Why is DMARC failing when using 'on behalf of' sending, and how can I fix it?

Summary

The primary cause of DMARC failures when sending 'on behalf of' another domain is a lack of alignment between the 'From' domain and the domains used for SPF and DKIM authentication. While proper SPF configuration is important, experts and documentation overwhelmingly recommend implementing DKIM signing with the sending domain's private key as the most reliable solution. This allows the sending server to assert its authorization to send on behalf of the 'From' address, regardless of SPF alignment. Other suggested approaches include aligning the return-path/SMTP from with the “header from”, supporting alignment, or avoiding DMARC enforcement, but DKIM is the prevailing best practice.

Key findings

  • DMARC Alignment Issue: DMARC failures stem from the misalignment between the 'From' domain and the SPF/DKIM authentication domains during 'on behalf of' sending.
  • DKIM as Primary Solution: Implementing DKIM signing with the sending domain's private key is consistently highlighted as the most effective fix.
  • SPF Insufficiency: Relying solely on SPF is often inadequate due to limitations with forwarding and other complexities.
  • DMARC Complexity: DMARC configuration can be intricate, increasing the potential for errors if not carefully managed.

Key considerations

  • DKIM Implementation: Ensure proper DKIM signing setup with the sending domain to assert authorization.
  • SPF Record Management: Maintain accurate SPF records, while understanding that DKIM offers a more robust solution for 'on behalf of' scenarios.
  • Alignment Options: Be aware of the strict and relaxed DMARC alignment modes and their implications.
  • DMARC Policy Enforcement: Consider the impact of the DMARC policy (none, quarantine, reject) on email deliverability.
  • ESP Support: Consult your ESP to ensure they fully support DKIM and DMARC configurations.
  • Sign DKIM for Customer domain: Sign with a DKIM for the customer domain *in addition* to signing with your own DKIM signature.

What email marketers say
11Marketer opinions

When sending emails 'on behalf of' another domain, DMARC failures often occur due to alignment issues between the 'From' domain and the domains used for SPF and DKIM authentication. The consensus among experts is that implementing DKIM signing with the sending domain's private key is the most reliable solution. This allows the receiving server to verify the message's authenticity, even when the 'From' address belongs to a different domain. While ensuring proper SPF records can help, DKIM provides a more robust and consistent approach to resolving DMARC alignment problems in 'on behalf of' scenarios. Alternative solutions include aligning the return-path/SMTP from with the “header from” so SPF aligns for DMARC to pass, supporting alignment, or avoiding DMARC enforcement

Key opinions

  • DMARC Failure Cause: DMARC failures in 'on behalf of' sending are primarily due to SPF and DKIM domains not aligning with the 'From' domain.
  • DKIM as Solution: Implementing DKIM signing with the sending domain's private key is the most reliable method to resolve DMARC failures.
  • SPF Insufficiency: Relying solely on SPF can be problematic due to forwarding and other factors, making DKIM the preferred solution.
  • DKIM and SPF both: Alternative solutions include aligning the return-path/SMTP from with the “header from” so SPF aligns for DMARC to pass

Key considerations

  • DKIM Implementation: Ensure DKIM signing is correctly implemented with the sending domain's private key to ensure proper authentication.
  • SPF Records: If using SPF, ensure that the SPF record includes all authorized sending sources to prevent authentication failures.
  • Alignment Mode: Understand the DMARC alignment modes (strict vs. relaxed) and how they affect 'on behalf of' sending.
  • DMARC Policy: Consider the implications of the DMARC policy (none, quarantine, reject) on email delivery and sender reputation.
  • ESP Support: Consult with your ESP to ensure they support DKIM signing and DMARC alignment for 'on behalf of' sending.
Marketer view

Email marketer from ExpertSender responds by recommending DKIM signing for 'on behalf of' emails to ensure authentication. This allows your domain to vouch for the email's authenticity, even when the 'From' address belongs to another domain.

