How To Set Up BIMI So Your Logo Shows In Supporting Inboxes
BIMI is a DNS-based standard that lets participating mailbox providers display your brand’s logo next to messages that pass strong authentication. To make it work, your domain needs aligned SPF and DKIM plus an enforced DMARC policy set to quarantine or reject, not monitoring-only. You’ll also need a properly formatted SVG logo hosted over HTTPS and a BIMI TXT record, often under default._bimi, that points to the logo and, for many inboxes, a Verified Mark Certificate. Most “it’s not showing” headaches come down to the logo failing provider checks or the authenticated domain not matching the visible From address.
What BIMI does for inbox logo display and trust
Which inbox providers currently support BIMI
BIMI (Brand Indicators for Message Identification) is a way to help your brand logo show up in the inbox UI (usually as the sender avatar) when your email passes strong authentication. It works by letting receiving mail systems check your domain’s DMARC status and then fetch a logo you publish specifically for BIMI. When it’s working, recipients get a consistent, recognizable logo next to your messages, which can reduce “Is this legit?” hesitation during quick inbox scans.
It’s also important to set expectations: BIMI is not a universal standard that every inbox shows today, and it does not force logo display. Even in supporting inboxes, the provider can choose when to show (or not show) your logo based on their own safety rules, reputation signals, and caching behavior.
As of early 2026, the most commonly referenced consumer inboxes that support BIMI in some form include:
- Gmail, where brands typically need a VMC or CMC for their logo to display, and VMCs can unlock a verified checkmark in some Gmail surfaces (Gmail BIMI setup).
- Yahoo Mail and AOL Mail, which support BIMI logo display for eligible authenticated senders.
- Apple Mail (iOS, iPadOS, macOS, and iCloud.com in supported versions), which supports BIMI and ties logo display to strong authentication and logo verification (Apple Mail BIMI support).
- Fastmail, which supports BIMI for both received and sent mail.
Microsoft Outlook and Outlook.com are still commonly cited as not showing BIMI logos, so BIMI should be treated as a “supporting inboxes” win, not a guaranteed everywhere feature.
SPF, DKIM, and DMARC settings required before BIMI
DMARC policy requirements: quarantine or reject
BIMI only gets evaluated when your domain is already doing the basics well: SPF, DKIM, and DMARC. The non-negotiable piece is DMARC enforcement. If your DMARC policy is set to p=none (monitoring mode), most providers will not display BIMI logos, even if everything else looks correct.
For BIMI readiness, publish DMARC with:
p=quarantineorp=reject(notp=none)- A reporting address (
rua=) so you can watch for breakage as you tighten controls - If you send from subdomains (like
news.example.com), set an enforcedsp=policy too, or publish separate DMARC for those subdomains
Some inboxes and validators also expect DMARC enforcement to apply broadly (often effectively 100% of mail), so if you are using pct= during rollout, treat that as a temporary step. For the DMARC policy definitions themselves, the canonical reference is DMARC.org.
Domain alignment and common authentication gotchas
BIMI depends on DMARC alignment, which is where many setups fail. Alignment means the domain the user sees in the From: header must match (or “align” with) the domain used by SPF and/or DKIM.
Common gotchas to check:
- SPF aligns to the Return-Path domain, not the From domain. If your ESP uses a different bounce domain, SPF may pass but fail alignment.
- DKIM aligns to the
d=domain in the DKIM signature. If your ESP signs with their own domain instead of yours, DKIM can pass but not align. - DMARC only needs one of SPF or DKIM to pass and align, but relying on just one is fragile. Most senders aim for aligned SPF and aligned DKIM.
- If you use strict alignment (
aspf=s/adkim=s), small domain differences can break DMARC. Relaxed alignment is more forgiving and is common in production.
Creating a BIMI-ready SVG logo that passes validation
SVG Tiny PS requirements and common export mistakes
Your BIMI logo is not a regular SVG. It must be a tightly restricted profile called SVG Tiny P/S (Portable/Secure). If your logo looks fine in a browser but fails BIMI, the file format is usually the reason.
