GDPR Compliance

We use cookies to ensure you get the best experience on our website. By continuing, you accept our use of cookies, privacy policy and terms of service.

DKIM, SPF & DMARC — Email Authentication

Prove Every Email You Send
Is Genuinely From You.

DKIM, SPF, and DMARC are the three DNS-based authentication standards that prove your emails are legitimate — to Gmail, Outlook, Yahoo, and every other major mailbox provider. Migomail generates, validates, and monitors all three automatically from a single setup wizard.

DKIM Key Generation SPF Record Builder DMARC Policy Setup DNS Validation DMARC Reports
Migomail DKIM SPF DMARC Setup
2048
DKIM Key Bit Strength
3
Auth Protocols Covered
Auto
DNS Validation
100%
Alignment on All Sends
+14%
Avg Inbox Lift After Setup
4.9★
Customer Rating
Authentication Capabilities

The Three Records That Prove
Your Emails Are Genuinely Yours

Email authentication is not optional — Gmail, Outlook, and Yahoo require DKIM and SPF for inbox delivery, and Google mandates DMARC for bulk senders above 5,000 emails per day. Migomail's setup wizard configures all three and monitors them continuously.

01

DKIM Key Generation & Rotation

DomainKeys Identified Mail (DKIM) adds a cryptographic signature to every email you send — a digital proof that the email was sent by your domain and was not modified in transit. Migomail generates a 2048-bit RSA key pair, provides the exact TXT record value to add to your DNS, and signs every outgoing email automatically. Keys can be rotated on a schedule to maintain security best practice.

2048-bit RSA key generationSelector-based DKIM recordsAutomatic signing on every sendKey rotation scheduling
02

SPF Record Generation & Validation

Sender Policy Framework (SPF) is a DNS record that lists the mail servers authorised to send email from your domain. Migomail generates the exact SPF TXT record value — including Migomail's sending infrastructure — validates it after you add it to your DNS, and monitors it continuously for changes that would invalidate the record or push you over the 10-lookup DNS lookup limit.

SPF record value generationDNS lookup count monitoringConflict detection with existing recordsContinuous post-setup validation
03

DMARC Policy Configuration

DMARC (Domain-based Message Authentication, Reporting & Conformance) uses DKIM and SPF results to tell receiving mail servers what to do with emails that fail authentication — monitor only (p=none), quarantine to spam (p=quarantine), or reject outright (p=reject). Migomail's DMARC setup wizard walks you through choosing the right policy for your programme and generating the exact TXT record value.

Policy selection wizard (none/quarantine/reject)rua and ruf report URI configurationpct (percentage) rollout supportSubdomain policy configuration
04

DNS Validation & Monitoring

After you add each DNS record, Migomail validates it automatically — checking that the record is correctly formatted, accessible from the public DNS, returning the expected value, and aligning with your sending domain. Ongoing monitoring checks all three records daily and alerts you immediately if any record changes, expires, or becomes invalid.

Automatic post-add validationPropagation wait-and-recheckDaily health monitoringImmediate alert on record change
05

DMARC Report Processing

DMARC generates XML aggregate reports (RUA reports) from every major mailbox provider — daily reports showing which emails passed or failed authentication, from which IP addresses, and what action was taken under your DMARC policy. Migomail receives these reports on your behalf, processes them from raw XML into human-readable dashboards, and highlights any sources of authentication failure that need investigation.

RUA aggregate report processingHuman-readable DMARC dashboardFailure source identificationThird-party sender discovery
06

From Domain Alignment

DMARC requires that either DKIM or SPF is "aligned" — meaning the authenticated domain matches the From address domain. Migomail automatically configures DKIM signing to use your From address domain as the signing domain (d= parameter), ensuring DKIM alignment passes for every email you send. This is required for DMARC to generate a PASS result rather than a failure.

DKIM alignment (From = d= domain)SPF alignment configurationSubdomain alignment handlingAlignment status per send
07

Multi-Domain & Subdomain Support

If you send from multiple sending domains (yourbrand.com, news.yourbrand.com, promotions.yourbrand.com, youranotherbrand.com), Migomail manages a separate authentication configuration for each domain — separate DKIM keys, separate SPF records, and a separate DMARC policy per root domain. Each domain's authentication is validated and monitored independently.

Separate auth per sending domainSubdomain DKIM selector supportWildcard subdomain DMARCPer-domain health dashboard
08

BIMI Setup Support

Brand Indicators for Message Identification (BIMI) is an emerging standard that displays your brand logo in the inbox sender avatar — in Gmail, Yahoo, Apple Mail, and Fastmail — when your DMARC policy is set to p=reject with 100% coverage. Migomail supports the BIMI TXT record configuration and VMC (Verified Mark Certificate) setup guidance needed to enable the logo display.

