Email Authentication 101: A Reading Guide
A curated reading path through email authentication. Start here if SPF, DKIM, and DMARC are new to you — or if you've been working around them and want to actually understand what's happening.
Who This Is For
You administer email for a domain. SPF, DKIM, and DMARC are not new concepts to you, but you may have set them up once years ago and never thought about them again — or you've inherited a domain whose authentication state you don't fully understand. You want a structured way to learn the surface area without reading thirty unrelated articles in random order.
This page is a reading guide. Each section is a short orientation followed by links into the deeper guides. Read it top-to-bottom on your first pass. Come back to individual sections when you're working on a specific problem.
If you need a definition rather than a guide, jump to the Email Authentication Glossary.
Start Here: Why Email Authentication Exists
SMTP, the protocol that delivers email, was published in 1982. It has no built-in mechanism to verify sender identity. Any server on the internet can claim to be sending mail from any domain, and the receiving server has to take that claim at face value unless something else tells it otherwise. SPF, DKIM, and DMARC are that "something else." They are three layers that, together, let a receiving server decide whether an inbound message actually came from the domain it claims.
Start with the Complete Guide to Email Authentication. It walks through the full stack end-to-end in one read. Treat the rest of this page as the deeper-dive sequel.
Then read Bulk Sender Requirements for the current rules at Google, Yahoo, and Microsoft. Authentication moved from "recommended" to effectively required in 2024, and the enforcement bar keeps moving.
SPF: Authorizing Senders
SPF (Sender Policy Framework) is a DNS TXT record that lists the IP addresses and hosts allowed to send mail on behalf of your domain. A receiving server looks up your SPF record, checks whether the sending IP is on the list, and produces a pass/fail/softfail result. SPF is specified in RFC 7208 — or read our annotated walkthrough at SPF Standard (RFC 7208) Explained.
Three things trip people up on SPF, in order of how often we see them:
- The 10-lookup limit. Every
include:,a,mx,exists:, andredirect=counts against a hard 10-lookup budget. Most modern setups (Google Workspace + Microsoft 365 + a marketing tool + a transactional tool) exceed it. When you exceed it, your SPF result becomespermerrorand SPF stops being evaluated at all. See How to Build an SPF Record for the mechanics and What Is SPF Flattening? for the fix. - SPF checks the envelope, not the visible
From:. SPF authenticates theReturn-Path(RFC5321 MailFrom), which the user never sees. This is why SPF alone can't stop spoofing — DMARC is what ties SPF back to theFrom:header. - SPF breaks on forwarding. If a server forwards your email to a different address, the forwarding server's IP is not in your SPF record. SPF fails at the final destination. See Email Forwarding and Authentication.
When you're ready to inspect a real domain, the mxio SPF Checker shows the current record, the resolved lookup count, and which includes are eating your budget.
DKIM: Signing Messages
DKIM (DomainKeys Identified Mail) adds a cryptographic signature to each outgoing message. The sending server signs specific headers and the body with a private key; the public key lives in DNS at <selector>._domainkey.<domain>. The receiving server fetches the public key, verifies the signature, and confirms that the signed content wasn't modified in transit. DKIM is specified in RFC 6376 — or read DKIM Standard (RFC 6376) Explained.
The DKIM section of the Complete Guide to Email Authentication covers selectors, key rotation, and the canonicalization options. The two things worth internalizing on your first read:
- Selectors let you have many DKIM keys at once. Each service that signs mail as your domain (Google, Microsoft, SendGrid, Mailchimp, MailRoute) signs with its own selector. There is no conflict between them — each selector is a separate DNS record.
- DKIM survives forwarding, SPF does not. The signature travels with the message. This is one of the main reasons DMARC was designed to pass if either SPF or DKIM aligns with the
From:header.
If you're chasing down a specific DKIM problem, DKIM Record Not Found and DKIM Body Hash Not Verified are the two most-hit error pages.
DMARC: Enforcing Policy and Getting Reports
DMARC (RFC 7489, annotated at DMARC Standard Explained) does two things SPF and DKIM cannot do on their own:
- It ties SPF and DKIM back to the
From:header that users actually see. This is called alignment. - It tells receivers what to do when authentication fails (
p=none,p=quarantine, orp=reject) and asks them to send you reports about what they're seeing.
The reports are the part most admins underuse. DMARC aggregate reports are the only way to see which IPs are sending mail claiming to be your domain — including IPs you didn't know about. Start with Understanding DMARC Reports and then DMARC Aggregate Report Explained for the XML field reference.
For deployment, follow the DMARC Deployment Guide. The short version: start at p=none with reporting on, watch the aggregate reports for two to four weeks, fix the senders that fail alignment, then move to p=quarantine with pct=10 and ratchet upward. The full path is in The DMARC Enforcement Journey.
If you're on Google Workspace or Microsoft 365, DMARC for Google Workspace and Microsoft 365 and Setting Up DMARC on Office 365 cover the provider-specific gotchas.
