Advanced DKIM Signing Feature

DomainKeys Identified Mail (DKIM) is the name of the industry-standard authentication process that is used for signing email. The DKIM process uses a public key/private key system to create a signature for each message. The signature is generated and applied to outbound email during the sending process.

By creating and applying an aligned DKIM signature for each of your sending domains, you can significantly improve the trust of your messages in the eyes of the mailbox providers. 

The DKIM signature  will only be applied when the DKIM signature is an exact match to the From address.

Configuring Advanced DKIM

The process of creating DKIM signature starts by creating a private and public DKIM key pair.  We have simplified this process through our DKIM Key Generator

During the process, the generator will ask you to choose a 'selector value'. This value should only be alphanumeric characters, and we recommend fewer than 10 total characters. It serves as a name that you will use to refer to the DKIM keys you are creating.

The boxes for Split Record and Escape Records below the key selector field are dependent on your hosting provider. If you are unsure and it does not populate at first with both boxes unchecked; you can try each different combination.

Once you have your private/public key pair, the next step is to create a DNS entry on your domain to publish the public key.


DKIM Signing Feature for Support page-2After creating the necessary DNS entries, add the following information into the appropriate fields under Advanced DKIM in your SocketLabs account.

  • DKIM Domain/Sending Domain
  • DKIM Selector
  • DKIM Private Key (produced during DKIM Key Generator process) 

The SocketLabs On-Demand Control Panel will not allow you to save the settings until it can verify the public key based on the domain and selector provided.

Related Information

For more information about DKIM authentication technology please see our other article: DomainKeys Identified Mail (DKIM) Authentication

For more information about SPF authentication please see our related article: Sender Policy Framework (SPF)