Email authentication is a set of technologies that verify whether an email actually comes from who it claims to be from. Without it, anyone can send an email pretending to be your bank, your boss, or your brand — and there’s nothing built into email to stop them.

📧 Email Was Built Without Security

SMTP (Simple Mail Transfer Protocol), the standard for sending email since 1982, has no built-in way to verify the sender. When you receive an email “from” your-bank@example.com, the receiving server has no native mechanism to confirm it was actually sent by example.com.

Think of it like postal mail — anyone can write any return address on an envelope. Email works the same way. The “From” address is just text that the sender fills in.

The Three Pillars of Email Authentication

To solve this problem, three complementary protocols were developed. Each addresses a different aspect of verification, and together they form a robust defense against email spoofing:

Email Security Foundation

SPF “Who is allowed to send email for this domain?” Checks the sending server’s IP address

DKIM “Is this email authentic and unmodified?” Cryptographic signature verified via DNS

DMARC “What to do when authentication fails + report back to me” Policy + alignment + aggregate reporting

Domain Protection

SPF (Sender Policy Framework)
A DNS record listing the IP addresses and servers authorized to send email for your domain. Like a guest list — if the sender’s IP isn’t on it, something’s wrong.
DKIM (DomainKeys Identified Mail)
A cryptographic signature added to outgoing emails. The receiving server verifies it using a public key in your DNS. Like a wax seal — proves the message is genuine and hasn’t been tampered with.
DMARC (Domain-based Message Authentication, Reporting & Conformance)
Ties SPF and DKIM together with a policy: what should receivers do with emails that fail? Monitor, quarantine, or reject. Plus sends you daily reports.

How They Work Together

Each protocol solves a different problem. SPF verifies the sending server, DKIM verifies the message integrity, and DMARC adds policy enforcement and alignment (making sure the verified domains actually match the “From” address the recipient sees).

Here’s what happens when an email arrives at the receiving server:

  1. SPF check: Is the sending server’s IP address listed in the domain’s SPF record?
  2. DKIM check: Does the email have a valid cryptographic signature that matches a public key in DNS?
  3. DMARC alignment: Do the SPF and/or DKIM results align with the domain in the visible “From” header? (This is the crucial step that prevents sophisticated spoofing.)
  4. DMARC policy: If alignment fails, apply the domain owner’s policy — none (monitor), quarantine (spam folder), or reject (bounce).

For a detailed comparison, see SPF vs DKIM vs DMARC.

Why It Matters Now

3.4B
phishing emails sent daily worldwide
$17,700
lost every minute to phishing attacks
90%
of data breaches start with a phishing email
⚠️ Google & Yahoo Requirements (2024+)
As of February 2024, Google and Yahoo require bulk senders (5,000+ messages/day) to have SPF, DKIM, and DMARC properly configured. Emails that don’t comply may be rejected or sent to spam — even if the content is legitimate.

Beyond the Big Three

Several newer standards build on the SPF/DKIM/DMARC foundation:

ARC (Authenticated Received Chain)
Preserves authentication results through email forwarding and mailing lists, where SPF and DKIM often break.
BIMI (Brand Indicators for Message Identification)
Displays your brand logo next to emails in supported inboxes. Requires DMARC at p=quarantine or stricter.
MTA-STS (Mail Transfer Agent Strict Transport Security)
Enforces TLS encryption for email in transit, preventing downgrade attacks.
TLS-RPT (TLS Reporting)
Sends reports about TLS connection failures, helping you monitor encryption issues.

Getting Started

If you’re new to email authentication, here’s the recommended path:

  1. Learn the basics: Read What is SPF?, What is DKIM?, and What is DMARC?
  2. Check your current state: Use our Domain Checker to see what’s already in place
  3. Follow the implementation guide: How to Implement DMARC walks you through step by step
  4. Generate your DMARC record: Our DMARC Record Generator builds the DNS record for you