Transcription of DomainKeys Identified Mail (DKIM) Service Overview
{{id}} {{{paragraph}}}
Hansen, et [1]Network Working GroupT. HansenRequest for Comments: 5585AT&T LaboratoriesCategory: InformationalD. CrockerBrandenburg InternetWorkingP. Hallam-BakerDefault Deny Security, 2009 DomainKeys Identified Mail (DKIM) Service OverviewStatus of this MemoThis memo provides information for the Internet community. It does not specify an Internet standard of anykind. Distribution of this memo is document provides an Overview of the DomainKeys Identified Mail (DKIM) Service and describeshow it can fit into a messaging Service . It also describes how DKIM relates to other IETF message signaturetechnologies. It is intended for those who are adopting, developing, or deploying DKIM. DKIM allowsan organization to take responsibility for transmitting a message, in a way that can be verified by arecipient.
RFC 5585 DKIM Service Overview June 2009 Hansen, et al. Informational [3] 1. Introduction This document provides a description of the architecture and functionality for DomainKeys Identified
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}
Examples of good practice identified during KP3, Examples of good practice identified during KP3 inspections, Identified, Identified Websites of Medicines Regulatory . Authorities, List of global systemically important banks, INTERNATIONAL STANDARD ON AUDITING 450, INTERNATIONAL STANDARD ON AUDITING 450 EVALUATION OF MISSTATEMENTS IDENTIFIED, Energy Systems, Second Grade, Mrs., Training Manual