DomainKeys Identified Mail (DKIM) is an email validation system used to prove that an email message has been sent by an authorized person or mail server. An electronic signature is attached to the header of the email message using a private cryptographic key. When the email is received, a public key that’s available in the global DNS database is used to validate who actually sent it and whether the content has been changed in any way. The principal job of DKIM is to avert the widespread scam and spam messages, as it makes it impossible to forge an email address. If a message is sent from an email address claiming to belong to your bank, for instance, but the signature doesn’t correspond, you will either not get the message at all, or you’ll get it with a warning that most likely it’s not authentic. It depends on email service providers what exactly will happen with an email that fails to pass the signature examination. DKIM will also supply you with an extra security layer when you communicate with your business allies, for example, as they can see for themselves that all the e-mail messages that you exchange are legitimate and have not been tampered with on their way.
DomainKeys Identified Mail in Shared Hosting
The DomainKeys Identified Mail feature is enabled by default for all domains that are hosted in a shared hosting account on our cloud platform, so you won’t have to do anything on your end to activate it. The only requirement is that the particular domain name should be hosted in a website hosting account on our platform using our MX and NS records, so that the email messages will go through our email servers. The private encryption key will be generated on the server and the TXT resource record, which includes the public key, will be published to the DNS system automatically, so you won’t have to do anything manually on your end in order to enable this feature. The DomainKeys Identified Mail validation system will enable you to send trustworthy emails, so if you are sending a newsletter or offers to customers, for instance, your emails will always reach their target destination, whereas unauthorized third parties will not be able to forge your email addresses.