What is Email Authentication?

About

By default, the SMTP protocol does not have any authentication mechanism when the email is received.

There may be an authentication when you try to send but not when you receive.

Authentication mechanism

To prevent spoofing and spam, 2 authentication mechanisms have been created:

  • SPF that check if the sender sends from a known host for the domain
  • DKIM that signs the message that can be controlled with a public certificate.

Fix messages that aren't authenticated

If you get a message that your emails are not authenticated, you should:

Unauthenticated messages and spam classification

Because spammers can also authenticate emails, authentication by itself isn't enough to guarantee that your messages can be delivered, but Unauthenticated messages are very likely to be rejected or classified as spam.

How to monitor

You can monitor the authentication:





Discover More
Map Of Internet 1973
DNS - Record

A DNS record is a row in a DNS database. Example of a A record. where: api is a relative name IN is the INTERNET class (An other value is ANY) A is the A record 164.132.99.202 is the Ip address...
Email - Mille and one way to send an email (professional and user)

This article shows you Mille and one way to send an email (ie known as transport in SMTP. submission port Before continuing, you need to know the basics of email and how it works with SMTP. If you...
Email - Spoofing

Email spoofing is the creation of email messages where the sender email is not the owner of the mailbox (ie the sender email has just been forged). Because the core email protocols do not have any mechanism...
How does the email system work? SMTP, POP, IMAP explained

This page gives you the foundations of the email system. At the end, you should be able to understand why when you configure your email client, you need to set up: The SMTP configuration And the...
Dkim Record Text Format Ovh Dns Zone
How to configure DKIM with PostFix, a step by step guide

This article will show and explain you how to install DKIM with OpenDkim as a milter for Postix on CentOS
How to configure your server to send Email properly?

Configuring your domain to manage email is not an easy task, this article groups them in one place
Spam Ham Ratio
Spam (Ham)

A spam is an unsolicited mail. It's also known as: Unsolicited Bulk Email (UBE) or Unsolicited Commercial Email (UCE) The opposite of Spam is known as Ham for a legit email The ratio of ham/spam...
What is Authentication, known also as Access control, Identification, or AuthN?

Authentication is the process that establishes the identity of a user who accesses a resource of an application (page, image,...) It's abbreviated as AuthN for authentication versus AuthZ for authorization....
What is BIMI (Brand Indicators for Message Identification)? How to add a brand logo to your Emails?

With BIMI , a logo file should be displayed in the receiver inbox. When all requirements pass, the email provider will look up a TXT record where the content starts with v=BIMI1. In this record, it...



Share this page:
Follow us:
Task Runner