{"id":30666,"date":"2022-10-20T13:51:45","date_gmt":"2022-10-20T13:51:45","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=30666"},"modified":"2025-03-07T08:48:35","modified_gmt":"2025-03-07T08:48:35","slug":"how-does-a-dkim-record-work","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/","title":{"rendered":"How Does a DKIM Record Work?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">So you want to know <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-record\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">what a DKIM record is<\/span><\/a><span style=\"font-weight: 400;\"> and how it works? DKIM is short for &#8220;DomainKeys identified Mail,&#8221; an <\/span><a href=\"https:\/\/easydmarc.com\/blog\/ignoring-email-authentication-will-cost-you-time-and-sales\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">email authentication protocol<\/span><\/a><span style=\"font-weight: 400;\"> commonly used to place a unique digital signature on any email sent from your servers. This signature authenticates your email, letting receiving servers know the message originates from your domain and wasn\u2019t tampered with during transit.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We live in a time when cybercrime is a common occurrence. DKIM is one part of the most solid defense system you can get for your domain: <a href=\"https:\/\/easydmarc.com\/blog\/dmarc-the-ultimate-guide\/\" target=\"_blank\" rel=\"noopener\">DMARC<\/a>. DKIM works with SPF (Sender Policy Framework) to authenticate emails sent on your domain\u2019s behalf and <\/span><a href=\"https:\/\/easydmarc.com\/blog\/how-to-prevent-spoofing\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">prevent spoofing<\/span><\/a><span style=\"font-weight: 400;\"> and phishing attacks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By implementing DKIM, you&#8217;re protecting your company and the status of your brand.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before setting it up, it&#8217;s essential to understand <\/span><b>how DKIM works<\/b><span style=\"font-weight: 400;\">. This protocol focuses on two central aspects: The DKIM record published in a domain\u2019s DNS (domain name system) records and the DKIM header in all emails.\u00a0<\/span><\/p>\n<p>This blog post discusses how DKIM works and all its moving parts that make your messages more secure.<\/p>\n<h2><b>What is Public Key Cryptography?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To learn <\/span><b>how DKIM works<\/b><span style=\"font-weight: 400;\">, you must first understand the meaning of public key cryptography. As the name implies, this internet security feature encrypts or signs data with a pair of cryptographic keys, one public and one private.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s also known as asymmetric encryption and is often used with transport layer security (TLS) and secure socket layer (SSL) certificates, which make HTTPS possible.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Public key cryptography works with a pair of keys associated with an entity that has to verify its identity in a virtual environment. You can also use it to sign and encrypt data before sending it through the web. Public keys are meant to be published, while private keys are only known to a domain administrator.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Public key cryptography enables encryption and decryption of data. This process allows two communicating parties to keep data safe as it&#8217;s sent back and forth.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The encryption placed in the data can only be scrambled with the keys used by the data holders, making it indecipherable while in mid-transit to anyone looking to tamper with it. This prevents your data from being altered and proves to recipient servers that your email comes from an authentic source.<\/span><\/p>\n<h2><b>The Two Keys of DKIM<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">As you learn <\/span><b>how DKIM works<\/b><span style=\"font-weight: 400;\">, you\u2019ll discover that it needs two keys to work its magic. The first is a private key used to generate a digital signature by encrypting data contained in the DKIM header of an email.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The second is a public key that\u2019s retrieved by recipient servers to verify an email. It\u2019s contained in the DKIM record of your domain\u2019s DNS.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each time you send an email from your domain, the receiving server retrieves the public key in your domain\u2019s DKIM record. It then uses the public key to verify the DKIM signature in the email\u2019s DKIM header.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If the public key matches the encrypted digital signature, the email passes DKIM verification. If not, DKIM verification fails. The receiving server also checks whether any data in the email headers or message body was altered in transit. If not, DKIM verification passes. If data was changed, the recipient server rejects the email.<\/span><\/p>\n<h2><b>What&#8217;s the Role of a DKIM Record?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Before we answer the above question, let\u2019s answer this: <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-record\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">What is a DKIM record?<\/span><\/a> <span style=\"font-weight: 400;\">Put simply, it\u2019s a type of DNS TXT record published in your domain\u2019s DNS and publically available to email service providers (ESPs).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DKIM records play a significant role in the validation of your digital signature. The signature itself is created by a hash using various components from the message contained in any email.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Your DKIM records hold your domain&#8217;s public key, which ESPs use to compare with the private key that generates an email\u2019s digital signature.