Emails sent from your domain do not contain a DKIM-Signature header. The email content cannot be verified as unmodified and the sending domain cannot be cryptographically authenticated.
Enable DKIM signing in your email provider and publish the public key in DNS.
DKIM adds a cryptographic signature to outgoing emails. When no DKIM-Signature header is present, the receiving server cannot verify that the email was actually sent by an authorized server or that the content was not tampered with in transit.
Without DKIM, you lose one of the two alignment mechanisms for DMARC. If SPF fails (common with email forwarding), there is no fallback and DMARC will fail. DKIM also improves sender reputation and deliverability.
Log into your email service provider's admin panel and enable DKIM. They will generate a key pair and provide you with the public key to publish in DNS.
Create a TXT or CNAME record at the selector._domainkey.yourdomain.com location provided by your email service.
# For Google Workspace:
Type: TXT
Host: google._domainkey
Value: v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A...(your public key)...
# For Microsoft 365:
Type: CNAME
Host: selector1._domainkey
Value: selector1-yourdomain-com._domainkey.yourtenant.onmicrosoft.comSome providers require you to explicitly enable DKIM signing after publishing the DNS record. Toggle it on in your admin panel.
Send a test email and check the headers for a DKIM-Signature header and a passing DKIM result.
# In the email headers, look for:
# DKIM-Signature: v=1; a=rsa-sha256; d=yourdomain.com; s=google; ...
# Authentication-Results: ... dkim=pass header.d=yourdomain.comAfter making changes, use our free scanner to verify the fix is working correctly. DNS changes can take up to 48 hours to propagate, but most propagate within minutes.
In the Google Admin console, go to Apps > Google Workspace > Gmail > Authenticate email. Generate a new DKIM key (select 2048-bit), add the TXT record to your DNS, then click "Start Authentication".
Yes. Each email service that sends on behalf of your domain should have its own DKIM selector and key pair. They publish under different selectors, so they do not conflict.
A selector is a name that identifies a specific DKIM key. The full DNS location is selector._domainkey.yourdomain.com. Different services use different selectors (e.g., "google" for Google Workspace, "s1" for SendGrid).