How to Set Up DKIM for Mailchimp

Step-by-step guide to configure DKIM authentication for Mailchimp. Learn how to authenticate your domain, add CNAME records, and verify your setup.

Last updated: 2026-01-28

Setting up DKIM for Mailchimp improves your email deliverability and helps your campaigns reach the inbox instead of spam. Mailchimp calls this "domain authentication" and makes it straightforward to configure.

Why Authenticate Your Domain in Mailchimp

Without domain authentication:

  • Your emails show "via mailchimp.com" or similar in recipient inboxes
  • Deliverability may suffer, especially for large sends
  • Your domain isn't protected from spoofing
  • You can't fully comply with Google and Yahoo's sender requirements

With DKIM authentication:

  • Emails appear to come directly from your domain
  • Better inbox placement and sender reputation
  • Protection against email spoofing
  • Compliance with bulk sender requirements

Before You Start

You'll need:

  • A Mailchimp account (any plan level)
  • Access to your domain's DNS settings
  • A verified email address on your sending domain

Mailchimp uses CNAME records for DKIM, not TXT records. This allows Mailchimp to manage key rotation automatically.

Step-by-Step Setup

1

Access domain settings in Mailchimp

Log into Mailchimp. Go to AccountSettingsDomains (or navigate to the Domains section in your account settings).

2

Add or select your domain

If you haven't added your sending domain yet, click Add & Verify Domain and follow the verification steps.

If your domain is already added, click on it to view authentication settings.

3

Start authentication

Click Start Authentication or Authenticate next to your domain.

4

Copy the DKIM records

Mailchimp will display CNAME records you need to add to your DNS. You'll typically see:

Record 1:

  • Host/Name: k1._domainkey
  • Points to: dkim.mcsv.net

Mailchimp may provide additional records (k2, k3) for redundancy.

5

Add records to your DNS

Log into your DNS provider (GoDaddy, Cloudflare, Namecheap, etc.) and add the CNAME records.

  • Type: CNAME
  • Host/Name: k1._domainkey (don't include your domain—most providers add it automatically)
  • Value/Points to: dkim.mcsv.net
6

Verify in Mailchimp

Return to Mailchimp and click Verify. If DNS has propagated, your domain will show as authenticated.

If verification fails, wait 15-30 minutes and try again.

Verify Your Setup

After authentication completes in Mailchimp, verify the DNS record is publicly accessible.

Look up: k1._domainkey.yourdomain.com

Mailchimp DKIM Record Details

Mailchimp uses standardized CNAME records:

| Selector | CNAME Target | |----------|--------------| | k1 | dkim.mcsv.net | | k2 | dkim2.mcsv.net | | k3 | dkim3.mcsv.net |

Most setups only require k1. Mailchimp will tell you if additional selectors are needed.

Why CNAME instead of TXT?

CNAME records point to Mailchimp's servers, where they manage the actual DKIM keys. This means Mailchimp can rotate keys for security without you updating DNS—it's handled automatically.

Common Issues and Solutions

"Authentication pending" for a long time

Cause: DNS hasn't propagated or the record is misconfigured.

Solutions:

  • Wait up to 48 hours (though usually much faster)
  • Verify the CNAME record exists using a DNS lookup tool
  • Check that you entered k1._domainkey not k1._domainkey.yourdomain.com (providers auto-append the domain)
  • Ensure the target is exactly dkim.mcsv.net with no typos

CNAME record shows as TXT in DNS

Cause: You may have accidentally created a TXT record instead of CNAME.

Solution: Delete the TXT record and create a proper CNAME record.

"Domain already authenticated by another account"

Cause: The domain was previously authenticated in a different Mailchimp account.

Solution: Contact Mailchimp support to release the domain from the old account, or remove the old DNS records and re-authenticate.

Authentication works but emails still show "via mailchimp"

Cause: This can happen if:

  • SPF isn't also configured
  • You're viewing the email in a client that always shows the sending server
  • DMARC alignment isn't set up

Solution: Also configure SPF and DMARC for complete authentication.

Adding Records to Common DNS Providers

GoDaddy

  1. DNS Management → Add Record → CNAME
  2. Host: k1._domainkey
  3. Points to: dkim.mcsv.net
  4. Save

Cloudflare

  1. DNS → Add record → CNAME
  2. Name: k1._domainkey
  3. Target: dkim.mcsv.net
  4. Proxy status: DNS only (gray cloud)
  5. Save

Namecheap

  1. Advanced DNS → Add New Record → CNAME
  2. Host: k1._domainkey
  3. Value: dkim.mcsv.net
  4. Save

Complete Your Email Authentication

DKIM is one part of email authentication. For best Mailchimp deliverability:

SPF: Add Mailchimp's servers to your SPF record:

include:servers.mcsv.net

Check at spfrecordcheck.com.

DMARC: Set up a DMARC policy for your domain. Check at dmarcrecordchecker.com.

Custom Return Path: Mailchimp also offers custom return-path configuration for advanced users, which further improves alignment.

Monitor Your DKIM Records

Checking once is good. Monitoring continuously is better. The Email Deliverability Suite watches your SPF, DKIM, DMARC, and MX records daily and alerts you when something breaks.

Never miss a DKIM issue

Monitor your SPF, DKIM, DMARC and MX records daily. Get alerts when something breaks.

Start Monitoring