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Every email sent with a <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DKIM signature<\/span><\/a><span style=\"font-weight: 400;\"> includes a DKIM header with encrypted data. Your domain is always hosted in a DNS server, which holds the DKIM record as a TXT entry. All your recipients must be able to locate this TXT record using a selector, which indicates where your domain&#8217;s public key is located.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/easydmarc.com\/tools\/dmarc-record-generator\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Creating a DKIM record<\/span><\/a><span style=\"font-weight: 400;\"> and publishing it in your domain\u2019s DNS can help you look more legitimate in the eyes of your clients and business partners. With DKIM, it\u2019s much harder for bad actors to <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-domain-spoofing\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">spoof your email domain<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DKIM also enhances your domain\u2019s reputation thanks to low spam flagging rates and higher deliverability rates.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DKIM also ensures that your emails haven\u2019t tampered with mid-traffic. This is a point of contention with most ESPs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most of these services use TLS to encrypt messages and move them from one server to another. Still, TLS can be refuted by email servers in general, making your messages vulnerable and open to modification. DKIM keeps them safe and guarded against such events.<\/span><\/p>\n<h2><b>What&#8217;s the Role of the DKIM Header?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">As we mentioned, DKIM creates a digital signature by encrypting or \u2018signing\u2019 data in the mail\u2019s DKIM header. This header plays a crucial role in keeping your communications safe. Remember, DKIM headers remain attached to your email once created.\u00a0<\/span><\/p>\n<p>These headers are usually visually distinctive to end users if they view them.<\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/easydmarc.com\/blog\/what-are-dkim-tags\/\" target=\"_blank\" rel=\"noopener\">DKIM headers<\/a> are composed of a series of tags defining a specific action to validate or protect the content of your emails. To <\/span><b>test whether DKIM is working<\/b><span style=\"font-weight: 400;\">, you need to understand the value of these tags and the function they fulfill in the header. The following is an example of a DKIM header:<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">v=1; a=rsa-sha256;\u00a0<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">d=easydmarc.com; s=big-email;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">h=from:to:subject;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">bh=4p6MxwdwXY9xGnCkOEEJJdINgzu-doeiAA=;<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">b=7bTkT9FxgIYFJutPbxbyfsBXlbD4wJ<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">The role of each tag in this header handles the following:<\/span><\/p>\n<ul>\n<li><b>v=<\/b><span style=\"font-weight: 400;\"> shows the version of DKIM being used.<\/span><\/li>\n<li><b>d=<\/b><span style=\"font-weight: 400;\"> is the domain name of the sender.<\/span><\/li>\n<li><b>s=<\/b><span style=\"font-weight: 400;\"> is the selector that has to be checked by the receiving sender to look up the DNS SPF record.<\/span><\/li>\n<li><b>h=<\/b><span style=\"font-weight: 400;\"> is used to list the header field to create the email&#8217;s digital signature. In this particular case, the elements being used in this header, which are &#8220;from,&#8221; &#8220;to,&#8221; and &#8220;subject.&#8221;<\/span><\/li>\n<li><b>bh=<\/b><span style=\"font-weight: 400;\"> this is the hash of the email body used by the receiving server to compute the signature before the complete message loads.<\/span><\/li>\n<li><b>a=<\/b><span style=\"font-weight: 400;\"> is the algorithm used to compute the digital signature contained in the email. In this case, the algorithm is RSA-SHA 256.<\/span><\/li>\n<li><b>b=<\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> is the digital signature generated from the tags &#8220;h&#8221; and &#8220;bh&#8221; and signed with the private key on your domain&#8217;s DNS.<\/span><\/span><\/li>\n<\/ul>\n<h2><b>Summary<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">You should have a good idea about <\/span><b>how DKIM signing works<\/b><span style=\"font-weight: 400;\">. A DKIM record may look pretty complex for end users, but it&#8217;s pretty easy to configure by specialists. If you need help setting up your DKIM record, look no further than EasyDMARC. We can teach you how DKIM works in Office 365 and other email service providers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you&#8217;re not sure about the status of your DKIM records, you can always use EasyDMARC&#8217;s <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dkim-lookup\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">free DKIM lookup tool<\/span><\/a><span style=\"font-weight: 400;\"> to check if your website is up to speed with this security requirement.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you don&#8217;t have a DKIM record, you can use our free <\/span><a href=\"https:\/\/easydmarc.com\/tools\/dkim-record-generator\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">DKIM generator<\/span><\/a><span style=\"font-weight: 400;\"> to get a custom-made TXT file for your website. We can help with the configuration process required for your DNS. <\/span><a href=\"https:\/\/easydmarc.com\/contact-us\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Get in contact with us today<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>So you want to know what a DKIM &#8230;<\/p>\n","protected":false},"author":1,"featured_media":30667,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,287,203],"tags":[],"class_list":["post-30666","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-dkim","category-email-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Does a DKIM Record Work? | EasyDMARC<\/title>\n<meta name=\"description\" content=\"With EasyDMARC\u2019s blog, learn how a DKIM record works to authenticate emails, protect your domain from spoofing, and ensure secure communication.