
Your subscribers see dozens of emails every morning. Most show a generic initial or a grey silhouette next to the sender name. A few display a crisp, recognizable brand logo — the company's actual mark, verified and rendered by the mailbox provider itself. Those logos are not decorative. They are the result of BIMI, a DNS-based standard that ties your authenticated email identity to a published brand image, giving recipients an immediate visual trust signal before they even read the subject line.
BIMI — Brand Indicators for Message Identification — has moved from experimental curiosity to operational priority. Gmail, Apple Mail, Yahoo, and Fastmail all support it. In 2026, with inbox competition intensifying and mailbox providers tightening authentication enforcement, BIMI sits at the intersection of brand visibility and deliverability infrastructure. But implementing it correctly requires more than uploading a logo. It demands DMARC enforcement, a specific image format, and in most cases a Verified Mark Certificate. Getting any of these wrong means your logo simply does not appear.
BIMI operates through a chain of verification that connects your sending domain's authentication posture to a published brand image.
p=quarantine or p=reject — p=none disqualifies you entirely.d= domain in your DKIM signature or the envelope sender in SPF aligns with your From: header domain.default._bimi.<your-domain>. This TXT record contains two fields: l= (the URL of your logo in SVG Tiny PS format) and optionally a= (the URL of your Verified Mark Certificate).If any step fails — DMARC not enforced, alignment broken, SVG in the wrong format, VMC expired — the logo does not display. There is no fallback. The recipient sees the default avatar.
A BIMI record is a TXT record published at default._bimi.example.com with this structure:
v=BIMI1; l=https://example.com/logo.svg; a=https://example.com/cert.pem
v=BIMI1 — Version identifier (required).l= — HTTPS URL pointing to your logo file in SVG Tiny PS format (required). Must be served over HTTPS with a valid certificate.a= — HTTPS URL pointing to your PEM-encoded Verified Mark Certificate (required by Gmail; optional for some other providers). Set to a=self if you are not using a VMC, though this limits which providers will display your logo.BIMI is not an alternative to email authentication — it is a layer that sits on top of it. If your authentication foundation has gaps, BIMI will not work regardless of how perfect your logo is.
Your DMARC policy must be p=quarantine or p=reject. This is the single most common blocker for organizations attempting BIMI. Many domains still operate at p=none, which only monitors authentication failures without taking action. Moving to enforcement requires confidence that all legitimate sending sources are properly authenticated — otherwise you risk quarantining or rejecting your own mail.
Before changing your DMARC policy:
d= alignment to your From: domain.rua) for at least two to four weeks at p=none before stepping up to p=quarantine, then to p=reject.BIMI requires that DMARC passes with alignment, meaning either:
Return-Path domain matches the From: header domain (or is a subdomain of it, under relaxed alignment).d= domain in the DKIM signature matches the From: header domain.In practice, DKIM alignment is more reliable because SPF breaks when email is forwarded. Most BIMI implementations rely on DKIM as the primary alignment mechanism.
Organizations with multiple sending services frequently hit SPF's 10 DNS lookup limit. Each include: mechanism in your SPF record counts as a lookup, and exceeding the limit causes SPF to return permerror, which fails DMARC. Before implementing BIMI, audit your SPF record with a lookup counter. If you are at or near the limit, consolidate includes, use IP addresses directly for stable services, or split sending across subdomains with dedicated SPF records.
BIMI logos must conform to a specific format. This is where a surprising number of implementations fail — the logo looks fine in a browser but is rejected by mailbox providers because it does not meet the SVG Tiny PS specification.
<text> elements are rejected.<script>, <foreignObject>, or external xlink:href elements remain.A Verified Mark Certificate is a digital certificate issued by a recognized Certificate Authority that binds your trademarked logo to your domain. Gmail requires a VMC for BIMI logo display. Apple Mail, Yahoo, and Fastmail currently display BIMI logos without requiring a VMC for all senders, though this may change.
a= field of your BIMI DNS record.VMCs are not free. Annual costs range from approximately $1,000 to $1,500 depending on the CA and the number of logos covered. Certificates are valid for one year and must be renewed before expiration — an expired VMC immediately stops your logo from displaying on Gmail.
