Can You Have Multiple DKIM Records? Yes, Here's How
Learn how to set up multiple DKIM records for different email services. Understand selectors, manage multiple keys, and avoid common configuration mistakes.
Last updated: 2026-01-28
A common question when setting up email authentication: Can you have multiple DKIM records for the same domain? The answer is yes—and most organizations need exactly that.
Why You Need Multiple DKIM Records
Most businesses send email through multiple services:
- Employee email: Google Workspace or Microsoft 365
- Marketing campaigns: Mailchimp, Klaviyo, or HubSpot
- Transactional email: SendGrid, Postmark, or Amazon SES
- CRM emails: Salesforce or HubSpot
- Support tickets: Zendesk or Freshdesk
Each of these services needs its own DKIM key to sign emails on your behalf. Without separate keys, you'd have to share your private key across services—a major security risk.
You can have as many DKIM records as you need. Each one uses a different selector, so they don't conflict with each other.
How Multiple DKIM Records Work
The secret is selectors. Each DKIM record has a unique selector that identifies which key to use.
When an email is signed, the selector is included in the DKIM-Signature header:
DKIM-Signature: ... s=google; d=example.com; ...
The receiving server sees s=google and looks up:
google._domainkey.example.com
Different services use different selectors, so their DNS records don't overlap.
Example: Multiple Services, Multiple Selectors
Here's what a typical multi-service setup looks like in DNS:
| Service | Selector | DNS Record |
|---------|----------|------------|
| Google Workspace | google | google._domainkey.example.com |
| Mailchimp | k1 | k1._domainkey.example.com |
| SendGrid | s1 | s1._domainkey.example.com |
| HubSpot | hs1 | hs1._domainkey.example.com |
Each record contains a different public key corresponding to that service's private key.
Setting Up Multiple DKIM Records
List your email services
Identify every service that sends email using your domain. Don't forget transactional services, marketing tools, and support platforms.
Get DKIM details from each service
Each service provides DKIM setup instructions with their specific selector and public key (or CNAME target).
Add each record to DNS
Add a separate DNS record for each service. They won't conflict because each uses a different selector.
Enable signing in each service
After DNS propagates, enable DKIM signing in each service's settings.
Verify each record
Test each selector individually to confirm all records are working.
Common Selectors by Service
Here are the default selectors used by popular services:
| Service | Selector(s) | Record Type |
|---|---|---|
| Google Workspace | google, google2 | TXT |
| Microsoft 365 | selector1, selector2 | CNAME |
| Mailchimp | k1, k2, k3 | CNAME |
| SendGrid | s1, s2 | CNAME |
| Amazon SES | Custom (3 records) | CNAME |
| Postmark | Date-based (e.g., 20240101) | TXT |
| HubSpot | hs1, hs2 | CNAME |
| Klaviyo | kl, kl2 | CNAME |
| Mailgun | smtp, mailo | TXT |
| Zoho Mail | zmail | TXT |
What About Multiple Records with the Same Selector?
You cannot have multiple DKIM records with the same selector. Each selector must be unique within your domain.
If two services somehow used the same selector (rare), you'd have a conflict. In practice, this almost never happens because each service chooses a unique selector for their keys.
Key Rotation and Multiple Records
Some services use multiple selectors for key rotation:
- Google Workspace:
googleandgoogle2 - Microsoft 365:
selector1andselector2
During rotation:
- The service generates a new key with the alternate selector
- They start signing with the new key
- The old key remains valid briefly for in-flight emails
- Eventually, all emails use the new key
You should have DNS records for both selectors so rotation works seamlessly.
Managing Multiple DKIM Records
With multiple services, DKIM management can get complex. Here's how to stay organized:
Keep a DKIM Inventory
Create a spreadsheet tracking:
- Service name
- Selector
- When it was added
- When you last verified it
- Any notes (e.g., "Marketing team manages this")
Regular Audits
Periodically check all your DKIM records:
- Are all selectors still resolving?
- Are any services no longer in use (remove their records)?
- Are any new services missing DKIM setup?
Document for Your Team
Ensure your team knows:
- Which services send email for your domain
- Who's responsible for each service's configuration
- How to verify DKIM is working
Spring cleaning
Review your DKIM records when you change email services. Remove records for services you no longer use—they're not harmful, but they add clutter.
Troubleshooting Multiple Records
"DKIM not found" for one service
Cause: That specific selector's record is missing or misconfigured.
Solution: Check DNS for that exact selector. Other services working doesn't mean all are configured.
All services except one pass DKIM
Cause: One service has an incorrect record or signing isn't enabled.
Solution:
- Verify the DNS record for that service's selector
- Check that DKIM signing is enabled in that service's settings
- Test by sending an email and checking headers
Conflicting advice about "the" DKIM record
Context: Some guides talk about "your DKIM record" as if there's only one.
Reality: Modern email setups typically have multiple DKIM records. Each guide usually refers to the record for that specific service.
Impact on DMARC
DMARC checks whether DKIM (or SPF) passes and aligns with your From domain. With multiple DKIM records:
- Only one DKIM signature needs to pass and align for DMARC to pass
- It doesn't matter which service signed the email
- All your services contribute to DMARC compliance
This is actually an advantage—if one signature fails (perhaps due to email modification in transit), another service's signature might still pass.
Monitor Your DKIM Records
Checking once is good. Monitoring continuously is better. The Email Deliverability Suite watches your SPF, DKIM, DMARC, and MX records daily and alerts you when something breaks.
Never miss a DKIM issue
Monitor your SPF, DKIM, DMARC and MX records daily. Get alerts when something breaks.
Start Monitoring