BIMI TXT record configurationVMC certificate guidanceBIMI preview generationGmail / Yahoo BIMI support
The Three DNS Records

Exactly What You Add to Your DNS —
Generated by Migomail's Setup Wizard

Email authentication is configured entirely through DNS TXT records on your sending domain. Migomail's wizard generates the exact record values — you copy them into your DNS provider (Cloudflare, GoDaddy, Namecheap, Route 53) and Migomail validates them automatically.

DNS Zone Editor — yourbrand.com
✓ 3/3 Records Validated
Zone: yourbrand.com
All authentication records valid
Type
Hostname
Value
TTL
Status
DKIM
TXT
migo1._domainkey
.yourbrand.com
v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
3600
Valid
SPF
TXT
yourbrand.com
v=spf1 include:spf.migomail.com include:_spf.google.com -all
3600
Valid
DMARC
TXT
_dmarc
.yourbrand.com
v=DMARC1; p=quarantine; pct=100; rua=mailto:dmarc@yourbrand.com
3600
Valid
DKIM
Cryptographic Email Signature

The p= value is your 2048-bit public key. Receiving servers use it to verify the DKIM signature in every email header — proving the email was signed by your domain's private key and was not modified in transit. Migomail generates the key pair and signs all emails automatically.

SPF
Authorised Sending Server List

The include: values list the infrastructure authorised to send from your domain. -all means any server not on the list is rejected. Migomail monitors the DNS lookup count to stay within SPF's 10-lookup limit.

DMARC
Policy + Reporting Instruction

Tells receiving servers what to do when DKIM and SPF both fail: p=quarantine sends failing mail to spam. The rua= address receives daily XML reports of all authentication results from every major provider.

How Authentication Works

What Happens in Milliseconds
When Your Email Arrives at Gmail

The receiving mail server runs three parallel authentication checks before deciding what to do with your email. Understanding these checks explains why all three records are required — they verify different things and DMARC coordinates the results.

① DKIM Check
Verifies signature integrity
Extract
DKIM-Signature header read from email — extracts d= (signing domain) and s= (selector)
DNS Lookup
Query s._domainkey.d DNS record to retrieve public key
Verify
Re-hash email headers + body using public key — compare against DKIM signature
Alignment
Check d= domain matches the From: header domain (strict or relaxed)
DKIM=pass · aligned=yes
② SPF Check
Verifies sending server
Extract
Read the MAIL FROM (envelope from) address and extract the domain
DNS Lookup
Query MAIL FROM domain DNS record to retrieve SPF TXT record
Match
Check whether the connecting server IP appears in the SPF record's authorised IP list
Alignment
Check MAIL FROM domain matches the From: header domain
SPF=pass · aligned=yes
③ DMARC Evaluation
Coordinates DKIM + SPF results
Retrieve
Query _dmarc.yourdomain.com DNS record to get the DMARC policy
Evaluate
Check: did DKIM pass AND align? Did SPF pass AND align? At least one must pass for DMARC to pass
Apply Policy
If DMARC passes → deliver normally. If fails → apply p= policy (none/quarantine/reject)
Report
Aggregate result recorded for RUA daily report back to domain owner
DMARC=pass → Deliver to inbox
DMARC Pass Condition
At least one of DKIM or SPF must pass AND be aligned with the From: domain
If DMARC Passes
Email delivered normally — p= policy is not applied to passing emails
If DMARC Fails
p=none: deliver + report · p=quarantine: spam folder · p=reject: bounce
DMARC Policy Levels

Three DMARC Policies —
What Each Does to Failing Emails

DMARC is configured progressively. Most senders start at p=none to learn who is sending as their domain without affecting delivery, then escalate to p=quarantine and finally p=reject as confidence grows. Each level provides different protection.

Step 1 — Start here
p=none
Monitor only — no enforcement
When an email fails DMARC:
Email is delivered normally — the failure is recorded in the DMARC report only. No subscriber impact.
Start collecting DMARC reports immediately
Discover all legitimate senders of your domain
Identify unauthorised sources without delivery risk
Spoofed emails still reach subscriber inboxes
No protection against phishing using your domain
Step 2 — After verifying legitimate sends
p=quarantine
Failing emails → spam folder
When an email fails DMARC:
Email is routed to the subscriber's spam/junk folder — visible but requires the subscriber to look in spam.
Spoofed emails quarantined — not in Primary inbox
Phishing attempts using your domain deprioritised
Safe to escalate from p=none after review
Legitimately misconfigured senders also quarantined
Use pct= to roll out gradually if needed
Step 3 — Maximum protection
p=reject
Failing emails blocked completely
When an email fails DMARC:
Email is rejected at the SMTP level — never delivered, never seen. Spoofed emails using your domain are completely blocked.
Complete protection against domain spoofing
Required for BIMI logo display in Gmail/Yahoo
Required for Google Verified Sender program
Strongest possible sender reputation signal
Any legitimate misconfigured sender is fully blocked
How It Works

From Zero Authentication to
Fully Configured in 5 Steps

Migomail's authentication setup wizard walks you through every step — from generating keys to validating DNS records. Most senders complete full authentication setup in under 30 minutes.

