DomainKeys Identified Mail, or DKIM, is a system for confirming the authenticity of an email using a digital signature. When DKIM is activated for a given domain name, a public cryptographic key is published to the global Domain Name System and a private one is kept on the email server. When a new message is sent, a signature is issued using the private key and when the email is received, the signature is verified by the incoming POP3/IMAP server using the public key. In this way, the recipient can easily know if the email is genuine or if the sender’s address has been spoofed. A discrepancy will appear if the content of the email has been changed on its way as well, so DKIM can also be used to ensure that the sent and the received messages are identical and that nothing has been attached or erased. This validation system will increase your email security, since you can verify the authenticity of the important email messages that you receive and your associates can do the exact same thing with the email messages that you send them. Depending on the given mail service provider’s adopted policies, an email that fails the test may be removed or may end up in the recipient’s mailbox with a warning notification.

DomainKeys Identified Mail in Shared Website Hosting

The DomainKeys Identified Mail functionality is pre-activated for all domains that are hosted in a shared website hosting account on our cloud platform, so you will not have to do anything yourself to activate it. The sole condition is that the particular domain should be hosted in an account on our end using our MX and NS records, so that the emails will go through our email servers. The private cryptographic key will be created on the server and the TXT resource record, which includes the public key, will be published to the global Domain Name System automatically, so you won’t have to do anything manually on your end in order to activate this feature. The DKIM email authentication system will allow you to send out credible messages, so if you are sending offers or a newsletter to clients, for example, your emails will always reach their target destination, whereas unsolicited third parties will not be able to spoof your email addresses.