link

# How to trust Signicat mail servers

# Introduction

This page explains the options for how you can trust Signicat to send email messages on behalf of your domain using one or a combination of the following methods:

  • Sender Policy Framework (SPF)
  • DomainKeys Identified Mail (DKIM)
  • Domain-based Message Authentication, Reporting, and Conformance (DMARC)

You can find more information on these authentication methods on the Internet Engineering Task Force (IETF) website (opens new window).

# Sender Policy Framework (SPF)

Sender Policy Framework (SPF) records allow domain owners to publish a list of IP addresses or subnets that are authorised to send email messages on their behalf. The goal is to reduce the amount of spam and fraud by making it harder for malicious senders to disguise their identity.

An SPF TXT record is used to verify the validity of a mail server. If a mail server is on the SPF trust list, email sent from that server will have a higher (better) rating and is less likely to end up in a spam folder.

In order to trust Signicat to send email messages on behalf of testdomain.com, you can include the following TXT record in the domain's DNS:

v=spf1 a mx include:_spf.signicat.cloud

Note

Any suffixes or additional SPF mechanics (like -all or ~all) will vary from DNS to DNS.

# Email signing with DKIM

Contact us at support@signicat.com if you would like to use email signing with DomainKeys Identified Mail (DKIM). DKIM increases the trust of outgoing email even further, but needs to be implemented in your domain's DNS.

If you are sending email from someemailaddress@customerx.com as the sender, you must include two TXT records in the domain's DNS as sig-smtp01._domainkey.customerx.com and sig-smtp02._domainkey.customerx.com.

The example below shows how you could implement this in your DNS. Do not copy the example verbatim, as the exact value will be provided to you by Signicat Support.

click-to-zoom

Note

Email signing with DKIM is only available in production.

# Email signing with DMARC policy

It can be a good idea to add a Domain-based Message Authentication, Reporting, and Conformance (DMARC) policy to your DNS. This ensures that both SPF and DKIM keys are validated by the receiving mail provider.

Given that your company's name is still customerx, as in the example above for email signing with DKIM, you will need to add the following as a DNS txt record to _dmarc.customerx.com:

v=DMARC1; p=none; rua=mailto:administrator@customerx.com

The DMARC policy will apply for your entire domain, so consider starting out with p=none. When you feel confident that all of your own mail servers in addition to Signicat's mail servers are sending signed email, you can consider setting p=quarantine in your DMARC Policy.

Note

Signicat cannot recommend a specific website for validating SPF, DKIM and DMARC setups, but you will be able to find many validation tools online.

Last updated: 12/10/2022 12:16 UTC