{"id":1843,"date":"2021-03-26T10:45:00","date_gmt":"2021-03-26T14:45:00","guid":{"rendered":"https:\/\/www.dialoginsight.com\/demystifier-protocoles-authentification-spf-dkim-dmarc\/"},"modified":"2023-07-12T14:32:31","modified_gmt":"2023-07-12T18:32:31","slug":"demystifying-spf-dkim-dmarc-authentication-protocols","status":"publish","type":"post","link":"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/","title":{"rendered":"Demystifying SPF, DKIM and DMARC authentication protocols"},"content":{"rendered":"<p>I am certainly not the only one who regularly gets suspicious emails in my inbox. People with bad intentions pretend to be a trusted company in order to scam people by using fraudulent links. This is what we call phishing. Of course, these practices are harmful to everyone who gets scammed. But we don&#8217;t realize enough that it also impacts legitimate businesses that try to communicate with their customers. Email service providers like Outlook, Gmail, Yahoo, etc. are becoming more and more suspicious of any email that comes through them. Unfortunately, without action on your part, you are at risk of your email being blocked before it even reaches the recipient. How to avoid this? It&#8217;s relatively simple. In this article, you will learn what the main email authentication protocols are, what they are used for and how to configure them with Dialog Insight.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<h2><span class=\"text-color-brand-color-4\"><strong>What is the purpose of email authentication protocols?<\/strong><\/span><\/h2>\n<p>In most cases, recipients rely on the sender&#8217;s name and address to know who the email is from. However, it is easy for a spammer, through basic manipulations, to alter the sender&#8217;s name and address. This reality allows these scammers to use a trusted sender address to get unsuspecting consumers to open their emails. This poses a great threat to businesses who see their trusted and reputable brand name hijacked for malicious purposes.<\/p>\n<p>Authentication protocols are configurations that will prove to email providers that your email is legitimate and that you are the owner of the domain you are sending from. It is therefore one of the most effective ways to prevent scammers from impersonating you by using your domain name. Authentication protocols are now considered a standard in email marketing and messages sent without at least an SPF and\/or DKIM signature are immediately seen as suspicious by email analysis tools.<\/p>\n<p>Another undeniable benefit of proper authentication is that it improves your <strong><a href=\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/10-tips-to-improve-the-deliverability-of-your-emails\/\">deliverability<\/a><\/strong>. By being identified as a legitimate sender, you are much more likely to have your email reach the inbox rather than the junk folder. Beware though, email authentication is not the silver bullet that will solve your deliverability problems. It is ONE of many actions to take.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<h2><span class=\"text-color-brand-color-4\">The main authentication protocols<\/span><\/h2>\n<h3>SPF (Sender Policy Framework)<\/h3>\n<p>This registration authorizes certain servers to send emails using a specified domain name. Email providers are then able to verify that the incoming email comes from an authorized sender. The result of the verification is then recorded in the email header and is used to determine if the email is accepted in the recipient&#8217;s inbox.<\/p>\n<p>However, the SPF protocol has some limitations. For example, forwarded emails may fail an authorization check even when the original email is legitimate because the forwarded emails originate from the IP address used by the forwarder, not the IP address of the original sender.<\/p>\n<p>\u00a0<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-1844 size-full\" src=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2021\/03\/spf-authentication-protocols.jpg\" alt=\"\" width=\"893\" height=\"348\" srcset=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2021\/03\/spf-authentication-protocols.jpg 893w, https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2021\/03\/spf-authentication-protocols-300x117.jpg 300w, https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2021\/03\/spf-authentication-protocols-768x299.jpg 768w\" sizes=\"(max-width: 893px) 100vw, 893px\" \/><\/p>\n<h3>\u00a0<\/h3>\n<h3>DKIM (DomainKeys Identified Mail)<\/h3>\n<p>DKIM adds an encrypted signature (public and private key) to the header of all outgoing messages. Obviously, this code is hidden and does not appear in the final visual of your email.\u00a0 Email servers that receive signed messages use DKIM to decrypt the message header and verify the authenticity of the signature.