When utilizing multiple email service providers (ESPs) like HubSpot, SendGrid, and ActiveCampaign for the same sending domain, it is essential to configure a distinct DKIM record for each ESP. Each service will provide its own unique DKIM keys that need to be published in your domain's DNS records. This ensures that every email sent, regardless of its origin ESP, is properly authenticated, improving deliverability and protecting your sender reputation. For a broader understanding of how to manage multiple senders, review our guide on using the same sending domain with multiple ESPs.
Key findings
Separate DKIM records: Each distinct ESP you use to send emails from your domain typically requires its own unique DKIM record to ensure proper signing and authentication.
Authentication alignment: For DMARC alignment to succeed, both SPF and DKIM must pass, and their domains must align with the 'From' header domain. This often means each ESP must sign emails with a DKIM record specific to it, or you must configure your own custom DKIM for each.
Deliverability impact: A missing or misconfigured DKIM record for any sending source can lead to emails failing authentication checks, resulting in messages being sent to spam or rejected. This is critical for 1:1 emails sent via platforms like Google Workspace if not properly configured.
DNS records: Each ESP will provide CNAME or TXT records for DKIM that must be added to your domain's DNS. These records contain the public keys mail servers use to verify the email's authenticity.
Google Workspace DKIM: Ensure your Google Workspace account has a properly configured DKIM record, especially for 1:1 emails, as it's not always enabled by default if you don't use Google Domains. Learn how to properly set up SPF and DKIM.
Monitoring DMARC reports: Regularly review your DMARC reports to identify any authentication failures and determine which sending sources are causing issues due to misconfigured or missing DKIM. This helps maintain good email deliverability.
Return path: Be aware that some ESP features, like custom return paths, might be restricted to higher-tier plans, which can influence how you manage authentication for different services.
Email marketers frequently encounter challenges with email authentication when using multiple ESPs. A common issue arises when transactional or 1:1 emails sent via a platform like Google Workspace fail to deliver, while marketing emails from a dedicated ESP like ActiveCampaign, HubSpot, or SendGrid using the same domain deliver without problems. This disparity often points to a lack of proper DKIM configuration for the non-marketing sending source. Understanding how SPF, DKIM, and DMARC affect deliverability is crucial.
Key opinions
Discrepancy in deliverability: Marketers note that 1:1 emails from Google Workspace might go to spam, while marketing emails from dedicated ESPs using the same domain deliver fine, highlighting an authentication gap.
Missing DKIM for 1:1 emails: A common observation is the absence of a DKIM record specifically for the domain when sending through Google Workspace for personal or transactional emails.
Need for alignment: Marketers question if SPF, DKIM, and DMARC must align based on the email's origin, which is a key aspect of preventing spoofing and ensuring trust.
Multiple DKIM records: There's a strong consensus that using multiple ESPs (e.g., HubSpot, SendGrid, ActiveCampaign) requires a unique DKIM record for each to ensure proper authentication across all platforms.
Key considerations
Verifying each sender: Ensure every service sending on your behalf, including your primary email provider like Google Workspace, has DKIM properly set up.
Holistic authentication strategy: Implement a strategy that covers all email sending points, not just marketing. This includes 1:1 emails, transactional emails, and any other automated sends. Read our guide on email authentication for multiple ESPs.
DMARC policy adjustment: If issues arise, temporarily adjusting your DMARC policy from 'quarantine' to 'none' can help diagnose authentication problems without blocking emails.
Marketer view
Marketer from Email Geeks notes that they are working with a company using ActiveCampaign as their ESP. They have SPF, DKIM, and DMARC set up, but 1:1 emails from Google Workspace are not delivering or are going to spam, despite emails from ActiveCampaign for the same domain having no problems.
06 Dec 2023 - Email Geeks
Marketer view
Marketer from Email Geeks describes finding out that their client's domain lacked a DKIM record from their Google Workspace account. This discovery was made after troubleshooting why 1:1 emails were failing to deliver properly.
06 Dec 2023 - Email Geeks
What the experts say
Experts in email deliverability consistently confirm that each distinct email service provider (ESP) sending on behalf of a domain generally requires its own DKIM configuration. If a domain uses multiple ESPs, such as HubSpot, SendGrid, and ActiveCampaign, each will provide unique DKIM keys that need to be published as CNAME or TXT records in the domain's DNS. Failure to set up DKIM for every sending source can lead to authentication failures, impacting inbox placement and DMARC alignment. This is particularly crucial for services like Google Workspace, which may not automatically provide DKIM signing for 1:1 emails unless explicitly configured. Proper setup is key for setting up DMARC with multiple email senders.
