What is dkim selector
Last updated: April 1, 2026
Key Facts
- DKIM selectors allow a domain to maintain multiple public keys simultaneously without losing authentication
- Selectors are arbitrary text strings you define, commonly "default," "k1," "mail," or date-based identifiers like "2024"
- DNS DKIM records follow the format: selector._domainkey.yourdomain.com, with the public key as the record value
- Key rotation is achieved by creating new selectors with fresh keys while maintaining old selectors temporarily
- Email servers automatically look up the correct selector in DNS to find the matching public key for signature verification
Understanding DKIM Selectors
A DKIM selector is a text string that serves as an identifier for a specific DKIM public key within your domain's DNS records. Think of it as a label that allows you to maintain multiple DKIM keys simultaneously, each associated with a different selector. This system is crucial for managing email authentication as your systems change, keys expire, or you need to rotate credentials for security reasons. Without selectors, you could only use one DKIM key per domain, which would create inflexibility and security risks.
How Selectors Work in DNS
DKIM DNS records are published in a specific format: selector._domainkey.yourdomain.com. When an email is sent, the mail server includes the selector in the DKIM signature header. Recipients checking the signature query DNS using this selector to retrieve the corresponding public key. For example, if your selector is "mail," recipients would query mail._domainkey.yourdomain.com to find your public key. This lookup happens automatically and transparently during the verification process.
Common Selector Naming Conventions
While selectors can be any text string, common naming practices include:
- default - The most basic, simplest selector name
- k1, k2, k3 - Numbered selectors for managing multiple keys
- mail, smtp, google - Mail server-specific identifiers
- Date-based - "2024," "202404," or "20240401" for time-stamped rotation
- Service-based - "aws," "sendgrid," "mailgun" for third-party services
Key Rotation and Security
DKIM selectors enable seamless key rotation without disrupting email authentication. To rotate keys securely, you create a new selector with a fresh key pair, publish the new public key in DNS, configure your mail server to sign with the new key, and gradually phase out the old selector. This approach prevents authentication failures during the transition period, as the old selector remains queryable until all previously sent emails with the old signature have aged out of spam filters and validation systems.
Practical Implementation
When setting up DKIM, you'll generate a key pair and choose a selector name. Your mail server configuration will specify this selector when signing outgoing messages. The DKIM record published in DNS must be placed at the exact selector location you've chosen. Email providers like Google Workspace, Microsoft 365, and SendGrid provide specific selector recommendations. Testing with tools like DKIM validators confirms correct selector configuration and successful signature verification before deployment.
Related Questions
How many DKIM selectors can I have for one domain?
You can have unlimited DKIM selectors for a single domain, each with its own public key, allowing flexibility in key management and rotation strategies.
What happens if I change my DKIM selector?
Changing selectors doesn't affect previously sent emails, but new emails will be signed with the new selector's key. Old selectors should remain published temporarily for validation of older messages.
Can I use the same selector across multiple domains?
No, selectors are domain-specific. Each domain's DKIM records are published under its own domain namespace, so selectors only apply to their respective domains.
More What Is in Daily Life
Also in Daily Life
More "What Is" Questions
Trending on WhatAnswers
Browse by Topic
Browse by Question Type
Sources
- RFC 6376 - DKIM Signature SyntaxBSD
- Wikipedia - DKIM MechanismCC-BY-SA-4.0