{"id":444,"date":"2024-02-20T16:43:03","date_gmt":"2024-02-20T11:13:03","guid":{"rendered":"https:\/\/www.aalphanetsolution.com\/blog\/?p=444"},"modified":"2025-08-19T16:19:21","modified_gmt":"2025-08-19T10:49:21","slug":"understanding-dkim-and-dmarc","status":"publish","type":"post","link":"https:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/","title":{"rendered":"Understanding DKIM and DMARC !"},"content":{"rendered":"\n<p>Domain-based Message Authentication, Reporting, and Conformance (DMARC) and DomainKeys Identified Mail (DKIM) are both security protocols for email. The difference between them, in a nutshell, is that DKIM attempts to verify whether mail is legitimate, and DMARC suggests what to do with mail that isn\u2019t legitimate.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How DKIM Works<\/strong><\/h3>\n\n\n\n<p>With DKIM, administrators have two keys: a private key that the server uses to cryptographically sign all outgoing emails and a public key that recipients can use to verify that the domain\u2019s real private key signed an email. If the signature verification using the public key is successful, the recipient knows that the secret, private key that only the sender possesses must have signed the email, so the email passes DKIM. The verification also proves that the email has not been altered in transit because if it had been, the signature would not match the content.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How DMARC Works<\/strong><\/h3>\n\n\n\n<p>Unlike DKIM, DMARC is configured entirely in DNS, so no additional server-side work is necessary. DMARC involves two separate functions: reporting and enforcement.<\/p>\n\n\n\n<p>Enforcement refers to what should happen when an email fails DMARC validation. The enforcement options include \u201cnone,\u201d which just ignores the failure, \u201cquarantine,\u201d which requests that the email be marked as potentially problematic and usually results in the email being placed in the spam folder, and \u201creject,\u201d which means that the domain owner requests that the message be rejected.<\/p>\n\n\n\n<p>Reporting, the other prominent feature of DMARC, offers admins visibility into what kind of mail is being rejected because of DKIM and SPF. It\u2019s useful for intrusion detection because we can review reports for signs of spoofing attacks that have occurred. It\u2019s also helpful for debugging because we can see if we are rejecting mail that actually should be accepted.<\/p>\n\n\n\n<p>DMARC offers one additional security benefit. Let\u2019s say a man-in-the-middle attack enabled an attacker to remove the DKIM-Signature header in transit, making it look like the email didn\u2019t have DKIM implemented. If the recipient checks the sender\u2019s DMARC record and finds that a DKIM policy is\u00a0<em>supposed\u00a0<\/em>to be in place, it can assume something has gone wrong and reject or quarantine the email accordingly. Even then, the message may pass DMARC if it passes SPF, even if it fails DKIM.\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Deploy SPF<\/strong><\/h4>\n\n\n\n<p>Excessive faith in DKIM can be misguided because it\u2019s possible for a sender\u2019s DKIM private signing key to be stolen by attackers, enabling them to pass DKIM verification completely. Domain admins can mitigate this risk by implementing SPF in addition to DKIM. That way, even if DKIM keys are leaked, mail can still be restricted to authorized sending IPs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>DMARC works&nbsp;<em>with&nbsp;<\/em>DKIM as one way to prevent unauthorized use of a domain in email. DKIM provides strong cryptographic validation of message authenticity and DMARC enables visibility into possible attacks. Beyond security, DMARC also helps debug DKIM misconfigurations thanks to the increased visibility a DMARC report offers administrators into which messages are failing and why. At the end of the day, secure email requires deploying both DKIM&nbsp;<em>and&nbsp;<\/em>DMARC as well as other essential security mechanisms like SPF.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Domain-based Message Authentication, Reporting, and Conformance (DMARC) and DomainKeys Identified Mail (DKIM) are both security protocols for email. The difference [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":525,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[17],"tags":[],"class_list":["post-444","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-corporate-email"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding DKIM and DMARC ! - aalpha net solution (ANS) | Blog- Domain Names | Web Hosting | Cloud Hosting | India<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding DKIM and DMARC ! - aalpha net solution (ANS) | Blog- Domain Names | Web Hosting | Cloud Hosting | India\" \/>\n<meta property=\"og:description\" content=\"Domain-based Message Authentication, Reporting, and Conformance (DMARC) and DomainKeys Identified Mail (DKIM) are both security protocols for email. The difference [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/\" \/>\n<meta property=\"og:site_name\" content=\"aalpha net solution (ANS) | Blog- Domain Names | Web Hosting | Cloud Hosting | India\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-20T11:13:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T10:49:21+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Aalphanet Solution\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aalphanet Solution\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/\"},\"author\":{\"name\":\"Aalphanet Solution\",\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/#\/schema\/person\/0069c14b33ab5e9f8eaefa73065da613\"},\"headline\":\"Understanding DKIM and DMARC !