DomainKeys Identified Mail, or DKIM, is a method for checking the legitimacy of an email using a digital signature. When DKIM is activated for a given domain name, a public encryption key is published to the global Domain Name System and a private one is stored on the mail server. If a new email is sent, a signature is issued using the private key and when the email message is delivered, that signature is authenticated by the POP3/IMAP mail server using the public key. In this way, the receiver can easily know if the message is authentic or if the sender’s address has been spoofed. A discrepancy will appear if the content of the email message has been modified in the meantime as well, so DKIM can also be used to make sure that the sent and the received email messages are identical and that nothing has been added or deleted. This authentication system will increase your email safety, as you can verify the legitimacy of the important email messages that you receive and your partners can do likewise with the messages that you send them. Depending on the given email service provider’s policy, an email message that fails the examination may be erased or may reach the receiver’s inbox with a warning.
DomainKeys Identified Mail in Shared Web Hosting
The DomainKeys Identified Mail functionality is enabled by default for all domains that are hosted in a shared web hosting account on our cloud servers, so you won’t need to do anything on your end to turn it on. The sole requirement is that the given domain should be hosted in a hosting account on our platform using our NS and MX resource records, so that the e-mail messages will go through our mail servers. The private encryption key will be created on the server and the TXT resource record, which contains the public key, will be published to the Domain Name System automatically, so you won’t have to do anything manually on your end in order to enable this option. The DKIM email validation system will allow you to send trustable e-mails, so if you are sending a newsletter or offers to clients, for example, your email messages will always reach their target viewers, whereas unsolicited third parties won’t be able to spoof your email addresses.