<\/p>\n<p>By using DKIM signing in addition to SPF, you take the security and protection of your identity to a much higher level.<\/p>\n<p>\u00a0<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-1847 size-full\" src=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2021\/03\/dkim-authentication-protocol.jpg\" alt=\"\" width=\"893\" height=\"346\" srcset=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2021\/03\/dkim-authentication-protocol.jpg 893w, https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2021\/03\/dkim-authentication-protocol-300x116.jpg 300w, https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2021\/03\/dkim-authentication-protocol-768x298.jpg 768w\" sizes=\"(max-width: 893px) 100vw, 893px\" \/><\/p>\n<p>\u00a0<\/p>\n<p>Note that as a sender, configuring a DKIM signature will not prevent you from being considered a spammer by email providers if you do not apply <strong><a href=\"https:\/\/communications.dialoginsight.com\/T\/WF\/8479\/tg1yUf\/Register\/en-US\/Form.ofsys\">good emailing practices<\/a><\/strong>. You should therefore make sure to respect these good practices when designing the content of your emails.<\/p>\n<p>\u00a0<\/p>\n<h3>DMARC (Domain-based Message Authentication, Reporting and Conformance)<\/h3>\n<p>DMARC is a complementary authentication layer to SPF and DKIM that ensures that the sender identity presented to the recipient of an email is the same sender identity displayed to the receiving server. It allows the sender to certify that they are protected by SPF and DKIM. Although SPF and DKIM signatures help prove that an email is legitimate, their absence or failure does not prove the opposite. This technology, therefore, also allows the domain owner to specify how suspicious emails that fail SPF and DKIM checks are handled. They can either be placed in the spam folder or rejected.<\/p>\n<p>DMARC also provides the ability to receive reports detailing which messages have passed or failed the verifications and, if applicable, where in the authentication protocol these failures occurred. This information is extremely valuable as it can help identify attacks and infrastructure vulnerabilities.<\/p>\n<p>\u00a0<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-1850 size-full\" src=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2021\/03\/dmarc-authentication-protocol.jpg\" alt=\"\" width=\"1076\" height=\"406\" srcset=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2021\/03\/dmarc-authentication-protocol.jpg 1076w, https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2021\/03\/dmarc-authentication-protocol-300x113.jpg 300w, https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2021\/03\/dmarc-authentication-protocol-1024x386.jpg 1024w, https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2021\/03\/dmarc-authentication-protocol-768x290.jpg 768w\" sizes=\"(max-width: 1076px) 100vw, 1076px\" \/><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<h2><span class=\"text-color-brand-color-4\"><strong>Configuring SPF, DKIM and DMARC authentication protocols with Dialog Insight<\/strong><\/span><\/h2>\n<p>Unfortunately, just because you&#8217;re dealing with a trusted email provider doesn&#8217;t mean you&#8217;re automatically exempt from doing your own configurations. Some actions can only be done by you. To configure your domain&#8217;s SPF, DKIM, and DMARC authentication settings, you will need to access your server&#8217;s DNS records.<\/p>\n<p>\u00a0<\/p>\n<h3>SPF<\/h3>\n<p>Note that if you are a Dialog Insight customer, configuring SPF is optional since Dialog Insight supports SPF by default if your mailings are sent from our shared addresses. If you are using a dedicated IP address for your emails, you will need to configure it and a procedure will then be provided.<\/p>\n<p>\u00a0<\/p>\n<h3>DKIM<\/h3>\n<p>You can send a DKIM signature request to our support team, indicating the list of domains that you need. You will then only have to create the DNS entries that will be provided by our team in the domains and notify technical support when they are done. We will then validate the entries and activate the DKIM signatures for these domains in your account.<\/p>\n<p>\u00a0<\/p>\n<h3>DMARC<\/h3>\n<p>There is no action that has to be taken by Dialog Insight to set up a DMARC policy. This is fully supported on the client-side. The <a href=\"https:\/\/dmarc.org\"><strong>https:\/\/dmarc.org<\/strong><\/a> website contains all the resources necessary for your team to fully understand DMARC, prepare an appropriate policy and test it.<\/p>\n<p>\u00a0<\/p>\n<h2><span class=\"text-color-brand-color-4\"><strong>Key takeaway<\/strong><\/span><\/h2>\n<p>There are several email authentication protocols. It&#8217;s important to get the configurations right to protect your brand from spammers, who are unfortunately becoming more numerous and smarter. By combining SPF, DKIM and DMARC, your protection will be greatly enhanced. Don&#8217;t hesitate to call your email service provider for assistance if necessary.