spf dkim dmarc email-authentication email-deliverability

SPF, DKIM, and DMARC Explained: The Authentication Trinity

A plain-English breakdown of the three email authentication standards every sender needs — plus who enforces them and what comes next.

Palaniappan P · · Updated Mar 27, 2026
SPF, DKIM, and DMARC Explained: The Authentication Trinity

SPF, DKIM, and DMARC are the three DNS-based standards that prove to receiving mail servers that your email is legitimate. Without all three configured correctly, your domain is vulnerable to spoofing and ISPs will treat your email with increased suspicion — and increasingly, reject it outright.

DMARC adoption has surged: according to the Validity 2025 Email Deliverability Benchmark Report, global DMARC implementation among active sending domains jumped significantly between 2023 and 2025, driven almost entirely by enforcement — Gmail, Yahoo, Microsoft Outlook, and La Poste now all require DMARC for bulk senders.

Authentication by the Numbers

100% SPF/DKIM pass rate you should target
64% increase in global DMARC adoption, 2023–2025
10 maximum DNS lookups allowed in an SPF record
p=reject DMARC policy for maximum protection (and BIMI eligibility)

SPF: Sender Policy Framework

SPF is a DNS record that lists every IP address and domain service authorized to send mail on your behalf.

How It Works

  1. You publish a TXT record at your domain: v=spf1 include:your-esp.com ~all
  2. When Gmail receives an email claiming to be from you, it checks if the sending IP is in your SPF record
  3. If it matches, SPF passes. If not, the ~all (softfail) or -all (hardfail) policy kicks in

Common Mistakes

  • Exceeding 10 DNS lookups: SPF limits you to 10 lookups. Tools like SPF flattening help reduce this count.
  • Missing ESPs: Added a new email tool? Update your SPF record.
  • Wrong qualifier: Start with ~all (softfail) before switching to -all (hardfail)

DKIM: DomainKeys Identified Mail

DKIM adds a digital signature to every email you send, proving the content wasn’t modified in transit.

How It Works

  1. Your email provider generates a public/private key pair
  2. The private key signs every outgoing email’s headers
  3. You publish the public key as a DNS TXT record
  4. Receiving servers verify the signature using your public key

Why It Matters

DKIM is required for DMARC alignment. Without it, your DMARC policy is based only on SPF, which is weaker and doesn’t authenticate the visible From address.

DMARC: Domain-based Message Authentication, Reporting & Conformance

DMARC is the policy layer that ties SPF and DKIM together and provides reporting.

The Three Policies

PolicyEffect
p=noneMonitor only — no action taken on failures
p=quarantineFailed messages go to spam
p=rejectFailed messages are blocked entirely

Start with Monitoring

v=DMARC1; p=none; rua=mailto:dmarc@yourdomain.com

This gives you visibility into all mail streams claiming to be from your domain before you enforce anything.

Reading DMARC Reports

DMARC reports (RUA = aggregate, RUF = forensic) are XML files that tell you:

  • Which IPs are sending mail as your domain
  • Whether SPF and DKIM are passing
  • How many messages are failing

InboxEagle parses and visualizes these reports so you don’t have to read raw XML.

Enforcement Timeline: Where This Is Mandatory

Authentication started as a best practice. It’s now a requirement enforced at the SMTP level across major providers:

ProviderEnforcement BeganWhat Happens to Non-Compliant Mail
GmailFebruary 2024 (filtering) → November 2025 (SMTP rejection)Rejected with permanent error codes — never reaches Gmail servers
Yahoo MailFebruary 2024Rejected or filtered
Microsoft Outlook / Hotmail / LiveMay 5, 2025Rejected with error 550 5.7.515
La PosteSeptember 2025Rejected

If you’re sending bulk email (5,000+ per day) to any of these providers without DMARC, your mail is being rejected — not filtered, rejected. The era of “it’s recommended but optional” ended in 2024.

What Comes After DMARC: BIMI

Once you have DMARC at p=quarantine or p=reject, you can implement BIMI to display your brand logo in Gmail, Yahoo, and Apple Mail inboxes — a visibility feature senders report correlates with up to 39% higher open rates. BIMI requires an SVG logo file and a certificate asserting logo ownership. Google’s 2025 Common Mark Certificate (CMC) removed the trademark registration requirement, making it accessible for most brands with at least one year of logo use. For the full implementation sequence and certificate options, see BIMI in 2026: Google’s CMC Makes Brand Logos Affordable.

