{"id":30254,"date":"2024-12-18T06:15:24","date_gmt":"2024-12-18T06:15:24","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=30254"},"modified":"2026-03-18T06:35:51","modified_gmt":"2026-03-18T06:35:51","slug":"what-is-a-dkim-signature","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/","title":{"rendered":"What is a DKIM Signature?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A DKIM signature is a cryptographic signature added to an email&#8217;s header to verify that specific parts of the email, such as headers and body, have not been altered during transit. It\u2019s a core component of the DomainKeys Identified Mail <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-dkim\/\"><span style=\"font-weight: 400;\">(DKIM) protocol,<\/span><\/a><span style=\"font-weight: 400;\"> defined in <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc6376\" target=\"_blank\" rel=\"noopener\">RFC 6376.<\/a> The <\/span><span style=\"font-weight: 400;\">DKIM-Signature<\/span><span style=\"font-weight: 400;\"> header includes values that recipient servers use to validate the message&#8217;s integrity. Recipient servers retrieve the associated public key, typically published in DNS, to confirm that the signature is valid.<\/span><\/p>\n<h2><b>Why Do You Need a DKIM Signature?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A DKIM signature assists in the following:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protects your email\u2019s integrity by ensuring messages are not modified after signing.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Contributes to <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-dmarc-overview\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DMARC<\/span><\/a><span style=\"font-weight: 400;\"> compliance, as DMARC relies on a valid DKIM signature with domain alignment.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Builds your domain reputation with ISPs, such as Google, which use DKIM as one of several factors to evaluate your domain&#8217;s reputation.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Here\u2019s an example of a DKIM signature:<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">DKIM-Signature: v=1; a=rsa-sha256; c=relaxed\/relaxed;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">d=easydmarc.com; s=google;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">h=from: content-transfer-encoding: subject: message-id:date:to:mime-version;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">bh= 1py3bPKPbePCmMziH13AZqw0Fa +\/ wnOTcnp6P-ZLMW2SwMpgo=;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">b= 1yc9n5JU-7bTkT9FxgIYFJutPbxbyfsBXlbD4wJ-Mdt8\/15vjYvI2-IlCipp_FFTkyd3s_yA4jX65vRSsaE2hBhTw okQIHsBTfmTFEEo01BtmUZpR5M4Mtz5Q8LE97YRDE \/nI1hoPWbzDaL9qh<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">The data included in DKIM signatures is always encrypted. This helps receiving servers detect forgeries.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DKIM is the leading verification method used by companies such as Google, Apple, and Microsoft. However, the <a href=\"https:\/\/easydmarc.com\/blog\/what-is-dkim\">DKIM protocol<\/a> isn\u2019t enough to secure your domain as it doesn\u2019t prevent spoofing of the visible \u201cheader from\u201d of an email. Fortunately, DMARC addresses this issue by combining <a href=\"https:\/\/easydmarc.com\/blog\/zoho-campaigns-spf-and-dkim\/\">SPF and DKIM<\/a> standards and taking them a step further.<\/span><\/p>\n<h2><b>How Does a DKIM Signature Work?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A DKIM signature consists of two main components:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Private key<\/b><span style=\"font-weight: 400;\">: Used by the sender&#8217;s email server to generate the signature.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Public key<\/b><span style=\"font-weight: 400;\">: Published in the domain&#8217;s DNS records for verification by receiving email servers.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">A DKIM signature associates your domain with your email messages. To achieve this, you must add a DKIM record to your DNS. This <\/span><a href=\"https:\/\/easydmarc.com\/blog\/how-to-create-a-txt-record-and-how-to-add-a-txt-record-to-dns\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">TXT record<\/span><\/a><span style=\"font-weight: 400;\"> allows receiving servers to validate emails sent from your domain using the public key.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When an email is sent, the private key generates the DKIM signature and adds it to the <\/span><span style=\"font-weight: 400;\">DKIM-Signature<\/span><span style=\"font-weight: 400;\"> header. The header includes a selector (<\/span><span style=\"font-weight: 400;\">s=<\/span><span style=\"font-weight: 400;\">), which identifies the DKIM key used. Both the private and public keys are associated with the same selector name.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On the receiving side, the <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-mta-sts-and-why-do-you-need-it\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">mail transfer agent<\/span><\/a><span style=\"font-weight: 400;\"> retrieves the selector and domain (<\/span><span style=\"font-weight: 400;\">d=domain<\/span><span style=\"font-weight: 400;\">) from the <\/span><span style=\"font-weight: 400;\">DKIM-Signature<\/span><span style=\"font-weight: 400;\"> header and queries the DNS using the format <\/span><span style=\"font-weight: 400;\">Selector._domainkey.domain <\/span><span style=\"font-weight: 400;\">to obtain the public key.