In my previous tutorial, I’ve shown you how to enable featured images in your WordPress RSS feed, so you can display them in your MailChimp ‘latest posts’ newsletter.

Cloudways

In this post, I’ll show you how to authenticate your domain in MailChimp if you’re using Cloudflare and G Suite.

Authenticating your domain is important because you can further prevent your newsletters from going into the spam folder.

Cloudways

What’s the point of sending newsletters if they’re going into spam, right?

It will also get rid of the default MailChimp authentication information (“via mcsv.net” or “on behalf of mcsv.net”), which can appear next to your ‘From’ name in some email clients.

Here’s an example from MailChimp on how it looks like in Gmail:

Cloudways

mailchimp default authentication

That can look weird and even suspicious to some users, and you don’t want that, do you?

So, in order to authenticate your domain in MailChimp, you’ll need to set up DKIM and SPF records on your domain’s DNS. It sounds more complicated than it is, don’t worry!

Since I am using G Suite, and I already added DKIM and SPF records from Google, I was wondering if it’s all right to add other ones from MailChimp as well.

Cloudways

So, I did some digging around and also contacted G Suite support since this is not really my area of expertise, and I found out that there’s no problem in adding additional DKIM and SPF records to your domain’s DNS.

Awesome! Now, let’s see how to do this!

Authenticate domain in MailChimp when using Cloudflare and G Suite

1. Get the DKIM and SPF records from MailChimp

Step 1 – Go to the Account section.
mailchimp account

Step 2 – Click on Verified domains from the Settings drop-down menu.

mailchimp verified domains

Step 3 – Click on the View setup instructions link.

mailchimp authenticate domain instructions link

My site is already authenticated, but it doesn’t matter; you’ll have that link there anyway.

Step 4 – Leave the tab open so you can copy the DKIM and SPF records when you’ll log in to Cloudflare.

2. Adding MailChimp’s DKIM and SPF records in Cloudflare

Step 1 – Log in to Cloudflare and access the DNS section.

cloudflare dns

Step 2 – Create a CNAME record for DKIM.

cname dkim mailchimp and cloudflare

  • Choose CNAME from the first drop-down menu;
  • In the Name field, copy the domain key from MailChimp and add it there. It looks like this: k1._domainkey.yourdomain.com. Don’t copy this one!
  • In the Domain name field, add the DKIM value, which is dkim.mcsv.net;
  • Click on the cloud icon to make it gray, otherwise, you’ll get an error and it won’t work;
  • Click the Add Record button.

Note that the .yourdomain.com part from your domain key won’t show after you add the record, but don’t worry, it’s still there. Cloudflare just hides it, it doesn’t remove it.

Step 3 – Add the SPF record next to the one from G Suite.

If you’re using G Suite, I assume that you have already set up an SPF record for it. If not, you should really do it! Here’s the guide.

Now, unlike the DKIM record, you won’t create a new SPF record. Instead, you’ll add the one from MailChimp next to the G Suite one.

So, find the G Suite SPF record and click on it.

g suite spf in cloudflare

Now, add this after the G Suite SPF record: include:servers.mcsv.net.

I recommend copying the one from your MailChimp account, not this one because it might change in the future.

mailchimp SPF in cloudflare

So, don’t add the whole SPF record from MailChimp’s instructions: v=spf1 include:servers.mcsv.net ?all.

You should only add the whole record if you don’t have any SPF records added and you have to create one from scratch.

This is a general rule, not only if you’re using G suite.

You might have noticed that MailChimp uses ?all at the end of the SPF record, but G Suite uses ~all.

You can’t add two versions, so I decided to keep the one from G Suite.

You can find out more info about ~all and ?all, as well as other qualifiers, here.

Step 4 – Go back to MailChimp – at the authentication setup instructions part (see above) – and press the Authenticate Domain button.

As it says there, it might even take 48h for the DNS changes to propagate. Usually, it takes way less.

You should be all set up now!

CNAME flattening in Cloudflare

It’s said that if you have CNAME flattening enabled in Cloudflare, the MailChimp authentication won’t work, and you’ll get an error instead of that green check mark.

I don’t know if that was fixed or I was just lucky, but it worked just fine for me.

In case it doesn’t work for you, you’ll have to disable CNAME flattening in Cloudflare.

You can find it by just scrolling down a bit from where you added the DKIM and SPF records.

cloudflare cname flattening

The bad news is that you’ll only have the disable option available if you’re using at least Cloudflare’s Pro plan. You can’t disable it on the free plan.

So, if you already own a Pro or higher plan, then disable CNAME flattening, press the Authenticate Domain button in MailChimp, then reactivate CNAME flattening.

If you’re on the free plan, you’ll have to purchase the Pro plan to perform this workaround, unfortunately.

Hopefully, it will work for you as it did for me.

That’s a wrap

Hope you found the post useful and comprehensive, and you managed to successfully authenticate your domain in MailChimp!

Don’t forget to share the post to help out others!

You can quickly subscribe to my newsletter by using this link or the subscription form.

If you have any questions or thoughts, drop a comment or send a message via contact or Facebook page.

You can also hit the follow button on Twitter and subscribe to the YouTube channel.

If you want to start your own WordPress blog, or need a website for your business, ThemeSkills’ WordPress website service is at your disposal! On-going WordPress support and maintenance are on the menu as well!