At a minimum, the root <svg> element needs:
baseProfile="tiny-ps"version="1.2"
It also needs a non-empty <title> element (typically your brand name). Many BIMI validators also expect a simple, square logo that stays legible when shown very small. Gmail is especially strict about logos being perfectly square and commonly expects at least 96 × 96 dimensions, even though it is vector. The most practical approach is to build for Gmail’s stricter rules so you do not maintain multiple files.
Common export mistakes that break BIMI validation:
- Leaving text as fonts instead of converting to paths (external font behavior can cause rejections).
- Including scripts, animation, or interactivity.
- Using external references (linked images, stylesheets, remote resources).
- Having
x=ory=attributes on the root<svg>element. - Exporting with a messy header and extra metadata that bloats the file size.
If you want the canonical checklist for the profile, the BIMI Group’s guide is the most direct: Creating BIMI SVG Logo Files.
File hosting requirements for the logo URL
Where you host the SVG matters as much as how you create it. Your BIMI logo URL should be:
- HTTPS only, publicly accessible, and fetchable without logins, WAF challenges, or IP allowlists.
- Stable (avoid URLs that change, and avoid query strings if possible).
- Served with the correct MIME type (
image/svg+xml) and a normal200 OKresponse.
In practice, hosting the SVG on a reliable subdomain of the same brand domain you send from keeps things simplest, especially when you later add a VMC/CMC.
Publishing the BIMI DNS TXT record (default._bimi)
BIMI record tags explained: v, l, a
Your BIMI setup becomes “visible” to inbox providers when you publish a DNS TXT record at the right hostname. For most brands, that hostname is:
default._bimi.yourdomain.com
That default part matters. If you publish the TXT record at _bimi.yourdomain.com by accident, many receivers will not find it.
A standard BIMI TXT value is a short list of semicolon-separated tags:
- v: The version tag. Use
v=BIMI1. This is required. - l: The logo location. This is the HTTPS URL to your BIMI-ready SVG (SVG Tiny P/S). This is required.
- a: The authority evidence location. This is the HTTPS URL to your certificate file (VMC/CMC) in PEM format. This is optional in the spec, but required by some inboxes for logo display.
Keep the formatting clean. Use a lowercase l (it is easy to confuse with I). End tags with semicolons. If your DNS provider splits long TXT records into multiple quoted strings, that’s usually fine as long as the combined value is correct.
Example BIMI TXT records for common setups
1) Logo only (no certificate listed):
v=BIMI1; l=https://brand.example.com/bimi/logo.svg;
2) Logo + certificate (common for stricter inboxes):
v=BIMI1; l=https://brand.example.com/bimi/logo.svg; a=https://brand.example.com/bimi/mark.pem;
When you add the record, most DNS consoles want the “Name” or “Host” field as just default._bimi (not the full domain). After you save it, plan for DNS propagation, and keep a shorter TTL while you’re testing so changes take effect faster.
Verified Mark Certificates (VMC) and provider-specific requirements
Gmail BIMI requirements and the VMC requirement
A Verified Mark Certificate (VMC) is an X.509 certificate that proves your organization has the right to use a specific logo, and that the logo is tied to the sending domain. In BIMI terms, it is “evidence” you publish via the a= tag in your BIMI DNS record. The BIMI Group maintains the core overview of how VMCs fit into BIMI and why some providers require them (Verified Mark Certificates (VMC) and BIMI).
For Gmail, plan on needing a certificate if you want consistent BIMI logo display. Gmail recognizes two certificate paths:
- VMC: Typically requires a registered trademark (or certain government marks). In Gmail, a VMC can also unlock the verified checkmark experience in supported views.
- CMC (Common Mark Certificate): Introduced to broaden access for brands that do not have a registered trademark. In Gmail, a CMC can display the avatar logo, but without the verified checkmark reserved for VMCs.