<\/p>\n<p>And if you want to improve your email communications in general, take the opportunity to review best practices and <strong><a href=\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/optimize-email-template-anti-spam-filters\/\">optimize your templates for anti-spam filters<\/a><\/strong>.<\/p>\n\n\n<div class=\"wp-block-columns blog-cta-block-ressource has-background is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\" style=\"background-color:#05d17d\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"550\" height=\"479\" src=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/05\/icone_v3_livre-550x479-1.png\" alt=\"Whitepapper_dialog insight\" class=\"wp-image-67\" srcset=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/05\/icone_v3_livre-550x479-1.png 550w, https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/05\/icone_v3_livre-550x479-1-300x261.png 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#0c2734;font-style:normal;font-weight:700\">Would you like to know more about email deliverability?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-white-color has-text-color\" style=\"font-style:normal;font-weight:400\">Download our white paper to get all the details!<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button dark-bg-btn-blog is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-white-color has-text-color wp-element-button\" href=\"https:\/\/communications.dialoginsight.com\/T\/WF\/8486\/xMnW5T\/Register\/en-US\/livre_blanc\" style=\"border-radius:11px\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learn about the SPF, DKIM and DMARC email authentication protocols, why to use them and how to configure them with Dialog Insight.<\/p>\n","protected":false},"author":3,"featured_media":1080,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-1843","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-omni-channel-marketing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Authentication protocols SPF, DKIM, DMARC | Dialog Insight<\/title>\n<meta name=\"description\" content=\"Learn about the SPF, DKIM and DMARC email authentication protocols, why to use them and how to configure them with Dialog Insight.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Authentication protocols SPF, DKIM, DMARC | Dialog Insight\" \/>\n<meta property=\"og:description\" content=\"Learn about the SPF, DKIM and DMARC email authentication protocols, why to use them and how to configure them with Dialog Insight.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/\" \/>\n<meta property=\"og:site_name\" content=\"Dialog Insight\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-26T14:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-12T18:32:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/protocoles-dauthentification-spf-dkim-dmarc.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sophie Lamarche\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sophie Lamarche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/\"},\"author\":{\"name\":\"Sophie Lamarche\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/86b00483c1475c0aee1c3cf21cf7292e\"},\"headline\":\"Demystifying SPF, DKIM and DMARC authentication protocols\",\"datePublished\":\"2021-03-26T14:45:00+00:00\",\"dateModified\":\"2023-07-12T18:32:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/\"},\"wordCount\":1085,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/protocoles-dauthentification-spf-dkim-dmarc.jpg\",\"articleSection\":[\"Omni-Channel Marketing Campaign\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/\",\"url\":\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/\",\"name\":\"Authentication protocols SPF, DKIM, DMARC | Dialog Insight\",\"isPartOf\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/protocoles-dauthentification-spf-dkim-dmarc.jpg\",\"datePublished\":\"2021-03-26T14:45:00+00:00\",\"dateModified\":\"2023-07-12T18:32:31+00:00\",\"author\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/86b00483c1475c0aee1c3cf21cf7292e\"},\"description\":\"Learn about the SPF, DKIM and DMARC email authentication protocols, why to use them and how to configure them with Dialog Insight.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#primaryimage\",\"url\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/protocoles-dauthentification-spf-dkim-dmarc.jpg\",\"contentUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/protocoles-dauthentification-spf-dkim-dmarc.jpg\",\"width\":1200,\"height\":628,\"caption\":\"protocoles dauthentification spf dkim dmarc\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.dialoginsight.