Suped

Why your Auth0 emails are going to spam (and how to fix it)

Michael Ko profile picture

Michael Ko

31 Jul 2025

An illustration of an email envelope being marked as spam.

Getting started with auth0.com logoAuth0 for authentication is often a smooth process. That is, until you hit a common and frustrating snag: your users start reporting that verification codes, password reset links, and magic links are all landing in their spam folders. This is a problem that can grind your user onboarding to a halt and leave a terrible first impression.

This is more than a minor inconvenience; it's a critical failure in the user experience. When essential transactional emails are flagged as spam, it erodes trust in your application before a user has even logged in for the first time. I've seen this issue countless times, and thankfully, the fix is straightforward once you understand the root cause.

The problem with the default setup

When you first start with auth0.com logoAuth0, your emails are sent through their built-in email provider. This is designed for testing and getting started quickly, not for production traffic. These emails often come from a shared domain like auth0user.net, which immediately signals to mailbox providers that the email isn't truly from your brand.

The core issue here is shared reputation. Auth0's default provider uses a pool of shared IP addresses for all its customers. This means if other applications on the same infrastructure are sending low-quality mail, their poor reputation can negatively impact your deliverability. It's a classic case of "guilt by association."

This setup also creates problems with email authentication. Because the emails originate from Auth0's servers, not yours, achieving proper alignment for protocols like SPF, DKIM, and especially DMARC is difficult. Many users report their OTP emails go to spam due to DMARC issues. This misalignment is a major red flag for services like google.com logoGmail and microsoft.com logoOutlook.

While less common, sometimes the issue can also be that your own domain has been flagged or is on a blacklist (or blocklist) for other reasons. However, in the vast majority of cases where emails from Auth0 applications are marked as spam, the sending infrastructure is the primary culprit.

An illustration of a shared IP address where one user's bad actions are causing problems for other users on the same server. The style of the images should be A minimalist retro illustration in the style of Malika Favre. Dominant colors are bright poppy red and deep royal blue. Vector art, high contrast. Do not put any words in the image or alphanumeric characters.

The solution: using a custom email provider

The single most effective way to solve this problem is to stop using the default provider and configure a custom email provider for your production environment. Auth0 fully supports this and, in fact, recommends it for any serious application.

Auth0 default provider

Sender reputation

Your deliverability is tied to the actions of thousands of other Auth0 customers. If one sends spam, everyone's reputation can suffer.

Authentication

Emails are sent from shared domains like auth0user.net, making DMARC alignment with your own domain impossible.

Control

No control over the sending IPs or reputation. You are entirely dependent on Auth0's infrastructure.

Custom email provider

Sender reputation

You build your own sending reputation on your own domain, isolated from others. Your success is in your hands.

Authentication

Allows for perfect alignment of SPF, DKIM, and DMARC with your domain, which is a massive trust signal for mailbox providers.

Control

Full control over your email sending. You choose the provider and manage the setup and reputation.

Using a dedicated service like Amazon SES, SendGrid, or Postmark gives you complete control over your sending domain. You'll be building your own sender reputation, isolated from the activities of others. This is the foundation of good email deliverability.

The setup process is well-documented. You’ll choose an email service provider, add and verify your domain with them, and they will provide you with the necessary DNS records to publish. This usually involves adding SPF and DKIM records to your domain's DNS settings.

Best practice: Isolate your sending

A custom email provider gives you:

  • Control over your sender reputation.
  • Proper email authentication alignment.
  • Detailed analytics on delivery and engagement.
  • Scalability as your application grows.

Once your DNS is configured, your provider will give you SMTP credentials or an API key. You then simply enter these details into the "Email Provider" section of your Auth0 dashboard. Auth0 will then route all its emails through your configured provider, correctly signed and authenticated from your domain.

A crash course in email authentication

To ensure your emails are trusted, you need three key DNS records. The first is SPF (Sender Policy Framework). This record is a list of all the servers and services authorized to send email on behalf of your domain. If you're using a custom provider, you'll add their specific value, like include:sendgrid.net, to your SPF record.

Next is DKIM (DomainKeys Identified Mail). Think of this as a digital signature for your emails. Your email provider signs each outgoing email with a private key, and receiving servers use a public key, which you publish in your DNS, to verify that signature. This proves the email is authentic and hasn't been tampered with.

Example authentication records

SPF Record (TXT)

dns

v=spf1 include:mail.yourprovider.com ~all

Authorizes your custom email provider to send on your behalf.

DKIM Record (TXT/CNAME)

dns

k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC...

Provides the public key for verifying DKIM signatures.

DMARC Record (TXT)

dns

v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com;

Tells receivers your policy and where to send reports.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

Finally, there's DMARC (Domain-based Message Authentication, Reporting, and Conformance). This is a policy you publish that tells mailbox providers what to do if an email claiming to be from you fails SPF or DKIM checks. Critically, it also provides reporting so you can see who is sending mail using your domain. Always start with a p=none policy to monitor things before moving to p=quarantine or p=reject.

Implementing these three records is non-negotiable for modern email deliverability. They work together to build trust with providers like google.com logoGmail, microsoft.com logoMicrosoft, and yahoo.com logoYahoo, signaling that you are a legitimate sender and dramatically reducing the chances of your emails being flagged as suspicious.

If you're struggling with Auth0 emails going to spam, the path forward is clear. While the default email provider is convenient for initial development, it's the source of most production delivery issues. Shifting away from it is the first and most important step.

By switching to a dedicated custom email provider and correctly configuring SPF, DKIM, and DMARC, you take control of your own email reputation. This ensures your critical verification codes and password reset emails reliably reach your users' inboxes, providing a seamless and trustworthy experience right from the start.

Frequently asked questions

Can I fix Auth0 spam issues without a custom email provider?

It's highly unlikely for a production application. The core problem is the shared sending infrastructure and lack of proper authentication alignment, which can only be solved by using your own sending service.

I've set up a custom provider, but emails are still going to spam. Why?

It can take time to warm up a new sending domain or IP. Ensure your SPF, DKIM, and DMARC records are all valid and passing. Start with low volume and gradually increase as you build a positive reputation.

What DMARC policy is safest to start with?

Always begin with p=none. This "monitoring-only" policy allows you to receive reports and verify that your legitimate emails are authenticating correctly without risking them being blocked. Once you're confident, you can move to p=quarantine and eventually p=reject.

Are custom email providers expensive?

Not necessarily. Many leading providers like Amazon SES, Mailgun, and SendGrid offer generous free tiers that are more than sufficient for applications that are just starting out, often allowing thousands of emails per month at no cost.

Start improving your email deliverability today

Get started