The Proven Framework for High Deliverability: How to Authorise Your Domain for Gmail and Outlook

You have spent weeks perfecting your lead magnet, hours crafting the perfect subject line, and a small fortune on high-quality traffic. But if your technical foundations are built on sand, all that effort is essentially a donation to the "spam" folder. Most marketers are obsessed with open rates and click-through rates, yet they ignore the very gatekeepers that decide if their emails even reach the inbox.
The digital landscape has shifted. Gone are the days when you could simply "send and pray." In 2026, the major inbox providers: Gmail and Outlook: have drawn a line in the sand. If you haven't properly authorised your domain, you aren't just an amateur; you're a liability in their eyes. This isn't about "hacks" or "secrets"; it's about establishing technical trust.
By implementing a rigorous framework for email marketing, you can ensure your messages land where they belong. Here is how you can authorise your domain for Gmail and Outlook to secure your sender reputation and scale your list building efforts with confidence.
The technical trinity: SPF, DKIM, and DMARC
To the uninitiated, these acronyms look like alphabet soup. To the savvy entrepreneur, they are the passports your emails need to cross the border into the primary inbox.

Think of it this way:
- SPF (Sender Policy Framework) is your guest list. It tells the world exactly which servers are allowed to send email on your behalf.
- DKIM (DomainKeys Identified Mail) is your digital wax seal. It proves that the email hasn't been tampered with since it left your server.
- DMARC (Domain-based Message Authentication, Reporting, and Conformance) is your security guard. It tells Gmail and Outlook what to do if an email fails the first two tests.
If you are serious about growing your business, skipping these steps is no longer an option. Let’s break down the practical application for the two biggest players in the game.
Authorising for Gmail (Google Workspace)
Google has been at the forefront of the deliverability revolution. Their requirements for bulk senders have become the industry standard. Even if you aren't sending thousands of emails a day yet, following these protocols now prepares you for future growth.
Setting up your SPF record
You only get one SPF record per domain. If you have multiple, you will actually harm your deliverability. Your goal is to include Google’s authorised servers within your existing DNS settings.
In your DNS provider’s dashboard (like Cloudflare or GoDaddy), you’ll want to create or edit a TXT record for your root domain. A standard record for Google Workspace looks like this:v=spf1 include:_spf.google.com ~all
The ~all at the end is a "soft fail," which is the pragmatic starting point. It suggests to Google that while these are your authorised senders, they shouldn't immediately bin everything else while you are still configuring your systems.
Implementing DKIM
Google provides a unique DKIM key within your Admin Console. You navigate to Apps > Google Workspace > Gmail > Authenticate email, select your domain, and generate a new record.
Once you have this TXT record, you add it to your DNS. This creates a cryptographic link between your domain and your emails. It is a vital step in proving you are who you say you are. Once the DNS propagates, you must remember to go back into the Google Admin Console and click "Start Authentication."

Mastering the Outlook environment (Microsoft 365)
Microsoft’s filtering logic is notoriously picky. They often lean heavily on domain reputation and historical data. If you are sending to corporate clients or B2B leads, mastering the Outlook environment is essential.
The Microsoft 365 SPF requirement
Similar to Google, Microsoft requires its own include statement. If you use both services, your record would look like this:v=spf1 include:_spf.google.com include:spf.protection.outlook.com ~all
Notice how we combine them into one record? This is a common point where people overcomplicate things. Keep it clean, keep it singular.
DKIM for Outlook
Microsoft handles DKIM slightly differently, often using CNAME records instead of TXT records. Within the Microsoft 365 Defender portal, you can find the DKIM settings under Policies & rules.
Microsoft will generate two CNAME records for you. You must add both to your DNS. This redundancy ensures that even if Microsoft rotates their keys (which they do for security), your authentication remains unbroken.
The DMARC safety net: Moving from monitoring to enforcement
DMARC is where many marketers stop, but it’s actually where the most significant protection begins. A DMARC record tells the world: "I take my security seriously."
Start with a "none" policy. This means you are simply collecting data. You want to see who is sending email on your behalf: is it your CRM? Your invoicing software? Your help desk?
A basic record looks like this:v=DMARC1; p=none; rua=mailto:your@email.com
After a few weeks of reviewing reports (you can use tools like Postmaster Tools by Google to see your reputation), you should aim to move to p=quarantine or p=reject. This is the gold standard. It tells Gmail and Outlook that if an email claims to be from you but doesn't have your "wax seal" (DKIM) or isn't on your "guest list" (SPF), they should block it entirely.

Verifying your success: The tools of the trade
You wouldn't launch a paid ad campaign without checking the tracking pixels, so don't send an email broadcast without verifying your authorisation.
Use a service like MXToolbox to run a "SuperTool" check on your domain. It will highlight any syntax errors or missing records. Additionally, you can send a test email to a service like Mail-Tester. It provides a comprehensive breakdown of your "authenticity score."
When you see "SPF: PASS", "DKIM: PASS", and "DMARC: PASS" in your email headers, you have achieved technical alignment. You are no longer just another "expert" shouting into the void; you are a verified sender with a seat at the table.
Why technical trust is your biggest asset
In a world of increasing AI-generated spam and phishing attempts, inbox providers are desperate for signals of legitimacy. By taking the time to authorise your domain, you are providing those signals.
High deliverability isn't a one-time event; it's a byproduct of consistent, technical excellence. When your infrastructure is solid, your copywriting actually has a chance to perform. You'll find that your open rates stabilise, your sender reputation climbs, and your business grows more predictably.

You have the framework. You have the tools. Now, it's a matter of execution. Don't let your hard work be sidelined by a missing TXT record. Secure your domain, authorise your senders, and start reaching the people who actually want to hear from you.
If you're looking for more hands-on help with your marketing strategy or want to dive deeper into technical optimisations that actually move the needle, we're here to help.
Ready to scale your online business with strategies that actually work?
