BIMI, VMC, CMC: compatibility and DNS prerequisites (Gmail, Yahoo, Apple Mail)

By CaptainDNS
Published on December 16, 2025

  • #DNS
  • #Email
  • #Deliverability
  • #DMARC
  • #Gmail
  • #Yahoo Mail
  • #Apple Mail
  • #Security
BIMI illustration: DMARC + VMC/CMC certificate and logo display in Gmail, Yahoo Mail, and Apple Mail
TL;DR

TL;DR - 📢 BIMI only shows your logo in the inbox if your domain passes DMARC and your logo is validated (VMC or CMC), with requirements that vary by provider.

  • Gmail requires a VMC or a CMC; the Gmail checkmark is reserved for VMC.
  • A CMC can be issued without a registered trademark, using proof of prior logo use (>= 12 months) or a "modified registered mark".
  • On the DNS side, everything hinges on DMARC (p=quarantine/reject + pct=100), the BIMI TXT, and clean HTTPS hosting (SVG/PEM).

BIMI (Brand Indicators for Message Identification) is the visible "cherry" on top of an invisible base: solid email authentication. When it is properly implemented, your emails can display your logo in certain inboxes.

But BIMI is not "just an SVG". For most big players (including Gmail), you need a certificate that legally/administratively ties the logo to your organization: VMC or CMC. Since 2024, Gmail also accepts CMCs, which changes things for brands that don't (yet) have a registered trademark.

This article is for sysadmins, email marketing teams, and CTOs who want to:

  • understand the difference VMC vs CMC,
  • secure the DNS prerequisites (DMARC/BIMI/HTTPS),
  • avoid the traps where "BIMI works on X but not on Y."

Diagram - end-to-end BIMI flow

What BIMI actually is

BIMI is a specification that lets mailbox providers display a brand logo next to your emails, provided that:

  1. the email passes DMARC (so SPF and/or DKIM are aligned),
  2. the domain publishes a BIMI record in DNS,
  3. the logo is compliant (SVG "Tiny-PS" in most cases),
  4. and, depending on the provider, the logo is validated by a certificate (VMC/CMC).

BIMI is not a replacement for anti-phishing

BIMI does not "block" phishing by itself. It encourages deploying DMARC with a strict policy (quarantine/reject) and improving authentication hygiene. The logo display is a result of that hygiene, not a substitute.

BIMI is not a guarantee of display

Even with perfect DNS, display remains at the provider's discretion (and sometimes their internal rules, reputation, spam history, etc.).

The unavoidable DNS prerequisites

1) DMARC must be in "enforcement" mode

To be BIMI-eligible (especially for Gmail), DMARC has to enforce an action:

  • p=quarantine or p=reject
  • pct=100

Clean base DMARC example:

_dmarc.captaindns.com. 3600 IN TXT "v=DMARC1; p=quarantine; pct=100; rua=mailto:dmarc-agg@captaindns.com; adkim=r; aspf=r"

Check:

dig +short TXT _dmarc.captaindns.com

Frequent pitfall: p=none (monitoring mode). Very useful at the start, but not BIMI-eligible for Gmail.

2) SPF/DKIM must pass AND be aligned (DMARC)

DMARC "passes" if:

  • SPF or DKIM passes,
  • and one of the two is aligned with the From: domain.

Quick checklist:

  • You sign all outbound mail with DKIM (recommended).
  • Your SPF is not a "catch-all" and doesn't exceed lookup limits.
  • You avoid "ghost" subdomains (e.g. mail.captaindns.com) that send without a DMARC policy.

3) Publish the BIMI TXT (and publish it at the right place)

The BIMI TXT is published under a name like:

  • default._bimi.captaindns.com

Examples (depending on your mode):

Certificate mode (typically Gmail) - the logo is included in the PEM, so l= can be empty:

default._bimi.captaindns.com. 3600 IN TXT "v=BIMI1; l=; a=https://assets.captaindns.com/bimi/brand.pem"

"SVG" mode (self-declared) - accepted by some providers, but not by Gmail:

default._bimi.captaindns.com. 3600 IN TXT "v=BIMI1; l=https://assets.captaindns.com/bimi/logo.svg"

Check:

dig +short TXT default._bimi.captaindns.com

4) HTTPS hosting: not "just a file you drop somewhere"

Whether you host an SVG or a PEM, aim for:

  • HTTPS required,
  • modern TLS (at least TLS 1.2),
  • valid server certificates (proper chain),
  • stable URLs (no endless redirects).

Simple TLS test:

openssl s_client -connect assets.captaindns.com:443 -servername assets.captaindns.com </dev/null 2>/dev/null | openssl x509 -noout -subject -issuer

VMC: the "maximum level" for BIMI

VMC (Verified Mark Certificate) = verified mark certificate. Key point: the logo corresponds to a registered mark (or government mark) and the certificate authority verifies:

  • the existence of the mark,
  • its match with the logo (colors/variants),
  • the ownership or a license to use it.

What changes for Gmail

  • Gmail requires a VMC or CMC for BIMI.
  • The verified checkmark in Gmail is reserved for senders with VMC (not CMC).
  • The checkmark appears on Gmail web and has been extended to the Gmail mobile apps (VMC only).

When to choose VMC

Choose VMC if:

  • you have a registered mark (or can register one),
  • you want the strongest trust signal (including the Gmail checkmark),
  • you have high "compliance/anti-impersonation" requirements (regulated sectors, finance, etc.).

