{"id":198,"date":"2020-10-01T10:04:22","date_gmt":"2020-10-01T10:04:22","guid":{"rendered":"https:\/\/qa.glockapps.com\/help\/?post_type=ht_kb&#038;p=198"},"modified":"2022-10-26T19:15:26","modified_gmt":"2022-10-26T19:15:26","slug":"dkim-spf-authentication-evaluation","status":"publish","type":"ht_kb","link":"https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/","title":{"rendered":"What&#8217;s the difference between DKIM AUTH\/EVAL and SPF AUTH\/EVAL?"},"content":{"rendered":"\n<p>DKIM AUTH (<a href=\"https:\/\/glockapps.com\/blog\/what-is-dkim-dkim-checker\/\" target=\"_blank\" rel=\"noreferrer noopener\">DKIM authentication<\/a>) checks if the DKIM signature exists or not and if it is valid or not.<\/p>\n\n\n\n<p>DKIM EVAL (DKIM evaluation) checks DMARC compliance. DKIM EVAL passes when the d= tag in the DKIM signature has the domain matching the domain in the Header FROM field or a sub-domain set up on the domain in the Header FROM field.<\/p>\n\n\n\n<p>SPF AUTH (SPF authentication) checks if the SPF record exists and if it&#8217;s valid or not.<\/p>\n\n\n\n<p>SPF EVAL (SPF evaluation) checks DMARC compliance. SPF EVAL passes when the SPF domain (or Return-Path domain) matches the domain in the Header FROM field or a sub-domain set up on the domain in the Header FROM field.<\/p>\n\n\n\n<p>DMARC passes when either DKIM EVAL or SPF EVAL passes or both pass.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DKIM AUTH (DKIM authentication) checks if the DKIM signature exists or not and if it is valid or not. DKIM EVAL (DKIM evaluation) checks DMARC compliance. DKIM EVAL passes when the d= tag in the DKIM signature has the domain matching the domain in the Header FROM field or a&#8230;<\/p>\n","protected":false},"author":2,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"ht-kb-category":[3],"ht-kb-tag":[101,102,38,103,104],"class_list":["post-198","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-dmarc-analytics","ht_kb_tag-dkim-authentication","ht_kb_tag-dkim-evaluation","ht_kb_tag-dmarc","ht_kb_tag-spf-authentication","ht_kb_tag-spf-evaluation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What&#039;s the difference between DKIM AUTH\/EVAL and SPF AUTH\/EVAL?<\/title>\n<meta name=\"description\" content=\"DKIM AUTH (DKIM authentication) checks if the DKIM signature exists or not and if it is valid or not. DKIM EVAL (DKIM evaluation) checks DMARC compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What&#039;s the difference between DKIM AUTH\/EVAL and SPF AUTH\/EVAL?\" \/>\n<meta property=\"og:description\" content=\"DKIM AUTH (DKIM authentication) checks if the DKIM signature exists or not and if it is valid or not. DKIM EVAL (DKIM evaluation) checks DMARC compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/\" \/>\n<meta property=\"og:site_name\" content=\"Help - Glockapps\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-26T19:15:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/\",\"url\":\"https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/\",\"name\":\"What's the difference between DKIM AUTH\/EVAL and SPF AUTH\/EVAL?\",\"isPartOf\":{\"@id\":\"https:\/\/qa.glockapps.com\/help\/#website\"},\"datePublished\":\"2020-10-01T10:04:22+00:00\",\"dateModified\":\"2022-10-26T19:15:26+00:00\",\"description\":\"DKIM AUTH (DKIM authentication) checks if the DKIM signature exists or not and if it is valid or not. DKIM EVAL (DKIM evaluation) checks DMARC compliance.\",\"breadcrumb\":{\"@id\":\"https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/qa.glockapps.com\/help\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What&#8217;s the difference between DKIM AUTH\/EVAL and SPF AUTH\/EVAL?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/qa.glockapps.com\/help\/#website\",\"url\":\"https:\/\/qa.glockapps.com\/help\/\",\"name\":\"Help - Glockapps\",\"description\":\"superHelp\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/qa.glockapps.com\/help\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What's the difference between DKIM AUTH\/EVAL and SPF AUTH\/EVAL?","description":"DKIM AUTH (DKIM authentication) checks if the DKIM signature exists or not and if it is valid or not. DKIM EVAL (DKIM evaluation) checks DMARC compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/","og_locale":"en_US","og_type":"article","og_title":"What's the difference between DKIM AUTH\/EVAL and SPF AUTH\/EVAL?","og_description":"DKIM AUTH (DKIM authentication) checks if the DKIM signature exists or not and if it is valid or not. DKIM EVAL (DKIM evaluation) checks DMARC compliance.","og_url":"https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/","og_site_name":"Help - Glockapps","article_modified_time":"2022-10-26T19:15:26+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/","url":"https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/","name":"What's the difference between DKIM AUTH\/EVAL and SPF AUTH\/EVAL?","isPartOf":{"@id":"https:\/\/qa.glockapps.com\/help\/#website"},"datePublished":"2020-10-01T10:04:22+00:00","dateModified":"2022-10-26T19:15:26+00:00","description":"DKIM AUTH (DKIM authentication) checks if the DKIM signature exists or not and if it is valid or not. DKIM EVAL (DKIM evaluation) checks DMARC compliance.","breadcrumb":{"@id":"https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/qa.glockapps.com\/help\/art\/dkim-spf-authentication-evaluation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/qa.glockapps.com\/help\/"},{"@type":"ListItem","position":2,"name":"What&#8217;s the difference between DKIM AUTH\/EVAL and SPF AUTH\/EVAL?"}]},{"@type":"WebSite","@id":"https:\/\/qa.glockapps.com\/help\/#website","url":"https:\/\/qa.glockapps.com\/help\/","name":"Help - Glockapps","description":"superHelp","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/qa.glockapps.com\/help\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/qa.glockapps.com\/help\/wp-json\/wp\/v2\/ht-kb\/198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/qa.glockapps.com\/help\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/qa.glockapps.com\/help\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/qa.glockapps.com\/help\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/qa.glockapps.com\/help\/wp-json\/wp\/v2\/comments?post=198"}],"version-history":[{"count":2,"href":"https:\/\/qa.glockapps.com\/help\/wp-json\/wp\/v2\/ht-kb\/198\/revisions"}],"predecessor-version":[{"id":749,"href":"https:\/\/qa.glockapps.com\/help\/wp-json\/wp\/v2\/ht-kb\/198\/revisions\/749"}],"wp:attachment":[{"href":"https:\/\/qa.glockapps.com\/help\/wp-json\/wp\/v2\/media?parent=198"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/qa.glockapps.com\/help\/wp-json\/wp\/v2\/ht-kb-category?post=198"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/qa.glockapps.com\/help\/wp-json\/wp\/v2\/ht-kb-tag?post=198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}