01
Add Your Sending Domain
Enter your sending domain (yourbrand.com) in the Migomail authentication wizard. The wizard checks your existing DNS configuration to identify any conflicts or pre-existing SPF records that need to be merged.
02
Generate DKIM Key Pair
The wizard generates a 2048-bit RSA DKIM key pair — a private key (stored securely in Migomail) and a public key provided as a TXT record value. Copy the DKIM TXT record to your DNS.
03
Add SPF & DMARC Records
The wizard provides the exact SPF TXT record (with the correct include: for Migomail's sending IPs) and a DMARC TXT record (starting at p=none). Add both to your DNS at the indicated hostnames.
04
Validation
After adding the records, click "Validate" in Migomail. The wizard checks that all three records are correctly propagated, formatted, and returning the expected values. Any issues are flagged with the specific correction needed.
05
Monitor & Escalate
Review DMARC aggregate reports in the Migomail dashboard to confirm all legitimate sends are authenticating correctly. When confident, escalate DMARC from p=none to p=quarantine to p=reject.
Why All Three Matter Together

DKIM, SPF, and DMARC Work
as a System — Not Independently

Each authentication protocol addresses a different attack vector and provides a different piece of the deliverability puzzle. DMARC is meaningless without DKIM and SPF. DKIM and SPF provide no policy enforcement without DMARC. All three together is the only complete solution.

Protocol Interdependence — How the Three Work Together
DMARC
Policy
Coordinates + enforces
DKIM
Signs
Proves email was not tampered with in transit. Signs with private key.
SPF
Allows
Proves email came from an authorised server. Validates sending IP.
Foundation
Your DNS — The Single Source of Truth
All three protocols read their configuration from TXT records on your domain's DNS
+14%
Avg Inbox Placement Lift
Average improvement in Gmail inbox placement for senders who move from no authentication to DKIM + SPF + DMARC (p=quarantine).
99%+
Spoofing Attempts Blocked
Percentage of spoofed emails using your domain that are blocked when DMARC p=reject is in place with full DKIM and SPF coverage.
Required
Gmail Mandate (5K+ day)
Google mandates DMARC (minimum p=none) for senders above 5,000 emails per day since February 2024. Non-compliant senders face bulk routing.
3× faster
Reputation Recovery Speed
Senders with complete authentication recover from deliverability incidents approximately 3× faster than unauthenticated senders of similar list quality.
3
Auth Protocols — One Wizard
+14%
Avg Inbox Lift After Setup
< 30m
Setup Time (All 3 Records)
4.9★
Customer Rating
What Email Managers Say

From Teams Who Set Up Full
Authentication on Migomail

Feedback from email managers, technical founders, and deliverability engineers who configured DKIM, SPF, and DMARC on Migomail.

★★★★★

We were sending from a domain with no DMARC record for 18 months. I knew we needed it but kept putting it off because it seemed complex. After Google announced their February 2024 requirement, I finally set up the Migomail wizard. From starting the wizard to all three records validated in DNS: 22 minutes. The wizard generates the exact record values — you do not need to understand the underlying cryptography or RFC specifications. Copy, paste, validate. That is it. Within 48 hours of completing setup, our Gmail Postmaster Tools domain reputation went from "Medium" to "High" — the single biggest reputation improvement we had seen in two years of sending.

Kiran Babu
Kiran Babu
Marketing Director, EdTech Startup
★★★★★

We are a fintech company and our customers receive OTP emails and transaction notifications from us. When one of our customer service managers received a phishing email that looked exactly like one of our own transaction notifications — same From address, same subject line, professional layout — it became an immediate executive priority. We escalated our DMARC from p=quarantine to p=reject using Migomail's wizard. The wizard walked us through the process — check your DMARC pass rate first, identify any failing legitimate senders, fix them, then increase pct from 10% to 25% to 50% to 100% over three weeks to catch any remaining issues. Since reaching p=reject, our security team has confirmed through DMARC reports that over 4,000 spoofed email attempts per month using our domain are being blocked. Our customers are no longer reachable via domain spoofing.

Vivek Nambiar
Vivek Nambiar
Head of Technology, Fintech

Ready to Authenticate Every Email You Send?

DKIM, SPF, and DMARC configured in under 30 minutes with the Migomail setup wizard. DNS records generated, validated automatically, and monitored continuously — included in every plan.

star-1
star-2
Hero image

“Rackwave Technologies has significantly improved our marketing performance while providing reliable cloud services. We’ve been using their solutions for a while now, and the experience has been seamless, scalable, and results-driven.”