January 2023 - ExpertSender
Marketer view

Email marketer from SendGrid shares that DMARC failures occur when SPF fails to authenticate the sending server for the domain in the 'From' address. Ensure SPF records include the IP addresses of servers sending on behalf of the domain, or use DKIM signing to authenticate the email.

January 2022 - SendGrid
Marketer view

Marketer from Email Geeks shares you need to either support alignment or get an article for your customer base to avoid DMARC enforcement or use your service on a subdomain level (p=reject; sp=none) or simply use your own From: address domain

June 2022 - Email Geeks
Marketer view

Email marketer from Mailjet explains that to fix DMARC failures when sending 'on behalf of', you should implement DKIM signing with your own domain. This ensures that even though the 'From' address is the original sender, the DKIM signature verifies that the message came from a legitimate source authorized to send on their behalf.

January 2022 - Mailjet
Marketer view

Email marketer from Reddit explains that for 'on behalf of' sending to pass DMARC, your ESP needs to implement either DKIM signing on your domain or Sender ID. DKIM is the more reliable method, as SPF can be tricky with forwarders.

June 2023 - Reddit
Marketer view

Email marketer from Postmark responds by recommending using DKIM signing with the sending domain's private key. This allows the receiving server to verify that the message was authorized by the sending domain, even if the 'From' address is different, resolving DMARC alignment issues.

July 2022 - Postmark
Marketer view

Email marketer from MailerCheck mentions that DMARC failures when using 'on behalf of' sending typically occur because the SPF record doesn't include the IP address of the sending server, or the DKIM signature doesn't align with the 'From' domain. Setting up DKIM properly can resolve this issue.

March 2025 - MailerCheck
Marketer view

Email marketer from Email Marketing Forum responds that DMARC failures in 'on behalf of' scenarios typically stem from a mismatch between the 'From' domain and the SPF/DKIM domains. The best solution is to ensure DKIM alignment by signing emails with your own domain's DKIM key.

November 2023 - Email Marketing Forum
Marketer view

Email marketer from SparkPost shares that a typical reason for DMARC failure is SPF not authenticating correctly when an email is sent “on behalf of” another domain. To resolve, make sure you have proper SPF records or use DKIM.

July 2023 - SparkPost
Marketer view

Marketer from Email Geeks explains that DMARC fails when SPF and DKIM don't align, either sign with a DKIM for the customer domain or align the return-path/SMTP from with the “header from” so SPF aligns for DMARC to pass. Just adding SPF for the return-path/SMTP from and the mail-from is not enough. The best course of action is to sign DKIM with the customer domain *in addition* to signing with your own DKIM signature (then your SPF setup doesn’t matter, as DKIM will align. And for DMARC to pass it only requires one (SPF or DKIM) to align)

May 2021 - Email Geeks
Marketer view

Email marketer from Stack Overflow shares the main issue is DMARC alignment. Either the SPF domain needs to match the From: domain (which it won't in 'on behalf of' sending) or the DKIM signature domain needs to match. Implement DKIM signing correctly.

April 2023 - Stack Overflow

What the experts say
3Expert opinions

Experts agree that DMARC failures when sending 'on behalf of' another domain primarily stem from alignment issues between the 'From' domain and the authenticating domains used in SPF and DKIM. The most recommended solution is to implement DKIM signing with your own domain's signing key. This creates a verifiable link between your domain and the email, bypassing the need for the 'From' domain to match the SPF record. While proper SPF records are important, DKIM is generally considered more reliable for 'on behalf of' scenarios.

Key opinions

  • Alignment is Key: DMARC failures result from a lack of alignment between the 'From' domain and the domains used for SPF and/or DKIM.
  • DKIM is Preferred: Implementing DKIM signing with your own domain is the most effective way to resolve DMARC issues when sending 'on behalf of'.
  • Complexity of DMARC: DMARC can be complex and easy to get wrong, requiring careful configuration and monitoring.