Industry analysis in 2026 suggests that roughly half of domains with BIMI DNS records have configuration errors that prevent logo display. These are the most frequent failures.
The most common mistake. Teams publish the BIMI DNS record and upload their logo but never move their DMARC policy to enforcement. The BIMI record is ignored entirely because the prerequisite is not met.
Standard SVGs exported from design tools fail the Tiny PS specification. Embedded fonts, linked images, JavaScript handlers, and non-square dimensions are all disqualifying. Always validate with a BIMI-specific SVG checker, not just a generic SVG validator.
The logo in your VMC must visually match the logo hosted at your BIMI URL. If you update your brand logo, you need a new VMC — you cannot simply swap the SVG file and keep the old certificate.
Organizations that send from multiple subdomains (marketing.example.com, alerts.example.com) need BIMI records for each subdomain, or a single record on the organizational domain with DMARC alignment configured appropriately. A BIMI record on example.com does not automatically apply to marketing.example.com.
The logo URL returns a 404, the TLS certificate expired, or the server blocks automated fetches. Mailbox providers will not retry failed fetches — your logo simply does not display until the hosting issue is resolved.
| Metric | What to Check | Tool |
|---|---|---|
| DMARC policy level | Must be quarantine or reject |
DNS lookup or DMARC monitoring service |
| DMARC aggregate report pass rate | > 99% alignment before enforcing | DMARC report analyzer |
| SPF lookup count | Must be ≤ 10 | SPF record checker |
| BIMI SVG validation | Must pass Tiny PS spec | BIMI SVG validator |
| VMC expiration date | Must be current | Certificate monitoring |
| Logo URL availability | HTTPS 200 response, < 32 KB | Uptime monitoring |
p=quarantine or p=reject with > 99% pass rated= alignment to From: domaindefault._bimi.<domain>BIMI adoption has accelerated significantly. Gmail's requirement for VMCs created an initial barrier, but as more organizations achieved DMARC enforcement — driven by the 2024 bulk sender requirements — the prerequisite gap has narrowed. Several developments are shaping the current landscape.
Broader provider support. Beyond Gmail, Apple Mail, Yahoo, and Fastmail, additional mailbox providers are evaluating BIMI support. Each provider implements rendering slightly differently — logo size, shape (circle crop vs. square), and placement vary — so test how your logo appears across clients.
Common Mark Certificates. The BIMI standard includes provisions for Common Mark Certificates (CMCs), which would allow logo display without a registered trademark. CMC support is still limited, but it could open BIMI to smaller organizations and startups that lack trademark registrations.
BIMI and ARC interplay. Authenticated Received Chain (ARC) helps preserve authentication results when email is forwarded through mailing lists or forwarding services. As ARC adoption grows, BIMI logos are more likely to survive forwarding scenarios that would previously have broken DMARC alignment and suppressed the logo.
Engagement impact. While controlled studies are limited, early adopters consistently report that BIMI-enabled messages see measurably higher open rates compared to identical messages without logo display. The visual differentiation in a crowded inbox appears to function as a trust accelerator, particularly for transactional and time-sensitive messages where recipients need to quickly identify the sender.
BIMI connects your email authentication infrastructure to a visible brand signal in the recipient's inbox. The implementation path is straightforward but unforgiving: DMARC must be at enforcement, DKIM alignment must be clean, the logo must meet SVG Tiny PS specifications exactly, and Gmail requires a Verified Mark Certificate backed by a registered trademark. The organizations that succeed with BIMI are those that treat it as the final layer of an authentication stack they have already built correctly — not as a standalone project. Start by confirming your DMARC policy and alignment rates, convert your logo to the correct format, obtain a VMC if targeting Gmail, publish your DNS record, and validate the entire chain with BIMI-specific testing tools before expecting logo display in production.
Start with 200 free validations. Upgrade only when you're ready.
No credit card required • Cancel anytime