The Correct Implementation Order

Follow the steps above in sequence — SPF first, then DKIM, then DMARC. This order protects you from accidentally blocking legitimate email during rollout.

The Bottom Line

Authentication is not optional in 2026 — it’s enforced at the SMTP level by Gmail, Yahoo, Microsoft Outlook, and La Poste. Without all three, your mail is being rejected before anyone has a chance to read it.

  • SPF first, then DKIM, then DMARC — never skip steps or implement in a different order
  • Start DMARC at p=none — monitor for 2–4 weeks before moving to p=quarantine
  • 100% authentication pass rate is the target — anything below that means some legitimate mail is failing
  • DMARC reports are your intelligence feed — set up rua= reporting and read it; it shows unauthorized senders using your domain
  • p=reject unlocks BIMI — brand logo display in Gmail and Yahoo requires DMARC enforcement

Need to build your records? Try the free DMARC Record Generator or SPF Builder — no account required. Once your records are live, DMARC Monitoring from InboxEagle continuously tracks enforcement rates and alerts you to failures in under 2 minutes.

Set this up in InboxEagle

For a complete step-by-step walkthrough in InboxEagle — including how to verify each record in the dashboard and advance your DMARC policy — see Authenticate your sending domain. To troubleshoot failures, see Fix DMARC failures.

Explore with AI

Open this content in your AI assistant for deeper analysis, or copy it as Markdown to paste anywhere.

Frequently Asked Questions

What is the difference between SPF, DKIM, and DMARC?
SPF (Sender Policy Framework) lists which IP addresses are allowed to send email for your domain. DKIM (DomainKeys Identified Mail) adds a cryptographic signature to prove email content wasn't tampered with. DMARC ties them together — it tells receiving servers what to do when SPF or DKIM fails, and sends you reports on who's sending as your domain. You need all three for full email authentication.
Do I need all three — SPF, DKIM, and DMARC?
Yes. SPF alone is weak because it doesn't authenticate the visible From address. DKIM alone doesn't tell ISPs what to do with failures. DMARC ties them together and requires at least SPF or DKIM to align with your From domain. Gmail, Yahoo, Microsoft Outlook, and La Poste all enforce DMARC for bulk senders as of 2025.
What DMARC policy should I start with?
Start with p=none, which is monitoring-only mode — it doesn't affect email delivery but generates reports showing who is sending as your domain. After 2–4 weeks of reviewing reports to confirm all legitimate mail passes, move to p=quarantine, then eventually p=reject for maximum protection.
What is SPF flattening and why does it matter?
SPF is limited to 10 DNS lookups per record. Many senders exceed this limit by including multiple sending services (your ESP, CRM, ad platforms, etc.). When the limit is exceeded, SPF fails. SPF flattening resolves the included domains to their IP addresses and writes them directly into the record, reducing lookup count.
How do I know if DMARC is working?
Add an rua= tag to your DMARC record pointing to an email address you control (e.g., rua=mailto:dmarc@yourdomain.com). ISPs will send daily aggregate reports showing SPF/DKIM pass rates, sending IPs, and policy enforcement. Tools like InboxEagle parse these reports automatically so you don't have to read raw XML.
What is BIMI and do I need it?
BIMI (Brand Indicators for Message Identification) displays your logo in Gmail, Yahoo, and Apple Mail next to your emails. It requires DMARC at p=quarantine or p=reject. Google launched a Common Mark Certificate (CMC) option in 2025 that no longer requires trademark registration — just one year of logo use. VMCs cost $1,000–$1,500/year; CMCs are more accessible for smaller senders.
Palaniappan P
Palaniappan P · Software Architect & AI Engineer

Palaniappan is a Software Architect and AI Engineer at InboxEagle with deep expertise in building email infrastructure and intelligent monitoring systems. He writes about the technical side of email — authentication protocols, ISP filtering logic, AI-driven deliverability analysis, and the engineering decisions behind reliable inbox placement at scale.

LinkedIn

Related Articles

One deliverability insight, every Friday.

Trusted by 2,000+ email senders. Free, always.

Free Download

Email Authentication Setup Checklist (SPF + DKIM + DMARC)

A step-by-step checklist to get all three authentication standards configured correctly — in the right order.

  • SPF record configuration & DNS publishing
  • DKIM key generation & selector setup
  • DMARC policy progression (none → quarantine → reject)
  • Verification commands to confirm each record

No spam. Unsubscribe any time.