DomainKeys Identified Mail, or DKIM, is a system for verifying the authenticity of an email using a digital signature. When DomainKeys Identified Mail is activated for a given domain, a public key is published to the global DNS system and a private one is stored on the mail server. When a new email is sent, a signature is generated using the private key and when the email is received, that signature is checked by the POP3/IMAP mail server using the public key. Thus, the receiver can easily distinguish if the email message is genuine or if the sender’s address has been forged. A discrepancy will occur if the content of the email has been modified on its way as well, so DKIM can also be used to make sure that the sent and the received emails are identical and that nothing has been added or removed. This email validation system will boost your email safety, since you can verify the genuineness of the important email messages that you get and your colleagues can do likewise with the messages that you send them. Depending on the particular mail service provider’s adopted policies, an email message that fails the check may be removed or may appear in the recipient’s mailbox with a warning.

DomainKeys Identified Mail in Shared Website Hosting

The DomainKeys Identified Mail option is pre-activated for all domains that are hosted in a shared website hosting account on our cloud servers, so you will not need to do anything yourself to enable it. The sole requirement is that the particular domain should be hosted in a hosting account on our end using our NS and MX resource records, so that the e-mail messages will go through our email servers. The private key will be created on the server and the TXT record, which contains the public key, will be published to the DNS system automatically, so you won’t have to do anything manually on your end in order to activate this functionality. The DKIM email authentication system will allow you to send out credible email messages, so if you’re sending a newsletter or offers to clients, for example, your email messages will always reach their target destination, while unauthorized third parties won’t be able to spoof your email addresses.