cloudflare.

The next step would be to sit back and enjoy your coffee while MailChimp verifies everything, this could take a couple of hours up to a full day.

 

check status mailchimp

 

Once everything is set, MailChimp will let you know that your domain is authenticated and you can go forward with your marketing campaigns.

 

Mailchimp Authentication Setup: Step by Step, EasyDMARC

 

After MailChimp authenticates your domain you should be able to see the reports under the DMARC compliant section with DKIM passing.

 

Mailchimp Authentication Setup: Step by Step, EasyDMARC

 

Note: Wait for at least 24 hours after the authentication process is done to receive the updated reports.

For more 3rd party configuration steps:

Penetration Testing vs. Vulnerability Assessments

Penetration Testing vs. Vulnerability Assessments

Businesses are often confused about the best way to secure their systems from hackers....

Read More
4 Ways Data Loss Impacts Your Business

4 Ways Data Loss Impacts Your Business

Data loss is one of the most significant challenges many industries with an online...

Read More
6 Most Common Types of Scams in Cybersecurity

6 Most Common Types of Scams in Cybersecurity

There are many types of scams on the internet, and most of them use...

Read More
×