Quick Answer

To authorize third-party senders under DMARC: 1) Discover all services sending as your domain using DMARC aggregate reports, 2) For each legitimate service: add their SPF include to your record AND configure custom DKIM signing if the service supports it, 3) Services that can't be authenticated: change their From: address to use the service's own domain instead of yours. Common third-party senders people forget: helpdesks (Zendesk), billing (Stripe/QuickBooks), booking tools (Calendly), form processors (Typeform), and project management tools.

DMARC and Third-Party Senders: How to Authorize Safely

By Braedon·Mailflow Authority·Email Authentication·Updated 2026-03-31

The Discovery Process

Step 1: Collect DMARC Reports

v=DMARC1; p=none; rua=mailto:[email protected]

Wait 2-4 weeks. Every server that processes your email sends daily reports.

Step 2: Parse Reports

Use dmarcian (free tier) or Postmark DMARC (free digest). Reports show:

Source IPServiceVolumeSPFDKIMDMARC
209.85.x.xGoogle Workspace500/dayPassPassPass ✓
167.89.x.xSendGrid200/dayPassPassPass ✓
198.2.x.xMailgun50/dayPassFailFail ✗
3.x.x.xCalendly5/dayFailNoneFail ✗
52.x.x.xUnknown2/dayFailFailFail ✗

Step 3: Categorize Each Sender

Authorized + Passing: Google Workspace, SendGrid — properly configured. ✓

Authorized + Failing: Mailgun (DKIM not configured), Calendly (not in SPF, no DKIM). Fix these.

Unknown + Failing: Could be spoofing (block it) or a forgotten service (investigate).

Step 4: Authorize Legitimate Services

For each legitimate service that's failing:

Option A: SPF + DKIM (best)

  1. Add service's SPF include to your record
  2. Configure custom DKIM in the service's settings
  3. Verify both pass

Option B: SPF only (if no DKIM support)

  1. Add service's SPF include to your record
  2. Ensure SPF alignment (Return-Path domain matches From:)
  3. May work for DMARC if alignment is correct

Option C: Subdomain (if SPF/DKIM not feasible)

  1. Route through a subdomain: support.yourdomain.com
  2. Configure SPF and DKIM on the subdomain
  3. Service sends from [email protected]

Option D: Change From: address (last resort)

  1. Configure the service to send from its own domain
  2. "via zendesk.com" or "[email protected]"
  3. No authentication impact on your domain

Common Third-Party Services

ServiceSPF IncludeCustom DKIM?Notes
Zendeskinclude:mail.zendesk.comYesSupport replies as your domain
Freshdeskinclude:email.freshdesk.comYesSupport replies
HubSpotinclude:spf.hubspot.comYesSales and marketing email
SalesforceMultipleYesCRM email
CalendlyVariesLimitedBooking confirmations
StripeN/ANoReceipts — usually sends from Stripe's domain
QuickBooksVariesLimitedInvoices
TypeformN/ANoForm confirmations — send from their domain
SlackN/ANoNotification emails from Slack's domain

Key insight: Not every service needs to send from YOUR domain. Stripe receipts from stripe.com are fine. Calendly confirmations from calendly.com are fine. Only authorize services that MUST send as your domain.

The Authorization Decision Tree

Is this service sending as my domain?
├── YES — Is it legitimate?
│   ├── YES — Does it support custom DKIM?
│   │   ├── YES → Add SPF include + configure DKIM ✓
│   │   └── NO → Can it send from a subdomain?
│   │       ├── YES → Route through subdomain ✓
│   │       └── NO → Change to send from service's own domain ✓
│   └── NO (spoofing) → DMARC at p=reject will block it ✓
└── NO → No action needed

Practitioner note: The most common surprise in DMARC reports: a booking tool (Calendly, Acuity) sending confirmation emails as your domain. Someone on the team connected it months ago and nobody updated SPF. At p=none: works fine. At p=quarantine: booking confirmations go to spam. At p=reject: customers never receive booking confirmations. Discover these before advancing DMARC.

Practitioner note: My rule for third-party authorization: if the service supports custom DKIM, configure it. If it doesn't, ask "does this really need to send from my domain?" Most services work fine sending from their own domain. Only CRM and helpdesk typically need to send as your domain for reply-handling purposes.

For the complete DMARC setup process, see the DMARC setup guide. For understanding the reports that reveal third-party senders, see DMARC report interpretation. For managing SPF across multiple senders without hitting limits, see SPF, DKIM, DMARC for multiple senders. If you need third-party senders identified and authorized for DMARC advancement, schedule a consultation.

Sources


v1.0 · March 2026

Frequently Asked Questions

How do I find all third-party services sending as my domain?

DMARC aggregate reports. Set up DMARC at p=none with rua= to receive reports. After 2-4 weeks, your reports show every IP that sent email claiming to be from your domain. Use dmarcian or Postmark DMARC to parse the reports and identify each sender.

What if a third-party service doesn't support custom DKIM?

If the service can't sign with your domain's DKIM: 1) Add their SPF to your record (SPF alignment may work), 2) If SPF alignment also fails: change the service to send from its own domain (e.g., 'via zendesk.com' instead of 'from yourdomain.com'), 3) Or use a subdomain: support.yourdomain.com with the service's authentication.

Which third-party services commonly break DMARC?

Helpdesks (Zendesk, Freshdesk) — send support replies as your domain. Billing (Stripe, QuickBooks) — send invoices/receipts. Booking (Calendly, Acuity) — send confirmations. Forms (Typeform, Jotform) — send form response emails. CRM (HubSpot, Salesforce) — send sales email. Project tools (Monday, Asana) — send notification emails.

Can I authorize third-party senders without adding them to SPF?

Yes, if they support custom DKIM signing with your domain. DMARC passes when EITHER SPF or DKIM aligns. DKIM-only authorization keeps your SPF record cleaner (important for the 10-lookup limit). Check if the service supports custom DKIM before adding to SPF.

What happens to unauthorized third-party senders at p=reject?

Their email is rejected entirely — it never arrives. This is why DMARC advancement requires discovering and authorizing ALL legitimate senders first. At p=none: the email delivers (reported but not blocked). At p=reject: the email is blocked.

Want this handled for you?

Free 30-minute strategy call. Walk away with a plan either way.