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The private key generates the signature, while the public key verifies it. If the signature is valid, the message passes DKIM verification. If the validation fails, the outcome depends on the recipient&#8217;s email systems or additional protocols like DMARC, which can enforce <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-a-dmarc-policy\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">policies <\/span><\/a><span style=\"font-weight: 400;\">to quarantine, reject, or accept the message. DKIM itself does not specify any handling policy for failed signatures.<\/span><\/p>\n<h2>How to Read a <a href=\"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/\">DKIM Header? <\/a><\/h2>\n<p><span style=\"font-weight: 400;\">When you <\/span><a href=\"https:\/\/easydmarc.com\/blog\/dkim-record-how-to-create-add-and-check-dkim-records\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">create a DKIM record<\/span><\/a><span style=\"font-weight: 400;\"> for your email headers, it should include a series of <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-are-dmarc-tags-dmarc-tags-explained\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">tags <\/span><\/a><span style=\"font-weight: 400;\">with values indicating information about a sender.<\/span><span style=\"font-size: revert;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s a list of the tags and their meanings:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"width: 100px;\">\n<p><b>TAG<\/b><\/p>\n<\/td>\n<td>\n<p><b>MEANING\u00a0<\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><span style=\"font-weight: 400;\">b<\/span><\/p>\n<\/td>\n<td>\n<p><span style=\"font-weight: 400;\">digital signature for email content and is valid for the header and body of the message<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><span style=\"font-weight: 400;\">bh<\/span><\/p>\n<\/td>\n<td>\n<p><span style=\"font-weight: 400;\">body hash<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><span style=\"font-weight: 400;\">d<\/span><\/p>\n<\/td>\n<td>\n<p><span style=\"font-weight: 400;\">signing domain<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><span style=\"font-weight: 400;\">s<\/span><\/p>\n<\/td>\n<td>\n<p><span style=\"font-weight: 400;\">selector<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><span style=\"font-weight: 400;\">v<\/span><\/p>\n<\/td>\n<td>\n<p><span style=\"font-weight: 400;\">version of DKIM being used<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><span style=\"font-weight: 400;\">a<\/span><\/p>\n<\/td>\n<td>\n<p><span style=\"font-weight: 400;\">signing algorithm<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><span style=\"font-weight: 400;\">c<\/span><\/p>\n<\/td>\n<td>\n<p><span style=\"font-weight: 400;\">canonicalization algorithm for header and body of the message<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><span style=\"font-weight: 400;\">q<\/span><\/p>\n<\/td>\n<td>\n<p><span style=\"font-weight: 400;\">default query method<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><span style=\"font-weight: 400;\">l<\/span><\/p>\n<\/td>\n<td>\n<p><span style=\"font-weight: 400;\">length of the section of the message that has been signed<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><span style=\"font-weight: 400;\">t<\/span><\/p>\n<\/td>\n<td>\n<p><span style=\"font-weight: 400;\">timestamp of the signature<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><span style=\"font-weight: 400;\">x<\/span><\/p>\n<\/td>\n<td>\n<p><span style=\"font-weight: 400;\">expiration time<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><span style=\"font-weight: 400;\">h<\/span><\/p>\n<\/td>\n<td>\n<p><span style=\"font-weight: 400;\">list of signed header fields (needs to be repeated for fields used multiple times)<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-size: revert;\">Out of these tags, b, bh, d, s, v, and a are mandatory in all DKIM signatures. You\u2019ll get an error message if you miss any of these tags. The remaining tags are optional.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let&#8217;s take a closer look at our example above:<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">DKIM-Signature: v=1; a=rsa-sha256; c=relaxed\/relaxed;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">d=easydmarc.com; s=google;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">h=from: content-transfer-encoding: subject: message-id:date:to:mime-version;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">bh= 1py3bPKPbePCmMziH13AZqw0Fa +\/ wnOTcnp6P-ZLMW2SwMpgo=;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">b= 1yc9n5JU-7bTkT9FxgIYFJutPbxbyfsBXlbD4wJ-Mdt8\/15vjYvI2-IlCipp_FFTkyd3s_yA4jX65vRSsaE2hBhTw okQIHsBTfmTFEEo01BtmUZpR5M4Mtz5Q8LE97YRDE \/nI1hoPWbzDaL9qh<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">For this signature, you can see the following:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The digital signature (b) is <\/span><i><span style=\"font-weight: 400;\">\u201c1yc9n5JU-7bTkT9FxgIYFJutPbxbyfsBXlbD4wJ-Mdt8\/15vjYvI2-IlCipp_FFTkyd3s_yA4jX65vRSsaE2hBhTw okQIHsBTfmTFEEo01BtmUZpR5M4Mtz5Q8LE97YRDE \/nI1hoPWbzDaL9qh\u201d<\/span><\/i><span style=\"font-weight: 400;\"> and it should match with the sender\u2019s domain<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The body hash (bh) is <\/span><i><span style=\"font-weight: 400;\">\u201c1py3bPKPbePCmMziH13AZqw0Fa+\/wnOTcnp6P-ZLMW2SwMpgo=;<\/span><\/i><span style=\"font-weight: 400;\">\u201d<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The