Key considerations

  • DKIM Implementation: Ensure DKIM signing is correctly implemented to assert authorization for sending on behalf of the 'From:' address.
  • SPF Records: Maintain accurate SPF records, but recognize that DKIM is the more robust solution.
  • DMARC Complexity: Understand the complexities of DMARC configuration to avoid misconfigurations that lead to deliverability issues.
Expert view

Expert from Word to the Wise shares that one of the main reasons for DMARC failure is a lack of proper alignment between the From: domain and either the SPF or DKIM domain. When sending on behalf of, the best approach is to implement DKIM signing with your own domain to assert that you are authorized to send on behalf of the 'From:' address.

November 2022 - Word to the Wise
Expert view

Expert from Email Geeks explains that it’s easy to get DMARC wrong because it can be so complex. An example of this issue is when there is no DKIM on from domain and SPF doesn’t align, so DMARC failed.

December 2022 - Email Geeks
Expert view

Expert from Spam Resource explains that when sending 'on behalf of', DMARC failures often occur due to SPF failing to authenticate the sending source. To fix this, ensure your SPF record includes all authorized sending sources. However, the preferred method is to implement DKIM with your own domain's signing key, which provides a verifiable link between your domain and the message content, regardless of the 'From' address.

April 2022 - Spam Resource

What the documentation says
5Technical articles

Documentation consistently points to alignment issues between the 'From' header and the SPF/DKIM domains as the primary reason for DMARC failures when sending 'on behalf of' another domain. DMARC relies on this alignment for authentication. Configuration of both SPF and DKIM is crucial, ensuring the sending domain is authorized and signatures use the correct domain. Even with relaxed alignment modes, complete domain differences can still lead to failure. Correct DKIM setup, allowing the sending domain to vouch for the message, is the recommended approach.

Key findings

  • Alignment Requirement: DMARC requires alignment between the 'From' domain and the authenticating SPF/DKIM domains.
  • SPF/DKIM Importance: Proper SPF and DKIM configuration is critical for DMARC to pass, especially when sending 'on behalf of'.
  • Alignment Modes: DMARC offers strict and relaxed alignment modes, but 'on behalf of' sending may still fail depending on the domain differences.

Key considerations

  • Domain Authorization: Ensure the sending domain is authorized via SPF, and DKIM signatures use your domain (not the original sender's).
  • DKIM Setup: Correctly set up DKIM signatures so your domain can vouch for the message, resolving alignment issues.
  • RFC Specifications: Refer to RFC 7489 for detailed DMARC specifications and guidelines.
Technical article

Documentation from RFC Editor describes that DMARC policies are designed to handle cases where email is sent 'on behalf of' a domain. It specifies that either SPF or DKIM must align with the domain in the 'From' header for the message to pass DMARC authentication.

December 2024 - RFC Editor
Technical article

Documentation from AuthSMTP details that 'on behalf of' sending causes DMARC issues because the From address domain doesn't align with the authenticating domain. They advise setting up DKIM signatures correctly so your domain vouches for the message.

February 2023 - AuthSMTP
Technical article

Documentation from Microsoft Learn emphasizes that proper SPF and DKIM configuration are crucial for DMARC to pass. When using 'on behalf of', ensure that your sending domain is authorized via SPF and that DKIM signatures use your domain, not the original sender's.

May 2021 - Microsoft Learn
Technical article

Documentation from Google Workspace Admin Help explains that DMARC relies on alignment between the domain in the 'From' header and the domain used for SPF and DKIM checks. When sending 'on behalf of,' the SPF or DKIM domain may not match the 'From' domain, causing a DMARC failure.

September 2022 - Google Workspace Admin Help
Technical article

Documentation from DMARC.org details that DMARC has two alignment modes: strict and relaxed. 'On behalf of' sending often fails strict alignment. Relaxed alignment allows subdomain matches, but 'on behalf of' scenarios may still fail if the domains are completely different.

June 2022 - DMARC.org