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Demystifying SPF, DKIM and DMARC authentication protocols\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#website\",\"url\":\"https:\/\/www.dialoginsight.com\/en\/\",\"name\":\"Dialog Insight\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dialoginsight.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/86b00483c1475c0aee1c3cf21cf7292e\",\"name\":\"Sophie Lamarche\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c33b62b92dd96c951d01d5941062e7183d27ab8ae3a0dea67cfdeaeed7aedeed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c33b62b92dd96c951d01d5941062e7183d27ab8ae3a0dea67cfdeaeed7aedeed?s=96&d=mm&r=g\",\"caption\":\"Sophie Lamarche\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Authentication protocols SPF, DKIM, DMARC | Dialog Insight","description":"Learn about the SPF, DKIM and DMARC email authentication protocols, why to use them and how to configure them with Dialog Insight.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/","og_locale":"en_US","og_type":"article","og_title":"Authentication protocols SPF, DKIM, DMARC | Dialog Insight","og_description":"Learn about the SPF, DKIM and DMARC email authentication protocols, why to use them and how to configure them with Dialog Insight.","og_url":"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/","og_site_name":"Dialog Insight","article_published_time":"2021-03-26T14:45:00+00:00","article_modified_time":"2023-07-12T18:32:31+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/protocoles-dauthentification-spf-dkim-dmarc.jpg","type":"image\/jpeg"}],"author":"Sophie Lamarche","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sophie Lamarche","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#article","isPartOf":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/"},"author":{"name":"Sophie Lamarche","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/86b00483c1475c0aee1c3cf21cf7292e"},"headline":"Demystifying SPF, DKIM and DMARC authentication protocols","datePublished":"2021-03-26T14:45:00+00:00","dateModified":"2023-07-12T18:32:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/"},"wordCount":1085,"commentCount":0,"image":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/protocoles-dauthentification-spf-dkim-dmarc.jpg","articleSection":["Omni-Channel Marketing Campaign"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/","url":"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/","name":"Authentication protocols SPF, DKIM, DMARC | Dialog Insight","isPartOf":{"@id":"https:\/\/www.dialoginsight.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#primaryimage"},"image":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/protocoles-dauthentification-spf-dkim-dmarc.jpg","datePublished":"2021-03-26T14:45:00+00:00","dateModified":"2023-07-12T18:32:31+00:00","author":{"@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/86b00483c1475c0aee1c3cf21cf7292e"},"description":"Learn about the SPF, DKIM and DMARC email authentication protocols, why to use them and how to configure them with Dialog Insight.","breadcrumb":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#primaryimage","url":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/protocoles-dauthentification-spf-dkim-dmarc.jpg","contentUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/06\/protocoles-dauthentification-spf-dkim-dmarc.jpg","width":1200,"height":628,"caption":"protocoles dauthentification spf dkim dmarc"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/omni-channel-marketing\/demystifying-spf-dkim-dmarc-authentication-protocols\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dialoginsight.com\/en\/"},{"@type":"ListItem","position":2,"name":"Demystifying SPF, DKIM and DMARC authentication protocols"}]},{"@type":"WebSite","@id":"https:\/\/www.dialoginsight.com\/en\/#website","url":"https:\/\/www.dialoginsight.com\/en\/","name":"Dialog Insight","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dialoginsight.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/86b00483c1475c0aee1c3cf21cf7292e","name":"Sophie Lamarche","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c33b62b92dd96c951d01d5941062e7183d27ab8ae3a0dea67cfdeaeed7aedeed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c33b62b92dd96c951d01d5941062e7183d27ab8ae3a0dea67cfdeaeed7aedeed?s=96&d=mm&r=g","caption":"Sophie Lamarche"}}]}},"_links":{"self":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts\/1843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/comments?post=1843"}],"version-history":[{"count":0,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts\/1843\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/media\/1080"}],"wp:attachment":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/media?parent=1843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/categories?post=1843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/tags?post=1843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}