signing domain (d) is <\/span><i><span style=\"font-weight: 400;\">\u201ceasydmarc.com\u201d<\/span><\/i><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The selector (s) is <\/span><i><span style=\"font-weight: 400;\">\u201cgoogle\u201d<\/span><\/i><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The version (v) of DKIM being used is <\/span><i><span style=\"font-weight: 400;\">\u201cv1\u201d<\/span><\/i><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The signing algorithm (a) is <\/span><i><span style=\"font-weight: 400;\">\u201crsa-sha256\u201d<\/span><\/i><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The policy for the header and body has been configured as <\/span><i><span style=\"font-weight: 400;\">\u201crelaxed\/relaxed,\u201d<\/span><\/i><span style=\"font-weight: 400;\"> meaning the message will likely go directly to the sender\u2019s inbox.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">All the mandatory tags are covered in this example. You\u2019ll notice, however, that not all tags are included.<\/span><\/p>\n<h2><b>How to Check Your DKIM Signature?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To check your DKIM signature, you can use EasyDMARC&#8217;s simple <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dkim-lookup\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DKIM Lookup tool<\/span><\/a><span style=\"font-weight: 400;\">. Our tool validates whether your domain&#8217;s DKIM record is implemented correctly. Many email providers offer their own DKIM signatures that are differentiated with &#8220;Selector&#8221; names. EasyDMARC&#8217;s DKIM Lookup tool lets you add the selector name and your domain to retrieve the specific public key of your email service provider (ESP).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">EasyDMARC\u2019s DKIM Lookup tool:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Checks whether the DKIM TXT record is published in DNS for the domain<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Checks the published DKIM TXT record syntax<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Validates the DKIM public key associated with the selector<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If there are problems with your DKIM record, we can help you fix them. If you don\u2019t have a<\/span> <span style=\"font-weight: 400;\">signature, you can use our <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dkim-record-generator\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DKIM generator<\/span><\/a><span style=\"font-weight: 400;\"> to get one so you can start your email authentication journey.<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">DKIM signatures are a key element of modern email security, helping verify message integrity and authenticity. While DKIM alone cannot fully secure your email communications, it serves as a critical component alongside <\/span><a href=\"https:\/\/easydmarc.com\/blog\/spf-record-syntax-structure-and-components\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">SPF<\/span><\/a><span style=\"font-weight: 400;\"> and DMARC. Proper implementation and maintenance of DKIM signatures can improve email deliverability and safeguard your domain\u2019s reputation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">EasyDMARC offers a comprehensive suite of tools and solutions to simplify the implementation of SPF, DKIM, and DMARC, including DKIM lookup and generator tools. Start enhancing your domain&#8217;s reputation and email security today with our <\/span><a href=\"https:\/\/easydmarc.com\/pricing\/easydmarc\/businesses\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">14-day free trial<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>A DKIM signature is a cryptographic signature added &#8230;<\/p>\n","protected":false},"author":30,"featured_media":43260,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,287,203],"tags":[],"class_list":["post-30254","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-dkim","category-email-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is a DKIM Signature? | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Learn what a DKIM signature is and how it ensures email authenticity, protects your domain from spoofing, and strengthens your email security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a DKIM Signature?\" \/>\n<meta property=\"og:description\" content=\"Learn what a DKIM signature is and how it ensures email authenticity, protects your domain from spoofing, and strengthens your email security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-18T06:15:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T06:35:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-a-DKIM-Signature_-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sarah Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sarah Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-dkim-signature\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-dkim-signature\\\/\"},\"author\":{\"name\":\"Sarah Wilson\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/205f64b37b241d54a61f9b7d16c3c178\"},\"headline\":\"What is a DKIM Signature?