The consensus among experts, marketers, and official documentation is that you **absolutely need** separate DKIM records for each ESP (Email Service Provider) you use, such as HubSpot, Sendgrid, and ActiveCampaign. This is crucial for ensuring proper email authentication, preventing authentication conflicts, maximizing inbox placement, and avoiding spam filters. Each sending source, including Google Workspace, transactional emails, and marketing campaigns, should have its own DKIM signature. Failure to do so can negatively impact deliverability and damage your sender reputation.
11 marketer opinions
When using multiple Email Service Providers (ESPs) like HubSpot, Sendgrid, and ActiveCampaign, it's crucial to configure a unique DKIM record for each ESP. This ensures that each service can properly authenticate emails sent on your behalf, improving deliverability and preventing emails from being marked as spam. Failing to set up separate DKIM records can lead to authentication issues and a damaged sender reputation.
Marketer view
Email marketer from MailerLite explains that you should set up DKIM records for each ESP to properly authenticate your emails. This ensures that your emails are not marked as spam and improves your overall email deliverability.
3 May 2022 - MailerLite
Marketer view
Email marketer from Mailjet explains that it is essential to configure DKIM for each ESP you use. Each provider will give you its own DKIM record to add to your DNS to ensure proper authentication.
16 Dec 2021 - Mailjet
3 expert opinions
Experts emphasize the importance of configuring DKIM for each sending service, especially when using multiple ESPs like HubSpot, Sendgrid, and ActiveCampaign. Ensuring that each service has its own DKIM record is crucial for proper authentication, preventing conflicts, and guaranteeing emails are verified by recipient servers. If a service, like Google Workspace, isn't configured to sign DKIM, it can lead to deliverability issues.
Expert view
Expert from Email Geeks explains that DKIM requires each email sent to be signed. If Google Workspace isn’t configured to sign DKIM, then the email sent from there isn’t signed. He suggests fixing it to see what happens.
13 Sep 2022 - Email Geeks
Expert view
Expert from Spam Resource shares that each sending source should have its own DKIM record. This configuration prevents authentication conflicts and ensures each ESP’s emails are properly verified by recipient servers.
23 Nov 2021 - Spam Resource
5 technical articles
Official documentation from various sources like SendGrid, Google Workspace, IETF, Microsoft, and AuthSMTP consistently states that when sending emails from multiple services or ESPs, each service should have its own DKIM key or record. This ensures proper authentication, improves deliverability, enhances email security, and prevents emails from being marked as spam.
Technical article
Documentation from SendGrid explains that if you send email from multiple services, each should have its own DKIM key. This ensures proper authentication and prevents deliverability issues.
25 Sep 2023 - SendGrid
Technical article
Documentation from Google Workspace Admin Help explains that each sending source (e.g., Google Workspace, marketing platform) should have its own DKIM signature to improve deliverability and avoid spam filters.
28 Jan 2024 - Google
Can I use the same sending domain with multiple ESPs?
Do SPF and DKIM records need to be aligned for all email service providers?
How do ActiveCampaign and other ESPs handle DMARC records during custom return-path setup, and what are the potential issues?
How do I configure DNS records to send emails from two different ESPs using the same subdomain?
How do I set up an SPF record when using multiple email sending services?
How do I set up SPF and DKIM records for new subdomains when using third-party email services?
How do SPF records and DKIM keys work with multiple email services like Klaviyo and Shopify?
How should I combine SPF records and what domain should I use with SendinBlue?