Configure SPF DKIM DMARC With SALESmanago
Configure SPF DKIM DMARC With SALESmanago
Configure
SPF, DKIM, and DMARC
with SALESmanago
Contents
1. Why do you need to implement the SPF, DKIM, and DMARC protocols? 2
2. Implementing email authentication protocols for your domain 3
Step 1. Determine where you can edit your DNS settings. 3
Step 2. Find the right place in the DNS settings. 4
Step 3. Add records for the email authentication protocols. 5
Step 3.1. Adding the SPF protocol 6
Step 3.2. Adding the DKIM protocol 7
Step 3.3. Automate DKIM verification by SALESmanago by adding a dedicated
TXT record (optional) 9
Step 3.4. Adding the DMARC protocol 10
3. Quick summary 13
APPENDIX: DMARC record elements 14
1
1. Why do you need to implement the SPF, DKIM, and DMARC
protocols?
Starting from 1 February 2024, Gmail and Yahoo introduced stricter authentication
requirements for senders of mass mailings (i.e., those who have ever sent more than 5,000
emails in one day). The new requirements are designed to protect email users from spam,
phishing, and malware. This means that the three email authentication protocols that have so
far been strongly recommended—SPF, DKIM, and DMARC—are now becoming obligatory
(otherwise, these email clients may block your mailings to @gmail and @yahoo addresses).
● SPF (Sender Policy Framework): Specifies the servers and domains that are
authorized to send email on behalf of your organization.
The new requirements are likely to apply to all SALESmanago customers who:
If you don’t know how to implement these protocols, read the instructions and explanations
provided below.
2
2. Implementing email authentication protocols for your
domain
The SPF, DKIM, and DMARC protocols are usually implemented in the DNS (Domain Name
System) settings for your domain. Most likely, you will be able to implement all these
protocols from a single place, by adding four different records to your domain’s settings.
3
Step 2. Find the right place in the DNS settings.
After logging into the account that allows you to edit your DNS settings, look for the place
where you can add records for your domain. This place (section, tab, etc.) can be called, for
instance, DNS Settings, Zone Editor, DNS Management, Name Server Configuration, or DNS
Record Management.
It is possible that you will see buttons like Add TXT record and Add CNAME record; or you
may need to click a button for adding a record and then select the record type from a list. If
you can’t find the option to add a record for your domain, consult the help materials of your
service provider (eCommerce platform, domain registrar, hosting provider, or CDN provider) or
contact their customer support.
4
Step 3. Add records for the email authentication protocols.
To implement all three protocols required, you will need to add four records of the following
types:
SPF TXT
DMARC TXT
You will need to configure each of these records by providing the following values:
TIPS:
● After completing the Host field, you may see that a dot (full stop) was added at its end.
Don’t try to delete it—this is a required formatting element.
● If you are in doubt which field is the Host field, look at your existing records and check
which field contains domain addresses.
Read the instructions below to find out how you should complete the
different input fields when defining the new records.
5
Step 3.1. Adding the SPF protocol
You will probably see a number of input fields that allow you to define the new record. Pay
attention to these three fields:
In this field, enter the name of your domain accompanied by the top-level domain, e.g.:
v=spf1 include:_spf.jupiter.salesmanago.pl
NOTE: If you already have an existing v=spf1 record, simply extend it by adding:
include:_spf.jupiter.salesmanago.pl
Change it to:
Note that flags, such as -all, should be placed after the newly added part.
Add the ready record by clicking Save, OK, Done, etc. You don’t need to take any additional
steps on the SALESmanago platform. You can now proceed to the configuration of DKIM.
IMPORTANT: The SPF protocol will be implemented for your domain within several hours,
but it can take up to 24 hours for the changes to become visible in your domain settings
(due to a DNS propagation delay).
6
Step 3.2. Adding the DKIM protocol
Add two CNAME records for your domain. You will probably see a number of input fields that
allow you to define the new records. Pay attention to the three fields described below.
CNAME RECORD 1:
salesmanago._domainkey.example.com
EXAMPLES:
salesmanago._domainkey.yourcompany.com
salesmanago._domainkey.yourstore.de
salesmanago._domainkey.yourecommerce.es
salesmanago._domainkey.smgrid.com
Add the ready record by clicking Save, OK, Done, etc. Next, add the second CNAME record
described below.
7
CNAME RECORD 2:
salesmanago2._domainkey.example.com
EXAMPLES:
salesmanago2._domainkey.yourcompany.com
salesmanago2._domainkey.yourstore.de
salesmanago2._domainkey.yourecommerce.es
salesmanago2._domainkey.smgrid.com
IMPORTANT: The DKIM protocol will be implemented for your domain within several hours,
but it can take up to 24 hours for the changes to become visible in your domain settings
(due to a DNS propagation delay).
8
Step 3.3. Automate DKIM verification by SALESmanago by adding a
dedicated TXT record (optional)
Following the implementation of the DKIM protocol (through the addition of the two CNAME
records described above), the ownership of your domain must be verified by SALESmanago.
The purpose of this requirement is to make your account and your emails more secure, and to
protect you against phishing.
The ownership of your domain can be confirmed automatically if you add another TXT
record for your domain. This is the recommended option because it will accelerate the
verification process, saving you time and effort.
If you want to use the automatized option, add another TXT record for your domain and fill
its fields as follows:
In this field, enter the name of your domain accompanied by the top-level domain, e.g.:
smv=clientId
replacing the fragment highlighted in green with your own Client ID.
