If you are planning a BIMI rollout, the main mistake to avoid is treating it like a logo-upload project.
BIMI is really the last layer in a chain that starts with stable email authentication, moves through DNS and HTTPS hosting, and only then reaches logo display. If any earlier piece is weak, the logo usually does not show up no matter how polished the brand asset is.
If you need the broader background first, start with What is BIMI, how does it work, and what problem does it solve? and How BIMI relates to DMARC.
Before BIMI is realistic, an administrator usually needs all of this to be true:
p=noneBIMI is usually blocked by authentication cleanup, not by graphic design. If some mail streams still fail DMARC alignment, fix that first.
The biggest gate is DMARC policy.
The BIMI Group implementation guide says the domain must be at enforcement, which means p=quarantine or p=reject, and pct cannot be below 100. The current BIMI Internet-Draft says the same thing in standards language: participating domains need a strong DMARC policy on the organizational domain and the visible From: domain, and quarantine cannot be partial.
That has two practical consequences for administrators.
p=none is not enoughIf your DMARC record is still only in monitoring mode, BIMI is generally not ready.
The reason is straightforward: mailbox providers do not want to attach visible brand identity to mail unless the domain is already treating unauthenticated or misaligned use seriously.
It is not enough to publish SPF, DKIM, and DMARC records and call the job done.
BIMI depends on actual DMARC success across the mail streams that matter. That means checking whether:
If you are still working through enforcement, DMARC policy modes explained is the right prerequisite reading.
Once DMARC is stable, DNS becomes the next checkpoint.
The core BIMI publication point is a TXT record at default._bimi.example.com. The BIMI draft defines a tag-value record format where v=BIMI1 identifies the record, l= points to the logo location, and a= can point to authority evidence such as a mark certificate.
A typical record looks like this:
default._bimi.example.com. IN TXT "v=BIMI1; l=https://example.com/brand/logo.svg; a=https://example.com/brand/certificate.pem"At an administrative level, the DNS requirements are not complicated, but they do need to be clean:
_bimi name expected by the provider flowThe implementation guide is explicit that DMARC enforcement needs to cover the organizational domain and subdomains.
That matters because many organizations send from multiple visible From: domains. If news.example.com or billing.example.com is part of the live mail flow, do not assume the organizational-domain record alone makes the whole estate BIMI-ready.
This is the prerequisite many teams underestimate.
BIMI is not a switch that every mailbox provider treats the same way. The BIMI Group says participating mailbox providers use their own criteria for deciding when a logo may be displayed, and the Internet-Draft also leaves indicator display policy to receivers.
In practice, administrators should assume three things:
Google's current admin documentation says BIMI requires a third-party certificate for the domain and logo, specifically a Verified Mark Certificate (VMC) or Common Mark Certificate (CMC). It also requires DMARC at p=quarantine or p=reject with pct=100.
So for Gmail, "we published a BIMI TXT record" is not the same as "we completed the prerequisites."
You also need the certificate workflow, the hosted files, and a logo that satisfies both BIMI-format rules and Google's compatibility expectations.
The BIMI Group still describes VMC or CMC as highly recommended and notes that self-asserted logos have limited support across mailbox providers.
That means a technically valid deployment without a mark certificate may still produce disappointing results. For many brands, the business question is not "Can I publish a BIMI record?" but "Will the providers that matter to us actually display the logo?"
Many first BIMI rollouts fail because the source logo file was created for web or print use, not for BIMI validation.
The BIMI Group implementation guide calls for an SVG Tiny PS version of the official logo. Google's setup guidance adds practical requirements and recommendations such as:
This is why "we already have an SVG" is not enough.
A normal marketing SVG often includes metadata, unsupported elements, transparency assumptions, or export settings that are fine for browsers but not suitable for BIMI validation.
Google's guidance says VMC eligibility depends on having a trademarked logo in a jurisdiction recognized by VMC issuers, and notes that trademarking can take 6 to 12 months. If the logo is not trademark-ready, a CMC may be the more realistic path depending on issuer support and your brand situation.
For administrators, this means BIMI may require coordination with legal and brand teams well before any DNS change window.
BIMI resources are not only DNS records. Receivers also have to fetch the logo and, when used, certificate-related files from the web.
Google's documentation says the public web server hosting BIMI files must use HTTPS and support secure TLS connections. The BIMI draft also requires HTTPS for the l= and a= locations.
That leads to a simple hosting checklist:
Admins sometimes get the DNS right and then lose days to a broken asset URL, a redirect loop, or a CDN rule that blocks fetches from validation systems.
Before you open a BIMI project as "implementation," verify these questions first:
p=quarantine or p=reject?pct=100?From: domains also covered appropriately?default._bimi TXT records cleanly?If a BIMI project starts with "design will send us the logo," it often stalls.
The better order is:
That order reduces wasted work because it prevents the team from polishing a brand asset before the authentication and provider prerequisites are actually satisfied.
BIMI readiness is mostly about operational maturity.
Before the logo can appear, administrators need strong DMARC enforcement, clean aligned authentication, correct DNS publication, reliable HTTPS hosting, realistic provider expectations, and a logo that is actually ready for BIMI validation and certificate workflows. The visible logo is the outcome, but the real prerequisite is a well-controlled sending domain.