The Skysnag Blog

How to Set Up DKIM for Predictive Response?

October 6, 2023  |  < 1 min read
Predictive Response

DKIM works by adding a digital signature to outgoing email messages. This signature can be verified by the receiving email server, which can then determine whether or not the message has been tampered with during transit. In order for DKIM to work, the sending email server must generate a cryptographic key pair, which consists of a private key and a public key. The private key is used to sign outgoing email messages, while the public key is published in the Domain Name System (DNS). When an email message is signed with DKIM, the signature is added as a header to the message. The receiving email server can then use the public key to verify the signature and confirm that the message has not been altered.

Predictive Response clients do not need DKIM because this setup has already been established on their servers. However, if you transmit emails from your own servers, you can enable DKIM by doing the following to get your DKIM public key available for Predictive Response.

How to Get Your DKIM Public Key Available for Predictive Response

  1. Sign in as the administrator to your DNS provider’s administration console.
  2. Go to the DNS records section of each of your domains.
  3. Depending on the type of DKIM record that has been provided to you, generate a TXT or CNAME record.
  4. Copy and paste the hostname and value
  5. Save your record’s modifications and wait 48–72 hours for your DNS to take effect.

Use our free DKIM record lookup tool to validate the published DKIM record.

You can use Skysnag’s free DKIM Checker to check the health of your DKIM record here

Enable DMARC for your domains to protect against spoofing. Sign up for a free trial today!

Check your domain’s DMARC security compliance

Enforce DMARC, SPF and DKIM in days - not months

Skysnag helps busy engineers enforce DMARC, responds to any misconfigurations for SPF or DKIM which increases email deliverability, and eliminates email spoofing and identity impersonation.