Skip to main content
Intermediate 8 min read

SpamHero SPF & DKIM Configuration: The Complete Guide from AutoSPF

BS
Brad Slavin CEO
Updated April 7, 2026 | Updated for 2026

Quick Answer

At AutoSPF, we know that email authentication isn’t an optional add-on — it’s a foundational requirement for any business that wants reliable inbox delivery and protection from fraud, spoofing, and malicious impersonation. When you’re using an email security service like SpamHero, proper setup of Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) records is essential to ensure that your.

Related: Free DKIM Lookup ·Free DMARC Checker ·How to Create an SPF Record

SpamHero SPF & DKIM Configuration

Try Our Free DKIM Lookup

Auto-discover DKIM selectors for any domain — scan 185 common selectors across all major providers.

Discover DKIM Selectors →

At AutoSPF, we know that email authentication isn’t an optional add-on — it’s a foundational requirement for any business that wants reliable inbox delivery and protection from fraud, spoofing, and malicious impersonation. When you’re using an email security service like SpamHero, proper setup of Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) records is essential to ensure that your legitimate mail streams are trusted by recipient mail servers, pass modern authentication checks, and don’t get erroneously flagged as spam.

DKIM (RFC 6376) signs email messages cryptographically, and unlike SPF, the signature survives email forwarding — which is why DMARC alignment via DKIM is more reliable than SPF alignment for forwarded mail and mailing lists.

In this guide, we’re going to walk you through everything you need to know to configure SPF and DKIM for SpamHero — and why these records matter — from an AutoSPF perspective. By the end, you’ll understand both how to implement these records and why they’re essential for effective email authentication

Why Email Authentication Matters

Before we jump into step-by-step configuration, let’s make sure the “why” is clear.

Modern mail systems like Gmail, Yahoo, Outlook, and others don’t just trust that an email claims to be from your domain — they verify using authentication protocols like SPF, DKIM, and DMARC. These protocols help receiving servers determine:

  • That the sending source is actually authorized by you,

  • That the message hasn’t been tampered with in transit,

  • And that the sender’s domain isn’t being spoofed for phishing or spam attacks.

Without proper SPF and DKIM records in DNS, even legitimate messages sent through trusted platforms like SpamHero can be delayed, marked as spam, or rejected outright.

Email authentication

At its core:

  • SPF specifies which servers are allowed to send email on behalf of your domain.

  • DKIM uses cryptographic signatures to verify that the content of your message hasn’t been altered and that it was legitimately sent by your sending domain. 

The combination of these mechanisms signals to receiving mail servers and anti-spam systems that your emails are authentic — which improves inbox placement and protects your brand reputation.

SpamHero & Email Authentication: What You Need to Know

SpamHero is a powerful email security and outbound mail management platform, widely used for filtering inbound spam as well as handling outbound mail. But simply signing up for SpamHero isn’t enough — if your SPF and DKIM records aren’t configured correctly, SPF will fail and your mail can land in spam folders.

According to documentation from EasyDMARC, SpamHero currently does not support DKIM for outbound mail, which means SPF is the primary authentication protocol you can use for SpamHero and DMARC checks will rely on SPF passing successfully.

That makes setting up your SPF record correctly even more critical.

Step-by-Step: Configuring SPF for SpamHero

Let’s start with SPF, because this is the record SpamHero does rely on.

1. Access Your DNS Provider

Log into the control panel of the registrar or DNS hosting service that manages your domain’s DNS zone file. This might be services like Cloudflare, GoDaddy, AWS Route 53, or similar.

Find your DNS zone management page — this is where TXT records, A records, MX records, and SPF records are managed.

2. Create or Update the SPF TXT Record

You need a single TXT record for SPF per domain (only one is allowed — more than one will cause SPF to break). If you don’t already have an SPF record, you’ll create a new one. If you already have one, you’ll need to merge SpamHero into it (more on that below). 

Here’s the SPF value you will use for SpamHero:

v=spf1 include:spf.spamhero.com ~all

This tells the world’s mail servers that SpamHero’s mail sending infrastructure is authorized to send on behalf of your domain.

Email authentication

Steps:

  1. Click “Add TXT Record” in your DNS dashboard.
  2. In the Name/Host field, enter your domain or use “@” to represent the root domain.
  3. In the Value or TXT Data field, enter:
v=spf1 include:spf.spamhero.com ~all
  1. Save the record.

