Once a domain is actually ready for BIMI, the next failures are usually not about DMARC anymore. They are about the logo file, the certificate path, or one small validation detail that looked harmless during setup.
If you need the bigger BIMI picture first, start with What is BIMI, how does it work, and what problem does it solve?, How BIMI relates to DMARC, and BIMI prerequisites for administrators.
For most real deployments, BIMI succeeds only when all three of these are true:
Most BIMI rollouts fail on file format and validation details, not on the idea of BIMI itself. Receivers are not required to repair malformed BIMI records, broken SVGs, or incomplete certificate chains.
This is the first trap.
Design teams often hand over a perfectly good SVG for websites, slide decks, or print workflows. That does not mean the file is valid for BIMI.
Current BIMI guidance points senders to SVG Tiny PS. Google also documents additional compatibility checks for Gmail. In practice, that means the logo file should be treated as a constrained delivery artifact, not as a general-purpose brand asset.
At a minimum, the BIMI SVG should follow these rules:
baseProfile="tiny-ps"version="1.2"x= or y= attributes on the root <svg> elementGoogle's current setup guidance also says the image must be at least 96x96 pixels, should be centered in a square, and should stay small enough to render reliably. Google recommends 32 KB or smaller and also recommends a <desc> element for accessibility.
Common graphics-tool exports often include things that are fine on the web but risky for BIMI validation:
width="100%"So if someone says, "We already have the logo as SVG," that should be treated as the start of validation, not the end of it.
A Verified Mark Certificate (VMC) is the certificate-backed path for showing that the claimed logo is tied to a verified mark.
The current BIMI draft defines a broader Mark Certificate (MC) concept and distinguishes between:
The operational point is simple: the certificate is the evidence layer that helps mailbox providers decide whether the published logo should be trusted enough to display.
Without a certificate-backed evidence path, BIMI would be much easier to abuse with lookalike domains and copied branding.
The BIMI draft is explicit that brand indicators are a potential abuse vector. It also leaves final display policy to mailbox providers, which is why providers can require stronger evidence than the DNS record alone.
Google's current admin guidance says BIMI requires third-party certification for the domain and logo, specifically a VMC or CMC. It also says Gmail and other email clients support BIMI only with PEM files when the certificate-backed path is used.
That means an organization can publish a syntactically valid BIMI record and still not meet Gmail's real-world deployment expectations.
The technical work for BIMI often depends on legal readiness.
Google says VMC eligibility requires a trademarked logo from an intellectual property office recognized by VMC issuers, and notes that trademarking can take 6 to 12 months. The BIMI Group likewise describes VMCs as based on registered trademarks and positions CMCs as the alternative when the exact trademark path is not available.
This matters because many teams approach BIMI as a DNS project, when it is often partly a legal and brand-governance project.
Use this rough rule:
Do not assume "certificate" automatically means VMC. For many organizations, the first real question is whether the logo is even eligible.
For Gmail's certificate-backed BIMI flow, the PEM file is not just a wrapper you ignore after issuance.
Google documents a specific process:
a= tagThat is one of the most common places where implementations go wrong.
a= tag to the wrong fileIf the certificate chain is incomplete or unreachable, a mailbox provider can reject the BIMI evaluation even when the logo file itself is fine.
BIMI TXT records are strict.
The BIMI draft says receivers MUST NOT attempt to fix syntax or capitalization mistakes in assertion records. If a required tag is missing or malformed, the record is an error.
That has two direct consequences:
For a basic certificate-backed record, the common shape is:
default._bimi.example.com. IN TXT "v=BIMI1; l=https://example.com/brand/logo.svg; a=https://example.com/brand/certificate.pem"For Gmail's documented PEM-based example, the l= tag can be empty while the a= tag points to the PEM file:
default._bimi.example.com. IN TXT "v=BIMI1; l=; a=https://example.com/brand/certificate.pem"The mistakes that show up repeatedly are:
default._bimi.<domain>BIMI11, uppercase I, and lowercase ll= or a= at a non-public URLGoogle explicitly warns that 1, I, and l look similar in BIMI syntax. That sounds trivial, but it is a real production mistake.
When a new BIMI deployment does not work, these are the first failure classes to check.
p=nonepct is below 100Before you spend time on mailbox-provider troubleshooting, verify these in order:
pct=100default._bimi.<domain>That order prevents a common waste of time: trying to debug display behavior before validating the logo file, certificate chain, and DNS syntax.
BIMI success depends on precision.
The logo must be a BIMI-compatible SVG Tiny PS file, the evidence path must satisfy the provider's certificate expectations, and the DNS and HTTPS references must be exact enough to survive strict validation. In real deployments, the most common failures are ordinary ones: a non-compliant SVG export, a VMC eligibility assumption that was never true, an incomplete PEM chain, or a tiny record-syntax mistake that no receiver is willing to repair.