The mxio DMARC Checker verifies your record and reports its policy state.
Adjacent Protocols: BIMI, MTA-STS, TLS-RPT, ARC
Once SPF, DKIM, and DMARC are in place, four adjacent protocols are worth knowing about.
- MTA-STS (RFC 8461, annotated at MTA-STS Standard Explained, guide at MTA-STS Explained) tells sending servers to require TLS for connections to your inbound mail. It closes a downgrade attack that opportunistic TLS leaves open.
- TLS-RPT publishes a reporting address for TLS-delivery failures, so you find out when senders can't establish TLS to your domain. It pairs with MTA-STS.
- BIMI (Brand Indicators for Message Identification) lets you publish a logo that compatible clients display next to authenticated mail. BIMI requires DMARC at
p=quarantineorp=rejectand, for most placements, a Verified Mark Certificate (VMC). It's brand-trust signal, not a security control. See the glossary entry for the short version. - ARC (Authenticated Received Chain) preserves the original authentication results across forwarding hops, so a mailing list or forwarder can vouch that the message passed authentication at an earlier point. See the glossary entry.
Operate and Maintain
Email authentication is not a project you finish; it's a system you operate. The pieces drift. SPF includes change without warning. DKIM keys get rotated. A new SaaS tool gets approved and starts sending mail through a selector you didn't know about. A subdomain gets handed to a marketing agency.
Three habits handle most of the drift:
- Monitor the records. Domain Health Check Explained covers what mxio watches and how often.
- Read the DMARC reports. Don't just publish DMARC and ignore it — the aggregate reports are how new senders surface. mxio's DMARC dashboard groups senders by source and surfaces the ones you haven't seen before.
- Read headers when something looks wrong. Email Header Analysis walks through the
Authentication-Resultsheader and what each result means.
For multi-tenant operators (MSPs and IT services firms), Email Authentication for MSPs covers managing authentication across many client domains.
When You Need a Definition, Not a Guide
The Email Authentication Glossary defines the working vocabulary — SPF mechanisms, DMARC tags, alignment modes, report types, and the protocols above — with a link from each term back to the guide that covers it in depth.
Related Articles
Understand how SPF, DKIM, and DMARC work together to protect your domain from spoofing and improve email deliverability. A practical guide for email administrators.
Definitions for the working vocabulary of email authentication. Each term: what it is, why it matters, and where to read more.
Build a correct SPF record for your domain using the mxio SPF Builder. Select your email providers, set your policy, and publish with confidence.
SPF flattening resolves include mechanisms to IP addresses, reducing DNS lookups. Learn how it works, the risks of manual flattening, and when you need automated flattening.
Step-by-step guide to deploying DMARC on your domain. Start with monitoring, identify unauthorized senders, and safely progress to full enforcement.
How to safely move DMARC from monitoring mode to full enforcement. The enforcement ladder, readiness signals, what goes wrong at each stage, and when to hold.
A practical walkthrough of DMARC aggregate report XML. What the format contains, how to read source IPs, what alignment means in context, and the common patterns to recognize.
A field-by-field walkthrough of the DMARC aggregate XML. Worked example, what each element tells you, what the report does not tell you, and how to turn it into action.
MTA-STS forces sending servers to use TLS when delivering email to your domain, closing the gap left by opportunistic STARTTLS. This guide covers the DNS TXT record, the HTTPS-hosted policy file, testing vs enforce mode, and common deployment mistakes.
Email forwarding breaks SPF and can cause DMARC failures. Learn how SRS fixes SPF, why DKIM alignment matters for forwarded mail, and what domain owners and recipients can do.
Learn how to read email headers to diagnose SPF, DKIM, and DMARC authentication failures. Understand Authentication-Results headers and trace delivery paths.
Complete guide to bulk sender authentication requirements from Gmail, Yahoo Mail, and Microsoft. SPF, DKIM, DMARC, unsubscribe headers, and spam rate thresholds.
Understand what the mxio Domain Health Check measures across SPF, DKIM, DMARC, MX, and DNS delegation — and how to interpret your health score.
A section-by-section walkthrough of RFC 7208, the standard that defines SPF. Covers every mechanism, qualifier, the 10-lookup limit, void lookups, ptr deprecation, macros, and security considerations — with practical examples and tool links.
Annotated walkthrough of RFC 6376 — DomainKeys Identified Mail (DKIM) Signatures. How signing works, key record format, canonicalization modes, verification steps, and security guidance from the spec itself.
Annotated walkthrough of RFC 7489 — Domain-based Message Authentication, Reporting, and Conformance. Policy tags, alignment, reporting, and security considerations from the spec itself.
A section-by-section walkthrough of RFC 8461, the standard that defines SMTP MTA Strict Transport Security (MTA-STS). Covers the STARTTLS downgrade problem, policy discovery via DNS TXT records, the HTTPS-hosted policy file, enforcement modes, MX matching rules, caching behavior, and how MTA-STS compares to DANE — with practical examples and tool links.