DomainKeys Identified Mail (DKIM) is an authentication system used to verify that an e-mail has been sent by an authorized server or individual. An e-signature is added to the header of the email by using a private key. When the email message is received, a public key that is available in the global Domain Name System is used to verify who exactly sent it and if the content has been modified in some way. The primary function of DKIM is to block the widely spread scam and spam email messages, as it makes it impossible to fake an email address. If a message is sent from an address claiming to belong to your bank, for example, but the signature doesn’t match, you will either not receive the email at all, or you will receive it with a warning that most likely it is not genuine. It depends on mail service providers what exactly will happen with an email that fails the signature test. DomainKeys Identified Mail will also offer you an extra layer of security when you communicate with your business associates, for instance, since they can see for themselves that all the emails that you send are legitimate and haven’t been tampered with in the meantime.
DomainKeys Identified Mail in Cloud Hosting
The DomainKeys Identified Mail feature is activated by default for all domains that are hosted in a cloud hosting account on our cloud web hosting platform, so you will not need to do anything yourself to turn it on. The only requirement is that the given domain name should be hosted in a hosting account on our platform using our NS and MX records, so that the e-mail messages will go through our email servers. The private cryptographic key will be created on the server and the TXT resource record, which contains the public key, will be published to the global Domain Name System automatically, so you will not need to do anything manually on your end in order to enable this feature. The DomainKeys Identified Mail email authentication system will enable you to send out credible e-mails, so if you are sending offers or a newsletter to clients, for instance, your email messages will always reach their target destination, whereas unauthorized third parties won’t be able to spoof your email addresses.