Loading
Email authentication is the foundation of email security. Understand how these three protocols work together to protect your domain from spoofing and improve deliverability.
Check Your Email AuthenticationEmail was designed in the 1970s and 1980s without any built-in method to verify who actually sent a message. This fundamental design flaw means that anyone can send an email claiming to be from your domain. Attackers exploit this to impersonate businesses, trick employees, and steal sensitive data. SPF, DKIM, and DMARC were developed to solve this problem by giving domain owners the ability to prove their emails are legitimate and tell receiving servers how to handle messages that fail verification.
Think of email authentication as a three-layer security system. Each layer addresses a different aspect of email verification, and together they provide comprehensive protection.
SPF
Who is allowed to send?
DKIM
Is the message authentic?
DMARC
What to do when checks fail?
SPF is the first line of defense. It allows you to publish a DNS record that lists every server and service authorized to send email on behalf of your domain. When a receiving server gets an email claiming to be from your domain, it checks your SPF record to see if the sending server is on the authorized list.
DKIM adds a digital signature to every outgoing email. This signature is created using a private key that only your mail server possesses. The corresponding public key is published in your DNS. Receiving servers use the public key to verify that the email was genuinely sent from your domain and that its content has not been modified in transit.
DMARC is the policy layer that ties SPF and DKIM together. It tells receiving servers what to do when an email fails authentication and provides a reporting mechanism so you can see who is sending email using your domain -- both legitimate services and attackers.
p=none (Monitor)
Take no action on failures, but send reports. Start here to understand your email ecosystem without impacting delivery.
p=quarantine (Spam)
Send failing emails to spam/junk. Use this after monitoring confirms all legitimate sources are authenticated.
p=reject (Block)
Block failing emails entirely. The strongest protection -- only deploy after thorough monitoring and quarantine phases.
"Is this email coming from a server that's authorized to send for this domain?"
Then...
"Was this email actually signed by the domain it claims to be from, and has it been tampered with?"
Finally...
"Both checks ran. Did at least one pass with domain alignment? If not, here's what to do with the email."
Our free tool checks your domain's SPF, DKIM, and DMARC records and identifies misconfigurations that could be hurting your deliverability or leaving you vulnerable to spoofing.
One email per month with our best articles. No spam.