You can find your Client ID on the SALESmanago platform, by navigating to Menu →
Integration Center → API → API v2 tab.
Add the ready record by clicking Save, OK, Done, etc. Now, the ownership of your domain will
be verified by SALESmanago automatically. At this stage, you can proceed to configuring the
DMARC protocol.
9
Step 3.4. Adding the DMARC protocol
You will probably see a number of input fields that allow you to define the new record. Pay
attention to these three fields:
_dmarc.example.com
replacing the fragment highlighted in green with your own email sending domain.
EXAMPLES:
_dmarc.yourcompany.com
_dmarc.yourstore.de
_dmarc.yourecommerce.es
10
B. Text value (Main value, Record, Value, Content, etc.):
In this field, enter your DMARC record. If you are unsure which parameters and values
you should use for your DMARC record, consider using the format recommended by
SALESmanago.
v=DMARC1; p=quarantine;
rua=mailto:[email protected];
ruf=mailto:[email protected]; adkim=r; aspf=r;
Copy this formula and paste it into the main input field of the new TXT record,
replacing the details highlighted in green with your own data:
● The rua parameter is the address at which you will receive aggregate reports on
your email traffic.
● Ruf is the address at which you will receive reports on failed authentication
checks. Note that this parameter is not supported by Gmail.
EXAMPLES:
You can also customize individual values based on the parameters (tags) and
definitions set out in the table provided in the Appendix.
11
C. TTL (Time to Live):
Add the ready record by clicking Save, OK, Done, etc. You don’t need to take any additional
steps on the SALESmanago platform.
IMPORTANT: The DMARC protocol will be implemented for your domain within several
hours, but it can take up to 24 hours for the changes to become visible in your domain
settings (due to a DNS propagation delay).
12
3. Quick summary
The table below sums up the DNS entries required by the new Gmail and Yahoo policies.
Review its contents and compare them with your new records.
Remember that the details marked in green are just placeholders and must be replaced
with your own data.
v=spf1
SPF example.com TXT include:_spf.jupiter.salesmanago. 3600
pl
salesmanago._domainke
CNAME salesmanago._domainkey.smgrid.com 3600
y.example.com
DKIM
salesmanago2._domaink salesmanago2._domainkey.smgrid.co
CNAME 3600
ey.example.com m
v=DMARC1; p=quarantine;
rua=mailto:[email protected]
DMARC _dmarc.example.com TXT om; 3600
ruf=mailto:[email protected]
om; adkim=r; aspf=r;
include:_spf.jupiter.salesmanago.pl
Note that flags, such as -all, should be placed after the newly added part. You can read more in Step 3.1.
Additionally, we encourage you to add another TXT record that will enable
SALESmanago to automatically verify the ownership of your domain. This way, you won’t
need to contact our Support after implementing DKIM. See Step 3.3 for more information.
Automatic DKIM
verification by example.com TXT smv=clientId 3600
SALESmanago
13
APPENDIX: DMARC record elements
The table below presents parameters (tags) and values for DMARC records, as described by
Google:
https://support.google.com/a/answer/10032169?sjid=14098442164638657890-EU#zippy=%2
Cdmarc-record-tag-definitions-and-values
The table describes the different elements of a DMARC record and sets out the different
configuration options you have.
If you are unsure which values you should use for your DMARC record, consider
using the recommended SALESmanago format (see Section 3.3 above).
p Instructs the receiving mail server what to do with messages that don’t pass
authentication.
BIMI note: If your domain uses BIMI, the DMARC p option must be set to
quarantine or reject. BIMI doesn't support DMARC policies with the p option set
to none.
14
pct Specifies the percent of unauthenticated messages that are subject to the
DMARC policy. When you gradually deploy DMARC, you might start with a small
percentage of your messages. As more messages from your domain pass
authentication with receiving servers, update your record with a higher
percentage, until you reach 100 percent.
Must be a whole number from 1 to 100. If you don’t use this option in the record,
your DMARC policy applies to 100% of messages sent from your domain.
BIMI note: If your domain uses BIMI, your DMARC policy must have a pct value
of 100. BIMI doesn't support DMARC policies with the pct value set to less than
100.
rua Email address to receive reports about DMARC activity for your domain.
To send DMARC reports to multiple emails, separate each email address with a
comma and add the mailto: prefix before each address. For example:
mailto:[email protected], mailto:[email protected]
This option can potentially result in a high volume of report emails. We don’t
recommend using your own email address. Instead, consider using a dedicated
mailbox, a group, or a third-party service that specializes in DMARC reports.
ruf Not supported. Gmail doesn’t support the ruf tag, which is used to send failure
reports. Failure reports are also called forensic reports.
15
sp Sets the policy for messages from subdomains of your primary domain. Use this
option if you want to use a different DMARC policy for your subdomains.
If you don’t use this option in the record, subdomains inherit the DMARC policy
set for the parent domain.
adkim Sets the alignment policy for DKIM, which defines how strictly message
information must match DKIM signatures. (...)
s—Strict alignment. The sender domain name must exactly match the
corresponding d=domainname in the DKIM mail headers.
r—Relaxed alignment (default). Allows partial matches. Any valid
subdomain of d=domain in the DKIM mail headers is accepted.
aspf Sets the alignment policy for SPF, which specifies how strictly message
information must match SPF signatures. (...)
s—Strict alignment. The message From: header must exactly match the
domain name in the SMTP MAIL FROM command
r—Relaxed alignment (default). Allows partial matches. Any valid
subdomain of domain name is accepted.
16