Implementing Brand Indicators for Message Identification (BIMI) and Verified Mark Certificates (VMC) represents the pinnacle of email authentication. For mail server administrators, this is not merely a branding exercise; it is a rigorous enforcement of the DMARC (Domain-based Message Authentication, Reporting, and Conformance) ecosystem designed to transform backend security into a visible trust signal.
As of 2026, BIMI has become a global standard for preventing spear-phishing and improving deliverability. This guide provides a technical deep-dive into the architecture, prerequisites, and deployment steps for a production-grade BIMI/VMC implementation.
1. The BIMI & VMC Architectural Framework
BIMI is a DNS-based protocol that allows mail user agents (MUAs) to fetch a sender’s logo only after the message has passed strict authentication. Unlike a Gravatar or a manually uploaded avatar, BIMI is cryptographically tied to the domain’s security posture.
The Ecosystem Components
- SPF (Sender Policy Framework): Validates the IP address of the sending server.
- DKIM (DomainKeys Identified Mail): Provides a digital signature to ensure the message body and headers haven’t been tampered with.
- DMARC: The “orchestrator” that tells the receiving server what to do if SPF/DKIM fails.
- VMC (Verified Mark Certificate): A digital certificate (issued by a Certificate Authority like DigiCert or Entrust) that confirms the entity’s right to use a specific trademarked logo.
- SVG Tiny P/S: A highly restricted version of the Scalable Vector Graphics format designed for security (no scripts, no external links).
2. Technical Prerequisites: The Foundation
Before publishing a BIMI record, your mail infrastructure must meet three non-negotiable criteria.
2.1. DMARC Enforcement (The Hardest Step)
BIMI requires a DMARC policy of either p=quarantine or p=reject. Furthermore, the percentage tag (pct=) must be set to 100.
- Why? Mailbox providers like Gmail and Apple Mail will not fetch a logo if there is even a 1% chance that an unauthenticated email could reach the inbox.
- Admin Note: If you are currently at
p=none, do not jump top=rejectimmediately. You must analyze your RUA/RUF reports to ensure all legitimate third-party senders (e.g., Zendesk, Mailchimp, Salesforce) are correctly aligned.
2.2. Registered Trademark
VMC issuance is currently restricted to logos that are registered trademarks in specific jurisdictions (e.g., USPTO, EUIPO, UKIPO). You cannot obtain a VMC for a non-trademarked logo.
2.3. SVG Tiny P/S Compliance
Standard SVG files will fail BIMI validation. The logo must be converted to the SVG Tiny Portable/Secure profile.
- Technical Constraints:
- No
<script>tags. - No external references (e.g.,
xlink:hrefto an external URL). - No animations or interactive elements.
- Dimensions: Must be a square (1:1 aspect ratio).
- Size: Recommended under 32KB.
- No
3. Step-by-Step Configuration Guide
Step 1: Generating the SVG Tiny P/S File
Use Adobe Illustrator or an open-source tool to export your logo, then use the BIMI Group’s conversion tools to strip non-compliant elements.
Sample Compliant Header:
XML
<svg version="1.2" baseProfile="tiny-ps" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"> <title>Your Company Logo</title> <rect width="100" height="100" fill="#000"/> </svg> Step 2: Obtaining the Verified Mark Certificate (VMC)
You must apply for a VMC through an authorized CA. The process involves:
- Identity Verification: A “Face-to-Face” or video verification of the admin/representative.
- Trademark Validation: The CA verifies your logo against the national trademark database.
- Issuance: You receive a
.pemfile containing the certificate chain.
Step 3: Hosting the Assets
Both the .svg and the .pem file must be hosted on a public web server via HTTPS.
- Critical: The domain hosting the files should ideally match the sending domain to avoid cross-origin policy issues in some strict mail clients.
- Pathing:
https://cdn.example.com/bimi/logo.svgandhttps://cdn.example.com/bimi/certificate.pem.
Step 4: Publishing the BIMI DNS Record
The BIMI record is a TXT record located at the default._bimi selector.
| Host | Type | Value |
default._bimi.example.com | TXT | v=BIMI1; l=https://example.com/logo.svg; a=https://example.com/certificate.pem; |
- v: Version (always
BIMI1). - l: Location (URL) of the SVG logo.
- a: Authority (URL) of the VMC file.
4. Mail Server Validation & Troubleshooting
Once configured, the mail server does not “send” the logo. Instead, the recipient’s mail server performs a DNS lookup for the BIMI record.
Common Failure Points for Admins
- Certificate Chain Issues: The
.pemfile must include the full chain (Entity certificate -> Intermediate CA -> Root CA). If the intermediate is missing, the logo won’t display. - DMARC Alignment: If the
From:header domain ismarketing.example.combut the BIMI record is only atexample.com, the logo may not show unless the organizational domain policy covers subdomains. - Caching: DNS propagation and mailbox provider caching can take up to 48–72 hours.
Validation Tools
- BIMI Inspector: Use the official tool at
bimigroup.orgto check your SVG and DNS syntax. - Header Inspection: Send a test email to a Gmail account and check the “Original Message.” Look for the
Authentication-Resultsheader. You want to see:bimi=pass header.d=example.com policy.authority=pass
5. Security Implications for the Mail Administrator
Implementing VMC adds a layer of Public Key Infrastructure (PKI) to your email.
- Rotation: VMCs typically expire annually. Set a calendar reminder 60 days out; an expired VMC will immediately cause your logo to vanish and may negatively impact trust scores.
- Audit Logging: Monitor your DMARC reports closely after enabling BIMI. If you see a spike in “Fail” results from legitimate sources, your BIMI configuration might be exposing misconfigured legacy servers.
Summary Table: BIMI vs. Standard Email
| Feature | Standard Email (No BIMI) | BIMI with VMC |
| Visuals | Generic initials or blank avatar | Verified Brand Logo |
| Trust Signal | None | Blue Checkmark (Gmail/Apple) |
| Security Req. | Optional SPF/DKIM | Enforced DMARC (p=quarantine/reject) |
| Validation | Domain-level only | Legal/Trademark level |







