{"id":30492,"date":"2022-10-13T11:35:44","date_gmt":"2022-10-13T11:35:44","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=30492"},"modified":"2025-08-12T15:15:39","modified_gmt":"2025-08-12T15:15:39","slug":"what-are-dkim-tags","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/","title":{"rendered":"What are DKIM Tags?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">If you\u2019re reading this, you want to learn about DKIM tags but first: <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-dkim-a-bit-of-history\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">What is DKIM?<\/span><\/a><span style=\"font-weight: 400;\"> It\u2019s an email verification standard that uses an encrypted digital signature. It\u2019s also a critical component of any DMARC authentication policy.\u00a0<\/span><\/p>\n<p>A properly <a href=\"https:\/\/easydmarc.com\/blog\/vtiger-spf-dkim-setup\/\">configured DKIM signature<\/a> helps email service providers verify your domain. Companies like Google and Yahoo use DKIM! And others to check whether messages are authentic.<\/p>\n<p><span style=\"font-weight: 400;\">Recipient servers use data in the header of an email and a domain\u2019s <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dkim-lookup\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DKIM record<\/span><\/a><span style=\"font-weight: 400;\"> to ascertain the legitimacy of a message.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A DKIM signature header goes at the top of the message. Thanks to several <\/span><b>DKIM tags<\/b><span style=\"font-weight: 400;\"> containing information about the sender, receiving servers know where to look to verify an email.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The tags are informational elements representing specific values. Each value indicates bits of information detailing everything there is to know about the body of the message.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All DomainKeys included in <a href=\"https:\/\/easydmarc.com\/blog\/glossary\/dkim\/\">DKIM<\/a> have a private key to encrypt the digital DKIM signature and a public key published in a domain\u2019s DNS.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When a message is sent from your domain, the private key in your emails must match the public key for delivery to the recipient\u2019s inbox.. This process doesn&#8217;t take more than a few seconds, but it only works if you <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dkim-record-generator\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">create a DKIM record<\/span><\/a><span style=\"font-weight: 400;\"> with the correct <\/span><b>DKIM signature tags<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><b>What is a Tag in the DKIM Record?<\/b><\/h2>\n<p><b>DKIM signature tags<\/b><span style=\"font-weight: 400;\"> are single letters used as commands, followed by an equal sign. Each letter included in a <\/span><b>DKIM tag<\/b><span style=\"font-weight: 400;\"> has a designated value denoting different pieces of intel about an email sender. These tags also offer details about the message contained in the email and the location of the public key used to authenticate the message.\u00a0\u00a0\u00a0<\/span><\/p>\n<h3><b>DKIM Tag Types<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As you learn more about <\/span><span style=\"font-weight: 400;\">how DKIM records work<\/span><span style=\"font-weight: 400;\"> and <\/span><b>DKIM DNS record tags<\/b><span style=\"font-weight: 400;\">, you&#8217;ll find there are many informal elements. The best way to classify them is by required tags and optional tags.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The value of each determines its usefulness in your DKIM record. There are also a few tags that can be categorized as \u2018not required\u2019 or \u2018not recommended.\u2019 They get these denominations depending on the instances of their use or the requirements of your domain.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When you <\/span><a href=\"https:\/\/easydmarc.com\/blog\/dkim-record-how-to-create-add-and-check-dkim-records\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">add a DKIM record to your DNS<\/span><\/a><span style=\"font-weight: 400;\">, you\u2019ll need the correct <\/span><b>DKIM DNS tags<\/b><span style=\"font-weight: 400;\">. Below you\u2019ll find what each one means and how it\u2019s used.<\/span><\/p>\n<h3><b>Required Tags<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Required <\/span><b>DKIM signature tags<\/b><span style=\"font-weight: 400;\"> are essential to any DKIM signature header. If you don&#8217;t include these tags, your messages will fail verification and be discarded.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>v=<\/b><span style=\"font-weight: 400;\"> is the <\/span><b>DKIM version tag<\/b><span style=\"font-weight: 400;\"> indicating the DKIM standard being used. The value should always be set to 1.