Learn the importance of SPF, DKIM, DMARC, and BIMI in ensuring email delivery.
Proper email authentication can be the difference between reaching the human or the spam folder, but it is often overlooked or misunderstood.
Think of your emails as a startup getting into a competitive accelerator program.
Competitive startup programs will receive 10's of thousands of applications. Their first step is to see which of these applications can be thrown out without being considered.
SPF (Sender Policy Framework) is similar. It's the first triage of the emails coming to an inbox, checking to make sure that each email should even be considered for delivery.
The DNS record for SPF declares a list of origins (servers) that are allowed to send email for this domain, and the inbox will confirm that the message they received matches one of them. If a server isn't on the list, it's like an application being tossed out because it wasn't fully filled or the business idea is illegal.
Every domain or subdomain can only have one SPF policy, and policies on the root/apex domain (domain.com) are not applied to subdomains (sub.domain.com).
Your SPF policy, specified in a TXT record, probably looks like this:
v=spf1 include:_spf.google.com include:amazonses.com ~all
When a mailbox receives a message from you, it will look at the Return-Path in the email header and expects it to map back to one of the origins specified in the record.
If the application passes that initial check, then the vetting process begins to make sure all the claims the applicants made are true.
DKIM (DomainKeys Identified Mail) plays a similar role to confirm the legitimacy of the message by adding a signature on each message that verifies the email sender is who they say they are.
DKIM is set with a private/public key pairing.
Especially as your company becomes more well known, there are more incentives for hackers to send an email as if it is from you.
The DKIM, like a strong login password, is an essential way to prove who you are by providing information only you know.
It is common to have multiple DKIM records, usually one or more per email provider.
What if an applicant fails one of these steps? How should their application be handled?
DMARC (Domain-based Message Authentication, Reporting & Conformance) is the selection policy. It sets rules for what happens if an applicant lies on an application (DKIM) vs. not demonstrate enough traction (SPF). For email, DMARC establishes your policy as a sender for what should happen to your messages if they fail DKIM or SPF.
You would likely have one DMARC policy set for your entire domain, including subdomains, in a TXT record that looks like this:
v=DMARC1;p=quarantine;pct=100;rua=mailto:dmarc@domain.com
Implementing DMARC, particularly with a policy of quarantine or reject, enhances your domain's reputation. This is because inbox providers can rely on your commitment to prevent the delivery of suspicious messages, thereby improving their user experience within the inbox.
Check out our full guide on how to set up DMARC.
Making it into a startup accelerator is an amazing feat, but if you want to be exceptional, you need to gain the attention of the industry leaders and pioneers. There are no hacks or shortcuts to this, you simply need to prove yourself.
BIMI (Brand Indicators for Message Identification) is this kind of access in the inbox. It sets you apart from all the others by showcasing your brand and legitimacy to your users in the inbox by displaying your logo and, in some cases, a verified checkmark.
With over 347 billion emails sent every day, this is an exceptional way to stand out.
Obtaining BIMI is exclusive because of the long, hard process it takes to complete the verification. Here are a few things you need:
v=BIMI1; l=https://vmc.digicert.com/00-00.svg; a=https://vmc.digicert.com/00-00.pem;
Check out our full guide on how to set up BIMI.
The good news is that SPF and DKIM are handled for you when using Resend. All you need to do is add a domain and we take care of the rest.
Ultimately, inbox providers aim to only show the emails their users want to see, and spoofed or compromised emails are not on the list.
Without these protocols, they can't tell you from a spammer.
Assure them you're legit, and they'll prioritize your emails. It's a win-win.