DomainKeys Identified Mail (DKIM) is an email authentication system used to confirm that an email has been sent by an authorized email server or person. A digital signature is attached to the email’s header by using a private key. When the email message is received, a public key that’s available in the global DNS database is used to confirm who exactly sent it and if the content has been modified in any way. The principal purpose of DKIM is to hinder the widely spread scam and spam email messages, as it makes it impossible to fake an email address. If a message is sent from an email address claiming to belong to your bank, for instance, but the signature doesn’t correspond, you will either not receive the email at all, or you will get it with a warning note that most likely it is not authentic. It depends on email providers what exactly will happen with an email message that fails to pass the signature test. DKIM will also give you an additional layer of safety when you communicate with your business partners, for instance, as they can see for themselves that all the emails that you exchange are legitimate and haven’t been meddled with in the meantime.

DomainKeys Identified Mail in Cloud Hosting

The DomainKeys Identified Mail functionality is pre-activated for all domains that are hosted in a cloud hosting account on our cloud web hosting platform, so you won’t have to do anything yourself to enable it. The only condition is that the given domain name should be hosted in a web hosting account on our platform using our MX and NS resource records, so that the emails will go through our email servers. The private cryptographic key will be created on the server and the TXT resource record, which includes the public key, will be published to the global DNS database automatically, so you won’t need to do anything manually on your end in order to enable this option. The DomainKeys Identified Mail validation system will permit you to send out trustable e-mail messages, so if you’re sending a newsletter or offers to customers, for instance, your emails will always reach their target audience, whereas unauthorized 3rd parties will not be able to forge your email addresses.