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>a=<\/b><span style=\"font-weight: 400;\"> is a <\/span><b>DKIM tag<\/b><span style=\"font-weight: 400;\"> representing the cryptographic algorithm used to generate the signature. The usual value is rsa-sha256. If you&#8217;re using equipment with reduced CPU capabilities, you can opt to use rsa-sha1, although it&#8217;s not recommended due to security concerns.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>s=<\/b><span style=\"font-weight: 400;\"> is a <\/span><b>DKIM tag<\/b><span style=\"font-weight: 400;\"> indicating the selector record name used to locate the public key in a domain\u2019s DNS. The value is usually a name or a number chosen by the sender.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>d=<\/b><span style=\"font-weight: 400;\"> defines the domain used with the selector record to locate public keys. The value for this tag is the domain name used by the sender.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>b=<\/b><span style=\"font-weight: 400;\"> is used for the hash data of the headers. It&#8217;s usually combined with the h= tag to create the DKIM signature and should be encoded in Base64.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>bh=<\/b><span style=\"font-weight: 400;\"> contains the computed hash of the message&#8217;s body. Its value is defined by a series of characters representing a hash determined by an algorithm.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>h=<\/b><span style=\"font-weight: 400;\"> lists the headers used in the signing algorithm to create the hash in the b= tag. The value of this tag can\u2019t be removed or altered. The placement order of each header in the h=tag is the same order presented in a DKIM signature, so the same order should be presented during verification.<\/span><\/li>\n<\/ul>\n<h3><b>Optional Tags<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Besides the main <\/span><b>DKIM signature tags<\/b><span style=\"font-weight: 400;\">, there&#8217;s a series of optional tags. If you have a DKIM signature missing any of these tags, no errors will occur during verification. Still, it\u2019s best to use these tags as they can help weed out spam.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Remember, spammers don&#8217;t typically set time values on their messages, unlike regular corporate email. If your inbox notices incorrect time values for a sender, it&#8217;s more likely to reject the message.<\/span><\/p>\n<h4><b>Recommended Tags<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>g=<\/b><span style=\"font-weight: 400;\"> is a <\/span><b>DKIM tag<\/b><span style=\"font-weight: 400;\"> that works as the granularity of your public key. The value should always match the local part of the i=tag in your DKIM signature field. You can also add an asterisk (*) as a wildcard. This tag constrains the signing addresses from using the selector records. An email with a signing address that doesn\u2019t match this tag fails verification.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>h=<\/b><span style=\"font-weight: 400;\"> indicates acceptable hash algorithms. It has a set of default values set to &#8220;sha1&#8221; and &#8220;sha256,&#8221; which are required by both signers and verifiers.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>k=<\/b><span style=\"font-weight: 400;\"> indicates the key type. It has a default value at &#8220;rsa&#8221; that must be supported by signers and verifiers as well.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>n=<\/b><span style=\"font-weight: 400;\"> is used by administrators. The default value is empty since the administrator uses it to place human-readable notes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>t=<\/b><span style=\"font-weight: 400;\"> is one of the most useful <\/span><b>DKIM signature tags<\/b><span style=\"font-weight: 400;\">. It works as a signature timestamp indicating the time the message is sent. The format of this tag is in numbered seconds from 00:00:00 on January 1st, 1970 (UTC).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>x=<\/b><span style=\"font-weight: 400;\"> is used as an expiration date for the signature; it complements the t= tag by imposing a due date for delivery. The value is also presented in numbered seconds, but it must be greater than the value of the timestamp if they&#8217;re used in the same DKIM signature.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>t=y<\/b><span style=\"font-weight: 400;\"> is used to indicate a domain testing DKIM signatures. It&#8217;s used by senders when DKIM is configured for the first time to ensure the verification goes swiftly. It&#8217;s recommended because some mailbox providers ignore DKIM signatures in test mode. Remove the tag before full deployment.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>t=s<\/b><span style=\"font-weight: 400;\"> is the replacement of t=y. It indicates that any DKIM signature using the i= tag needs to have the same domain value as the main domain. (example: i=local-adress@domain.com). This tag doesn&#8217;t work with subdomains.<\/span><\/li>\n<\/ul>\n<h4><b>Not Required<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">If you&#8217;re creating a DKIM header for the first time, you don&#8217;t need these tags. They can prove too technical and make your DKIM signature more complex than it should be.