\",\"datePublished\":\"2024-12-18T06:15:24+00:00\",\"dateModified\":\"2026-03-18T06:35:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-dkim-signature\\\/\"},\"wordCount\":1093,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-dkim-signature\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/What-is-a-DKIM-Signature_-1.jpg\",\"articleSection\":[\"Blog\",\"DKIM\",\"Email Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-dkim-signature\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-dkim-signature\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-dkim-signature\\\/\",\"name\":\"What is a DKIM Signature? | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-dkim-signature\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-dkim-signature\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/What-is-a-DKIM-Signature_-1.jpg\",\"datePublished\":\"2024-12-18T06:15:24+00:00\",\"dateModified\":\"2026-03-18T06:35:51+00:00\",\"description\":\"Learn what a DKIM signature is and how it ensures email authenticity, protects your domain from spoofing, and strengthens your email security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-dkim-signature\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-dkim-signature\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-dkim-signature\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/What-is-a-DKIM-Signature_-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/What-is-a-DKIM-Signature_-1.jpg\",\"width\":1440,\"height\":910,\"caption\":\"DKIM Signature\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-a-dkim-signature\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Email Security\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"DKIM\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/dkim\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"What is a DKIM Signature?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/205f64b37b241d54a61f9b7d16c3c178\",\"name\":\"Sarah Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d7f2cab4b5083e4305631e460d5603e6d9413f10725c760a4ba644e557bcc7c7?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d7f2cab4b5083e4305631e460d5603e6d9413f10725c760a4ba644e557bcc7c7?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d7f2cab4b5083e4305631e460d5603e6d9413f10725c760a4ba644e557bcc7c7?s=96&r=g\",\"caption\":\"Sarah Wilson\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/sarah-wilson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is a DKIM Signature? | EasyDMARC","description":"Learn what a DKIM signature is and how it ensures email authenticity, protects your domain from spoofing, and strengthens your email security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/","og_locale":"en_US","og_type":"article","og_title":"What is a DKIM Signature?","og_description":"Learn what a DKIM signature is and how it ensures email authenticity, protects your domain from spoofing, and strengthens your email security.","og_url":"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2024-12-18T06:15:24+00:00","article_modified_time":"2026-03-18T06:35:51+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-a-DKIM-Signature_-1.jpg","type":"image\/jpeg"}],"author":"Sarah Wilson","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"Sarah Wilson","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/"},"author":{"name":"Sarah Wilson","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/205f64b37b241d54a61f9b7d16c3c178"},"headline":"What is a DKIM Signature?","datePublished":"2024-12-18T06:15:24+00:00","dateModified":"2026-03-18T06:35:51+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/"},"wordCount":1093,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-a-DKIM-Signature_-1.jpg","articleSection":["Blog","DKIM","Email Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/","url":"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/","name":"What is a DKIM Signature? | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-a-DKIM-Signature_-1.jpg","datePublished":"2024-12-18T06:15:24+00:00","dateModified":"2026-03-18T06:35:51+00:00","description":"Learn what a DKIM signature is and how it ensures email authenticity, protects your domain from spoofing, and strengthens your email security.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-a-DKIM-Signature_-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-a-DKIM-Signature_-1.jpg","width":1440,"height":910,"caption":"DKIM Signature"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Email Security","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/"},{"@type":"ListItem","position":4,"name":"DKIM","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/dkim\/"},{"@type":"ListItem","position":5,"name":"What is a DKIM Signature?"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/205f64b37b241d54a61f9b7d16c3c178","name":"Sarah Wilson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d7f2cab4b5083e4305631e460d5603e6d9413f10725c760a4ba644e557bcc7c7?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d7f2cab4b5083e4305631e460d5603e6d9413f10725c760a4ba644e557bcc7c7?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d7f2cab4b5083e4305631e460d5603e6d9413f10725c760a4ba644e557bcc7c7?s=96&r=g","caption":"Sarah Wilson"},"url":"https:\/\/easydmarc.com\/blog\/author\/sarah-wilson\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/09\/What-is-a-DKIM-Signature_-1.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/30254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=30254"}],"version-history":[{"count":17,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/30254\/revisions"}],"predecessor-version":[{"id":59929,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/30254\/revisions\/59929"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/43260"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=30254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=30254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=30254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}