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Does a DKIM Record Work?\" \/>\n<meta property=\"og:description\" content=\"With EasyDMARC\u2019s blog, learn how a DKIM record works to authenticate emails, protect your domain from spoofing, and ensure secure communication.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-20T13:51:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-07T08:48:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/How-Does-a-DKIM-Record-Work_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-does-a-dkim-record-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-does-a-dkim-record-work\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"How Does a DKIM Record Work?\",\"datePublished\":\"2022-10-20T13:51:45+00:00\",\"dateModified\":\"2025-03-07T08:48:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-does-a-dkim-record-work\\\/\"},\"wordCount\":1254,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-does-a-dkim-record-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/How-Does-a-DKIM-Record-Work_.jpg\",\"articleSection\":[\"Blog\",\"DKIM\",\"Email Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-does-a-dkim-record-work\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-does-a-dkim-record-work\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-does-a-dkim-record-work\\\/\",\"name\":\"How Does a DKIM Record Work? | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-does-a-dkim-record-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-does-a-dkim-record-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/How-Does-a-DKIM-Record-Work_.jpg\",\"datePublished\":\"2022-10-20T13:51:45+00:00\",\"dateModified\":\"2025-03-07T08:48:35+00:00\",\"description\":\"With EasyDMARC\u2019s blog, learn how a DKIM record works to authenticate emails, protect your domain from spoofing, and ensure secure communication.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-does-a-dkim-record-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-does-a-dkim-record-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-does-a-dkim-record-work\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/How-Does-a-DKIM-Record-Work_.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/How-Does-a-DKIM-Record-Work_.jpg\",\"width\":1440,\"height\":910,\"caption\":\"How Does a DKIM Record Work\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-does-a-dkim-record-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Email Security\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"DKIM\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/dkim\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"How Does a DKIM Record Work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Does a DKIM Record Work? | EasyDMARC","description":"With EasyDMARC\u2019s blog, learn how a DKIM record works to authenticate emails, protect your domain from spoofing, and ensure secure communication.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/","og_locale":"en_US","og_type":"article","og_title":"How Does a DKIM Record Work?","og_description":"With EasyDMARC\u2019s blog, learn how a DKIM record works to authenticate emails, protect your domain from spoofing, and ensure secure communication.","og_url":"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-10-20T13:51:45+00:00","article_modified_time":"2025-03-07T08:48:35+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/How-Does-a-DKIM-Record-Work_.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"How Does a DKIM Record Work?","datePublished":"2022-10-20T13:51:45+00:00","dateModified":"2025-03-07T08:48:35+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/"},"wordCount":1254,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/How-Does-a-DKIM-Record-Work_.jpg","articleSection":["Blog","DKIM","Email Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/","url":"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/","name":"How Does a DKIM Record Work? | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/How-Does-a-DKIM-Record-Work_.jpg","datePublished":"2022-10-20T13:51:45+00:00","dateModified":"2025-03-07T08:48:35+00:00","description":"With EasyDMARC\u2019s blog, learn how a DKIM record works to authenticate emails, protect your domain from spoofing, and ensure secure communication.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/How-Does-a-DKIM-Record-Work_.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/How-Does-a-DKIM-Record-Work_.jpg","width":1440,"height":910,"caption":"How Does a DKIM Record Work"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/how-does-a-dkim-record-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Email Security","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/"},{"@type":"ListItem","position":4,"name":"DKIM","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/dkim\/"},{"@type":"ListItem","position":5,"name":"How Does a DKIM Record Work?"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/10\/How-Does-a-DKIM-Record-Work_.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/30666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=30666"}],"version-history":[{"count":0,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/30666\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/30667"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=30666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=30666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=30666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}