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>c=<\/b><span style=\"font-weight: 400;\"> is a <\/span><b>DKIM tag<\/b><span style=\"font-weight: 400;\"> that works as the canonicalization algorithm. It defines the modification levels included in an email mid-transit to another mailbox provider. It&#8217;s placed because some email servers do minor modifications to emails in transit, which can result in a failed verification. Changes include white spaces or line wrappings.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The setting for this tag is presented at two values: value1\/value2. Value1 is for the message&#8217;s header, while value2 is for the body. You can set both values to &#8220;simple&#8221; or &#8220;relaxed&#8221; to indicate tolerance to modifications in the email. Simple tends to be stricter, while the relaxed setting allows more changes.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>i=<\/b><span style=\"font-weight: 400;\"> is a <\/span><b>DKIM tag<\/b><span style=\"font-weight: 400;\"> indicating the identity of the user or agent sending the message. The value is an email address that contains the domain or subdomain to your website, as defined in the d=tag.<\/span><\/li>\n<\/ul>\n<h4><b>Not Recommended<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The following <\/span><b>DKIM signature tags<\/b><span style=\"font-weight: 400;\"> are unnecessary in any DKIM header. You don&#8217;t have to use them unless you need to control any of the specs indicated in the description of these tags.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>l=<\/b><span style=\"font-weight: 400;\"> indicates the number of characters from the message used to compute the body hash. The lack of this value leads to the assumption that the whole body of the message is used. It&#8217;s tricky to control and almost always leads to verification errors.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>z=<\/b><span style=\"font-weight: 400;\"> is a <\/span><b>DKIM tag<\/b><span style=\"font-weight: 400;\"> listing the original headers of any message. z= is used by mailbox providers to process diagnosis verifications errors. It usually differs from the headers listed in the h=tag. Since the tag&#8217;s value is not defined, it is best to keep it out of your DKIM signature.<\/span><\/li>\n<\/ul>\n<h3><b>Unrecognized Tags<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">If your DKIM signature has unrecognized tags, you\u2019ll likely get errors in the verification process. All the <\/span><b>DKIM signature tags<\/b><span style=\"font-weight: 400;\"> we listed are specified and detailed in RFC 6376.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Any dangling letter you see included in a DKIM signature doesn&#8217;t add anything to the header and should be ignored. Most email service providers hardly detect unrecognized tags, but some are pretty strict.<\/span><\/p>\n<h2><b>Summary<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Your DKIM signature must be accurate by design. These digital signatures are a big part of DMARC protocols and enforce the authentication of all email messages on the internet.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Poor DKIM configuration can lead to deliverability failures and constant error messages. Ensure your IT team understands the meaning behind all <\/span><b>DKIM signature tags<\/b><span style=\"font-weight: 400;\"> for successful verification.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you want to learn more about email security like <\/span><span style=\"font-weight: 400;\">DKIM vs. SPF<\/span><span style=\"font-weight: 400;\">, check out our blog posts. You can also find out about DMARC deployment, DNS records, DKIM vs. DMARC, and much more.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We have the most comprehensive guides on <a href=\"https:\/\/easydmarc.com\/blog\/socketlabs-spf-dkim-setup\/\">how to use DKIM<\/a> to your advantage. Make sure you have a DKIM record with our<\/span><a href=\"https:\/\/easydmarc.com\/tools\/dkim-lookup\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">DKIM lookup tool<\/span><\/a><span style=\"font-weight: 400;\">. If you don&#8217;t have one, you can always use our <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dkim-record-generator\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DKIM generator<\/span><\/a><span style=\"font-weight: 400;\"> and improve the security of your website.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re reading this, you want to learn &#8230;<\/p>\n","protected":false},"author":1,"featured_media":30493,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,287,203],"tags":[],"class_list":["post-30492","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-dkim","category-email-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What are DKIM Tags? | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Learn about DKIM tags and how they authenticate emails, protect your domain from spoofing, and ensure secure email communication for improved deliverability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are DKIM Tags?