David Larry

Founder & CEO

Have a question or feedback? Fill out the form below, and we'll get back to you as soon as possible.

Sending your message…

Trusted for overall simplicity

Based on 400+ reviews with customer satisfaction on
Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot Trustpilot
FAQ

Frequently Asked Questions

Common questions about DKIM, SPF, and DMARC email authentication.

  • What is DKIM and why do I need it?

    DKIM (DomainKeys Identified Mail) is a cryptographic email signing protocol. When you configure DKIM, Migomail signs every email you send with a private key — adding a DKIM-Signature header to the email. The receiving mail server retrieves your public key from your DNS and uses it to verify that the signature is valid, proving two things: the email was sent by a server with access to your DKIM private key, and the email was not modified in transit between sending and receiving. Without DKIM, receiving servers have no cryptographic proof that the email content is as sent.

  • What is SPF and how is it different from DKIM?

    SPF (Sender Policy Framework) validates the server that sent the email — it checks whether the IP address of the server that delivered the email is listed in your domain's SPF DNS record as an authorised sender. DKIM validates the content of the email. The two checks are complementary: DKIM says "this email was signed by domain X" (content proof); SPF says "this IP is authorised to send for domain X" (server proof). Both are needed because they protect against different attack vectors — DKIM can survive email forwarding (which changes the server but not the signature), while SPF provides a simpler server-level check.

  • What is DMARC and why does it require both DKIM and SPF?

    DMARC (Domain-based Message Authentication Reporting and Conformance) is a policy layer that sits on top of DKIM and SPF. It does two things: (1) It requires that the authenticated domain (from DKIM's d= or SPF's MAIL FROM) is aligned with the From: address — preventing attacks where the authenticated domain differs from the displayed From address; (2) It tells receiving servers what to do when an email fails both DKIM and SPF: deliver normally (p=none), quarantine to spam (p=quarantine), or reject completely (p=reject). DMARC needs both DKIM and SPF because its pass/fail logic depends on at least one of them passing AND being aligned.

  • Do I have to configure all three, or can I start with just DKIM and SPF?

    You can start with DKIM and SPF only — they improve deliverability independently. However, as of February 2024, Google requires DMARC (minimum p=none) for senders above 5,000 emails per day to Gmail. Yahoo also requires DMARC for bulk senders. Additionally, DKIM and SPF alone provide no policy enforcement against spoofing — without DMARC, a spoofed email can pass individual authentication checks and still reach subscribers. DMARC is what closes the enforcement gap. Most senders who configure DKIM and SPF find DMARC setup adds only 5 additional minutes.

  • What should my DMARC policy be — none, quarantine, or reject?

    Start at p=none. Run it for 30 days and review DMARC reports to understand which emails are failing authentication and which sources are sending on behalf of your domain. Fix any legitimate senders that are failing. Then escalate to p=quarantine with pct=25 (affects only 25% of failing emails) and increase gradually over 2–3 weeks. Once your DMARC pass rate is consistently above 99%, escalate to p=reject. This progressive approach ensures you never accidentally block legitimate email from a platform you forgot to authenticate.

  • What is DMARC alignment and why does it matter?

    DMARC alignment means the domain in the DKIM signature (d= parameter) or the SPF-authenticated domain must match the domain in the From: header — the address your subscribers see. This prevents a specific attack where a bad actor signs their email with a legitimate domain's DKIM signature (for a domain they control) but uses a completely different domain in the From: header. Without alignment, DKIM would "pass" while the displayed From address is fraudulent. Migomail configures DKIM signing to use your From address domain automatically, ensuring DKIM alignment is satisfied for every email you send.

  • How do I know if my DMARC records are working correctly?

    Migomail validates all three records automatically when you add them and monitors them daily thereafter. You can also check the DMARC reports dashboard — once DMARC is configured with a rua= email address, every major mailbox provider (Gmail, Outlook, Yahoo) sends daily XML aggregate reports showing how many emails passed authentication, how many failed, and which IP addresses were sending on behalf of your domain. Migomail processes these XML reports and presents them as readable charts and tables, making it straightforward to identify any authentication problems without reading raw XML.

  • What is BIMI and does it require DMARC p=reject?

    BIMI (Brand Indicators for Message Identification) is an emerging standard that displays your brand logo in the inbox sender avatar — in Gmail, Yahoo, Apple Mail, and Fastmail. For Gmail specifically, BIMI requires: DMARC p=reject with pct=100, a Verified Mark Certificate (VMC) issued by a Certificate Authority like DigiCert or Entrust, and a BIMI TXT record pointing to an SVG version of your logo hosted at a specific URL. Yahoo supports BIMI without a VMC requirement. Migomail provides BIMI TXT record configuration guidance and logo preview generation — the VMC is obtained from your certificate authority of choice.