3. Merge with Existing SPF Records (If Needed)

Domains commonly already have SPF records from other email services — like Google Workspace, Microsoft 365, CRM platforms, marketing automation tools, etc.

However, DNS only allows one SPF TXT record per domain. If you already have an SPF record, you need to merge the SpamHero include into it — otherwise DNS will return a “PermError” and SPF won’t work at all. 

Example:

Old Record

v=spf1 include:_spf.google.com ~all

Merged Record

v=spf1 include:_spf.google.com include:spf.spamhero.com ~all

Make sure all your email sources are included before the final ~all (which means “soft fail anything not listed here”). A good practice is to work with tools that can validate merged SPF values; AutoSPF provides automated merging so you don’t accidentally exceed DNS lookup limits or introduce syntax errors.

4. Wait for DNS Propagation

DNS changes don’t take effect instantly. In most cases, it can take up to 72 hours for the new SPF record to fully propagate across the global DNS network.

During this time, some mail servers will immediately start checking against the new record, while others will continue using cached DNS data.

5. Validate Your SPF Record

Once the DNS changes have had time to propagate, use SPF validation tools (such as AutoSPF’s SPF analyzer) to confirm:

  • The record is syntactically correct,

  • Your domain has only one SPF record,

  • And that SpamHero is correctly included.

This helps ensure that email receivers will use the correct SPF policy for authentication checks.

Email spam

What About DKIM with SpamHero?

Now let’s talk about DKIM.

According to documentation, SpamHero does not currently support DKIM signing for outbound mail directly, which means one of two things:

  1. If SpamHero did support DKIM signing, you would generate DKIM keys and publish a public key as a DNS TXT (or CNAME) record pointing to the key.
  2. But in this case, you’ll rely largely on SPF for DMARC alignment — which is fine if SPF passes and aligns with your domain.

However, it’s still good to understand what DKIM would do if available:

  • DKIM signatures attach a cryptographic signature to the message headers,

  • Receiving mail servers retrieve the public key from DNS,

  • And they validate that the message was actually sent by your sender and hasn’t been altered in transit.

Because DKIM is widely recognized as a best practice, many ESPs and outbound mail platforms will sign on your behalf. If in future SpamHero adds DKIM support, you would:

  1. Enable DKIM signing from within the SpamHero control panel.
  2. Publish the DKIM selector and public key in your DNS (likely via a CNAME or TXT, depending on SpamHero’s instructions).
  3. Validate signatures with DKIM lookup tools.

For now, SPF remains your primary mechanism with SpamHero.

SPF, DKIM, and DMARC: How They Work Together

You may also be wondering how SPF and DKIM relate to DMARC.

DMARC stands for Domain-based Message Authentication, Reporting & Conformance and is a higher-level policy that sits on top of SPF and DKIM to tell receiving mail servers:

  • What to do if SPF or DKIM fail, and

  • Whether to send you reports on failures.

DMARC checks whether:

  • SPF passed and aligned, or

  • DKIM passed and aligned.

Alignment means that the domain in the “From” header matches the domain used for SPF or DKIM validation.

With SpamHero relying on SPF today, you’ll want to ensure your SPF record passes and aligns with your domain so your DMARC policy (if published) functions correctly.

If you haven’t published a DMARC record yet, you can do so with tools like DMARC generators, where you choose your preferred policy (none, quarantine, reject) and reporting options. 

Email phishing

How Do You Troubleshoot and Best Practices?

Even after setup, SPF issues can still occur. Here are common pitfalls and how to address them:

Multiple SPF Records

DNS allows only one SPF TXT record. If you create a second record for SpamHero instead of merging — SPF fails entirely.

Fix: Merge all sources into one and validate with an SPF checker.

Exceeding DNS Lookup Limits

SPF records that include too many services can hit the DNS lookup limit (10 maximum). AutoSPF can flatten records or optimize includes to stay within limits.

Delayed DNS Propagation

Sometimes it just takes time. If you’ve recently updated your DNS and authentication still isn’t passing, wait the full propagation window.

SPF Doesn’t “Align”

Even if SPF passes, DMARC can still fail if domains don’t align. These alignment issues are why DKIM signing (when available) helps — the signature is tied to the domain in the header.

BS
Brad Slavin

CEO

Founder and CEO of DuoCircle. Product strategy and commercial lead for AutoSPF's 2,000+ customer base.

LinkedIn Profile →

Fix your SPF record in 60 seconds

Try AutoSPF free for 30 days. No credit card required.

Start Free Trial