\" \/>\n<meta property=\"og:description\" content=\"Learn about DKIM tags and how they authenticate emails, protect your domain from spoofing, and ensure secure email communication for improved deliverability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-13T11:35:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T15:15:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/What-are-DKIM-Tags_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-dkim-tags\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-dkim-tags\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"What are DKIM Tags?\",\"datePublished\":\"2022-10-13T11:35:44+00:00\",\"dateModified\":\"2025-08-12T15:15:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-dkim-tags\\\/\"},\"wordCount\":1572,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-dkim-tags\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/What-are-DKIM-Tags_.jpg\",\"articleSection\":[\"Blog\",\"DKIM\",\"Email Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-dkim-tags\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-dkim-tags\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-dkim-tags\\\/\",\"name\":\"What are DKIM Tags? | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-dkim-tags\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-dkim-tags\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/What-are-DKIM-Tags_.jpg\",\"datePublished\":\"2022-10-13T11:35:44+00:00\",\"dateModified\":\"2025-08-12T15:15:39+00:00\",\"description\":\"Learn about DKIM tags and how they authenticate emails, protect your domain from spoofing, and ensure secure email communication for improved deliverability.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-dkim-tags\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-dkim-tags\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-dkim-tags\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/What-are-DKIM-Tags_.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/What-are-DKIM-Tags_.jpg\",\"width\":1440,\"height\":910,\"caption\":\"What are DKIM Tags\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-dkim-tags\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Email Security\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"DKIM\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/dkim\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"What are DKIM Tags?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What are DKIM Tags? | EasyDMARC","description":"Learn about DKIM tags and how they authenticate emails, protect your domain from spoofing, and ensure secure email communication for improved deliverability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/","og_locale":"en_US","og_type":"article","og_title":"What are DKIM Tags?","og_description":"Learn about DKIM tags and how they authenticate emails, protect your domain from spoofing, and ensure secure email communication for improved deliverability.","og_url":"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-10-13T11:35:44+00:00","article_modified_time":"2025-08-12T15:15:39+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/What-are-DKIM-Tags_.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"What are DKIM Tags?","datePublished":"2022-10-13T11:35:44+00:00","dateModified":"2025-08-12T15:15:39+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/"},"wordCount":1572,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/What-are-DKIM-Tags_.jpg","articleSection":["Blog","DKIM","Email Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/","url":"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/","name":"What are DKIM Tags? | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/What-are-DKIM-Tags_.jpg","datePublished":"2022-10-13T11:35:44+00:00","dateModified":"2025-08-12T15:15:39+00:00","description":"Learn about DKIM tags and how they authenticate emails, protect your domain from spoofing, and ensure secure email communication for improved deliverability.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/What-are-DKIM-Tags_.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/What-are-DKIM-Tags_.jpg","width":1440,"height":910,"caption":"What are DKIM Tags"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Email Security","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/"},{"@type":"ListItem","position":4,"name":"DKIM","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/dkim\/"},{"@type":"ListItem","position":5,"name":"What are DKIM Tags?"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/What-are-DKIM-Tags_.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/30492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=30492"}],"version-history":[{"count":4,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/30492\/revisions"}],"predecessor-version":[{"id":50882,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/30492\/revisions\/50882"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/30493"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=30492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=30492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=30492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}