\",\"datePublished\":\"2024-02-20T11:13:03+00:00\",\"dateModified\":\"2025-08-19T10:49:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/\"},\"wordCount\":529,\"publisher\":{\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/#organization\"},\"image\":{\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim.jpg\",\"articleSection\":[\"Corporate Email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/\",\"url\":\"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/\",\"name\":\"Understanding DKIM and DMARC ! - aalpha net solution (ANS) | Blog- Domain Names | Web Hosting | Cloud Hosting | India\",\"isPartOf\":{\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim.jpg\",\"datePublished\":\"2024-02-20T11:13:03+00:00\",\"dateModified\":\"2025-08-19T10:49:21+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/#primaryimage\",\"url\":\"https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim.jpg\",\"contentUrl\":\"https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim.jpg\",\"width\":1024,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/www.aalphanetsolution.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding DKIM and DMARC !\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/#website\",\"url\":\"http:\/\/www.aalphanetsolution.com\/blog\/\",\"name\":\"aalpha net solution (ANS) | Blog- Domain Names | Web Hosting | Cloud Hosting | India\",\"description\":\"\",\"publisher\":{\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/www.aalphanetsolution.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/#organization\",\"name\":\"aalpha net solution (ANS) | Blog- Domain Names | Web Hosting | Cloud Hosting | India\",\"url\":\"http:\/\/www.aalphanetsolution.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2020\/10\/logo.png\",\"contentUrl\":\"https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2020\/10\/logo.png\",\"width\":315,\"height\":100,\"caption\":\"aalpha net solution (ANS) | Blog- Domain Names | Web Hosting | Cloud Hosting | India\"},\"image\":{\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/#\/schema\/person\/0069c14b33ab5e9f8eaefa73065da613\",\"name\":\"Aalphanet Solution\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/www.aalphanetsolution.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4a88e8f38b88a2459c97a3b9d6a7e298f8c378c44ddb4f6e96566dd8f509e6a8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4a88e8f38b88a2459c97a3b9d6a7e298f8c378c44ddb4f6e96566dd8f509e6a8?s=96&d=mm&r=g\",\"caption\":\"Aalphanet Solution\"},\"url\":\"https:\/\/www.aalphanetsolution.com\/blog\/author\/matans\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding DKIM and DMARC ! - aalpha net solution (ANS) | Blog- Domain Names | Web Hosting | Cloud Hosting | India","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/","og_locale":"en_US","og_type":"article","og_title":"Understanding DKIM and DMARC ! - aalpha net solution (ANS) | Blog- Domain Names | Web Hosting | Cloud Hosting | India","og_description":"Domain-based Message Authentication, Reporting, and Conformance (DMARC) and DomainKeys Identified Mail (DKIM) are both security protocols for email. The difference [&hellip;]","og_url":"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/","og_site_name":"aalpha net solution (ANS) | Blog- Domain Names | Web Hosting | Cloud Hosting | India","article_published_time":"2024-02-20T11:13:03+00:00","article_modified_time":"2025-08-19T10:49:21+00:00","og_image":[{"width":1024,"height":512,"url":"http:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim.jpg","type":"image\/jpeg"}],"author":"Aalphanet Solution","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Aalphanet Solution","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/#article","isPartOf":{"@id":"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/"},"author":{"name":"Aalphanet Solution","@id":"http:\/\/www.aalphanetsolution.com\/blog\/#\/schema\/person\/0069c14b33ab5e9f8eaefa73065da613"},"headline":"Understanding DKIM and DMARC !","datePublished":"2024-02-20T11:13:03+00:00","dateModified":"2025-08-19T10:49:21+00:00","mainEntityOfPage":{"@id":"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/"},"wordCount":529,"publisher":{"@id":"http:\/\/www.aalphanetsolution.com\/blog\/#organization"},"image":{"@id":"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim.jpg","articleSection":["Corporate