In other words: if your goal is “logo only,” a CMC may be enough. If your goal is “logo plus the strongest verification signal Gmail offers,” a VMC is usually the target.
Yahoo and other inbox caveats for logo display
Yahoo Mail supports BIMI, but logo display can still vary by message and by recipient context. A few practical caveats matter:
- Self-asserted BIMI can work in some ecosystems (logo URL in
l=with no certificate ina=), but it is not universal. If you want the broadest coverage, budget for a certificate. - Passing DMARC is table stakes, and it must be aligned with the visible From domain. A forwarding path or an unsigned mail stream can quietly break alignment.
- Logo display is discretionary. Even with perfect DNS records, inboxes may suppress logos for low-reputation traffic, newly authenticated domains, or unusual sending patterns.
- Changes take time to show up. Providers cache BIMI lookups and logo fetches, so updates to your SVG or cert can take days to fully propagate in real inbox views.
Testing BIMI setup and fixing common problems
How to validate your BIMI record and logo URL
Start by testing in two layers: DNS first, then the logo fetch.
-
Confirm the DNS record is published at the right name. The record should be a TXT record at
default._bimi.yourdomain.com. A very common mistake is publishing it at_bimi(missingdefault) or on the wrong domain (for example, on a parent domain while mail comes from a subdomain). -
Check the TXT value is well-formed. You should see
v=BIMI1;plus anl=URL, and optionally ana=URL. Typos, missing semicolons, or a pasted smart quote can break parsing. -
Fetch the logo URL exactly as the receiver will. Open the
l=URL in a private/incognito browser session. It must load without redirects to a login page, bot challenge, or a blocked country/IP. If the URL redirects, keep it to a simple, direct HTTPS 200 response. -
Validate the SVG itself. If the file fails, it is usually not SVG Tiny P/S, contains unsupported features (fonts, external links), or is not square. Re-export with BIMI settings and keep it simple.
-
Confirm DMARC is enforced and aligned. If your message is failing DMARC (or passing but not aligned), BIMI will not display. Check an actual received message’s authentication results header in a supporting inbox.
When your logo should start showing in inboxes
Even after everything is correct, logo display is rarely instant. DNS changes can propagate within minutes to hours, but inbox providers may cache BIMI lookups and logo files for longer. A realistic expectation is anywhere from 24 to 72 hours for initial display in some inboxes, and longer after you change the SVG or certificate.
If it still does not show after several days, treat it as a debugging signal: one stream is not DMARC-aligned, the SVG is being rejected by the provider, or a certificate requirement (VMC/CMC) is not met for that inbox.
Related posts
Keep reading
Improve Email Tone with AI: Revolutionizing Digital Communication
Boost email tone with AI-powered rewriting that makes every message clearer, warmer, and more professional to increase replies and transform digital communication.
How To Meet Yahoo Bulk Sender Rules For Authentication In 2026
Yahoo bulk sender rules: set up SPF, DKIM and DMARC alignment, publish a DMARC record, and avoid blocks with rDNS, TLS, and one-click unsubscribe smoothly.
Incorporating Dark Mode in Email Design and Marketing
Dark mode email design tips to protect brand colors, keep text readable, handle logo/image inversion, add CSS where supported, and test in major clients.
Effective Email Marketing Strategies for Etsy Shop Owners
Discover cheerful, proven email marketing strategies for Etsy shop owners to grow subscribers, boost repeat sales, showcase handmade products and build loyal fans.
How To Separate Transactional And Promotional Sends With Subdomains
Separate transactional and promotional emails with subdomains; set up SPF/DKIM, align DMARC, warm up traffic, and protect sender reputation and inboxing.
How To Read Gmail Postmaster Tools To Improve Inbox Placement
Gmail Postmaster Tools metrics decoded: spot spam-rate spikes, auth gaps, and compliance issues, then take quick, clear steps to lift Gmail inbox placement.