Key opinions
Individual DKIM configuration: Experts affirm that each email sent requires a DKIM signature, meaning if an ESP (like Google Workspace) isn't configured for DKIM signing, its emails will be unsigned, which can cause deliverability issues.
Common client issues: Many clients experience deliverability problems stemming from a lack of proper DKIM setup for their Google Workspace accounts, emphasizing a common oversight.
Confirmatory need: It is confirmed that if you use multiple ESPs (e.g., HubSpot, SendGrid, ActiveCampaign), you will indeed need a separate DKIM record for each to ensure authentication alignment.
ESP-specific DKIM nuances: Specific ESPs, such as ActiveCampaign, may update their DKIM requirements, potentially moving to multiple CNAME records instead of a single one, highlighting the dynamic nature of these configurations.
Key considerations
Proactive DKIM setup: While Google Workspace might default to signing with Google's domains, direct DKIM setup for your own domain is crucial, especially if you're not using Google Domains for your DNS. Learn how to set up DKIM on G Suite.
Verifying DNS records: Always verify that the correct DKIM records provided by each ESP are accurately published in your domain's DNS. This is a common point of error. Find more information on setting up HubSpot domains, SPF, and DKIM.
Feature limitations: Some advanced features, like custom return paths, might be limited to specific tiers of ESP services, which could influence your technical setup and deliverability strategy.
Deliverability impact: The absence or misconfiguration of DKIM can significantly impair email deliverability, leading to legitimate emails being marked as spam or blocked by recipient mail servers.
Expert view
Expert from Email Geeks states that DKIM mandates that every mail sent must be signed. If a service like Google Workspace is not configured to sign emails with DKIM, then any mail sent from it will not be signed, which can lead to deliverability issues.
06 Dec 2023 - Email Geeks
Expert view
Expert from Email Geeks confirms the necessity of individual DKIM records for each ESP (like HubSpot, SendGrid, and ActiveCampaign) for authentication to align properly, validating a common question among senders.
06 Dec 2023 - Email Geeks
What the documentation says
Official documentation and technical specifications for email authentication (RFCs) consistently emphasize the need for unique DKIM records for each mail sender when using a single domain. DKIM (DomainKeys Identified Mail) is a method for email senders to digitally sign outgoing email, allowing recipients to verify that the email was sent by an authorized sender and that the content has not been tampered with. When multiple ESPs (e.g., HubSpot, SendGrid, ActiveCampaign) send email on behalf of your domain, each one acts as a distinct signing entity. Therefore, each ESP must be configured with its own DKIM public key, published as a CNAME or TXT record in your DNS, using a unique selector. This setup is crucial for ensuring proper DMARC alignment, which relies on both SPF and DKIM authentication to pass. A simple guide to DMARC, SPF, and DKIM can clarify these concepts.
Key findings
Distinct signing entities: Each ESP sending on behalf of your domain is considered a separate signing entity, necessitating its own DKIM configuration.
Public key publishing: For each ESP, a unique DKIM public key must be published in your domain's DNS, typically as a CNAME or TXT record, to allow for signature verification.
Unique selectors: To accommodate multiple DKIM records for the same domain, each record is identified by a unique selector, allowing distinct keys for different senders. Learn about DKIM selector name examples.
DMARC alignment: Proper DKIM configuration for all sending sources is vital for achieving DMARC alignment, which strengthens your email's authenticity and deliverability.
Key considerations
Adherence to specifications: Follow the precise instructions provided by each ESP, as their DKIM setup processes can differ in terms of record types and values.
DNS management: Ensure your DNS provider supports the necessary record types (CNAME, TXT) and allows for the publication of multiple DKIM records under different selectors for the same domain.
Comprehensive authentication: Beyond DKIM, ensure SPF records are also correctly configured for all sending sources to support DMARC alignment and improve overall email authentication. More on mastering email authentication and deliverability.
Regular validation: Periodically validate your DKIM records to ensure they are correctly published and active, as DNS changes or ESP updates can sometimes invalidate existing records.
Technical article
Documentation from DmarcDkim.com outlines that DMARC, DKIM, and SPF records are foundational for authenticating an email domain. They must be accurately configured and integrated with the DNS provider to ensure legitimate emails reach the inbox.
18 Jan 2024 - DmarcDkim.com
Technical article
Documentation from Sponge.io details the specific steps for setting up domains, SPF, and DKIM within the HubSpot platform. This guidance emphasizes the platform-specific nature of authentication setup for optimal email performance.