Email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/","url":"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/","name":"Understanding DKIM and DMARC ! - aalpha net solution (ANS) | Blog- Domain Names | Web Hosting | Cloud Hosting | India","isPartOf":{"@id":"http:\/\/www.aalphanetsolution.com\/blog\/#website"},"primaryImageOfPage":{"@id":"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/#primaryimage"},"image":{"@id":"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim.jpg","datePublished":"2024-02-20T11:13:03+00:00","dateModified":"2025-08-19T10:49:21+00:00","breadcrumb":{"@id":"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/#primaryimage","url":"https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim.jpg","contentUrl":"https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim.jpg","width":1024,"height":512},{"@type":"BreadcrumbList","@id":"http:\/\/www.aalphanetsolution.com\/blog\/understanding-dkim-and-dmarc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/www.aalphanetsolution.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Understanding DKIM and DMARC !"}]},{"@type":"WebSite","@id":"http:\/\/www.aalphanetsolution.com\/blog\/#website","url":"http:\/\/www.aalphanetsolution.com\/blog\/","name":"aalpha net solution (ANS) | Blog- Domain Names | Web Hosting | Cloud Hosting | India","description":"","publisher":{"@id":"http:\/\/www.aalphanetsolution.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.aalphanetsolution.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/www.aalphanetsolution.com\/blog\/#organization","name":"aalpha net solution (ANS) | Blog- Domain Names | Web Hosting | Cloud Hosting | India","url":"http:\/\/www.aalphanetsolution.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/www.aalphanetsolution.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2020\/10\/logo.png","contentUrl":"https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2020\/10\/logo.png","width":315,"height":100,"caption":"aalpha net solution (ANS) | Blog- Domain Names | Web Hosting | Cloud Hosting | India"},"image":{"@id":"http:\/\/www.aalphanetsolution.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"http:\/\/www.aalphanetsolution.com\/blog\/#\/schema\/person\/0069c14b33ab5e9f8eaefa73065da613","name":"Aalphanet Solution","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/www.aalphanetsolution.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4a88e8f38b88a2459c97a3b9d6a7e298f8c378c44ddb4f6e96566dd8f509e6a8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4a88e8f38b88a2459c97a3b9d6a7e298f8c378c44ddb4f6e96566dd8f509e6a8?s=96&d=mm&r=g","caption":"Aalphanet Solution"},"url":"https:\/\/www.aalphanetsolution.com\/blog\/author\/matans\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim.jpg",1024,512,false],"thumbnail":["https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim-150x150.jpg",150,150,true],"medium":["https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim-300x150.jpg",300,150,true],"medium_large":["https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim-768x384.jpg",768,384,true],"large":["https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim.jpg",1024,512,false],"1536x1536":["https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim.jpg",1024,512,false],"2048x2048":["https:\/\/www.aalphanetsolution.com\/blog\/wp-content\/uploads\/2024\/02\/dkim.jpg",1024,512,false]},"uagb_author_info":{"display_name":"Aalphanet Solution","author_link":"https:\/\/www.aalphanetsolution.com\/blog\/author\/matans\/"},"uagb_comment_info":0,"uagb_excerpt":"Domain-based Message Authentication, Reporting, and Conformance (DMARC) and DomainKeys Identified Mail (DKIM) are both security protocols for email. The difference [&hellip;]","_links":{"self":[{"href":"https:\/\/www.aalphanetsolution.com\/blog\/wp-json\/wp\/v2\/posts\/444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aalphanetsolution.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aalphanetsolution.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aalphanetsolution.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aalphanetsolution.com\/blog\/wp-json\/wp\/v2\/comments?post=444"}],"version-history":[{"count":2,"href":"https:\/\/www.aalphanetsolution.com\/blog\/wp-json\/wp\/v2\/posts\/444\/revisions"}],"predecessor-version":[{"id":526,"href":"https:\/\/www.aalphanetsolution.com\/blog\/wp-json\/wp\/v2\/posts\/444\/revisions\/526"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aalphanetsolution.com\/blog\/wp-json\/wp\/v2\/media\/525"}],"wp:attachment":[{"href":"https:\/\/www.aalphanetsolution.com\/blog\/wp-json\/wp\/v2\/media?parent=444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aalphanetsolution.com\/blog\/wp-json\/wp\/v2\/categories?post=444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aalphanetsolution.com\/blog\/wp-json\/wp\/v2\/tags?post=444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}