Time to prepare

The "technical" time (DNS/HTTPS) is quick. The "legal" time (trademark filing) is the real limiting factor.

CMC: the official alternative when the logo is not (yet) registered

CMC (Common Mark Certificate) = certificate for marks that do not fit the "registered mark" box.

CMC was introduced to open BIMI to more organizations, and Gmail now supports it.

Two common paths for a CMC

The exact requirements are defined in the "Mark Certificate Requirements", but keep this mental model:

  1. Prior Use Mark: your logo has been publicly used for long enough, and you can prove it.
  2. Modified Registered Mark: your logo is a variant tied to an existing registered mark (more "hybrid" case).

Focus on "Prior Use": the >= 12 months rule

The idea: the certificate authority must be able to verify that:

  • the logo is currently displayed on a website you control,
  • and that it was already displayed at least 12 months earlier on that same domain,
  • with historical proof via an archive source (e.g. archive.org).

In short: if your logo has lived on your site for a year, you have a realistic CMC path without a trademark filing.

What changes for Gmail

  • With a CMC, Gmail can display your BIMI logo.
  • But without the Gmail checkmark (reserved for VMC).

VMC vs CMC comparison

The table below is exported in CSV/JSON for reuse (links in the frontmatter).

CriteriaVMCCMCPractical impact
Type of validated markRegistered or government markCommon mark: prior use or modified registered markMostly a legal decision; DNS mechanics are identical once the certificate is obtained
Primary proofVerification in an official registry (office/WIPO) + ownership/licenseLogo currently displayed on a controlled site + proof of display >= 12 months via archive (e.g. archive.org)Plan to collect evidence / URLs / captures
Indicator in GmailLogo + verified checkmarkLogo without checkmarkThe checkmark is a benefit specific to VMC
Preparation timeMay require a trademark filing (often 6-12 months)Requires >= 12 months of usage historyPlan according to your history and objectives
Logo eligibilityNon-registered marks are not eligible as the logo in the "registered mark" profileDesigned for non-registered marks (or derived from a registered mark)CMC opens BIMI to more organizations
Perception of trustStrong, "standard" validation on the compliance sideUsage-based validationChoose based on your exposure to impersonation
DNS requirementsDMARC enforcement + BIMI TXT with a= to PEMIdentical: DMARC enforcement + BIMI TXT with a= to PEMThe VMC/CMC choice does not reduce the DNS work
Logo changeNew logo = new validation/certificate cycleSameStabilize an "email logo" to avoid iterations
When to chooseRegistered mark, need the Gmail checkmarkNo registered mark, stable and documentable public useMarketing/legal choice; technically deployment is identical

Diagram - choosing between VMC and CMC

Compatibility: Gmail, Yahoo Mail, Apple Mail

Gmail

What you can consider "true" in production:

  • Certificate required: VMC or CMC.
  • Checkmark: VMC only.
  • The BIMI TXT in certificate mode points to a PEM (logo + certificate), served over HTTPS.

Yahoo Mail

Yahoo is historically one of the more open providers on BIMI:

  • some displays can work with self-declared logos (without a certificate),
  • but DMARC in enforcement remains an important prerequisite.

Takeaway: if your main target is Gmail, go straight to a VMC/CMC path.

Apple Mail

Apple has two different "stories":

  1. BIMI in Apple Mail (client) Apple Mail supports BIMI, but the control is on the mail provider side (server): that server must verify compliance and add the necessary headers before Apple Mail displays the logo.

  2. Branded Mail (Apple Business Connect) This is an Apple program separate from BIMI, adding name + logo in Apple Mail / iCloud Mail, with:

  • Apple validation,
  • domain verification via a TXT,
  • strict DMARC requirements and mandatory DKIM (SPF alone not supported),
  • perimeter constraints (commercial domains only, visibility in iCloud and certain languages).

In short: BIMI is multi-ecosystem, Branded Mail is an Apple channel.

DNS: what you actually need to publish

Diagram - DNS records to publish

DMARC

Goal: DMARC "enforcement" + 100% of messages.

_dmarc.captaindns.com. 3600 IN TXT "v=DMARC1; p=reject; pct=100; rua=mailto:dmarc-agg@captaindns.com"

BIMI

Goal: publish the record at the right name + point to your assets.

default._bimi.captaindns.com. 3600 IN TXT "v=BIMI1; l=; a=https://assets.captaindns.com/bimi/brand.pem"

DKIM

Goal: sign all flows and verify d= (domain) and selector.

dig +short TXT selector1._domainkey.captaindns.com

CAA

CAA is not "mandatory" for you on the BIMI side, but there's an important operational point:

  • certificate authorities are required to check your CAA before issuing a Mark Certificate;
  • if you have a restrictive CAA and you don't authorize the CA you chose, issuance can fail.

Generic example (adapt with the CA you actually use):

captaindns.com. 3600 IN CAA 0 issue "ca-exemple.net"
captaindns.com. 3600 IN CAA 0 iodef "mailto:dns-alerts@captaindns.com"

Check:

dig +short CAA captaindns.com

Tests & debugging: the checks that avoid 80% of tickets

Check DMARC (blocking values)

dig +short TXT _dmarc.captaindns.com

Points to control for BIMI/Gmail:

  • p=quarantine or p=reject
  • pct=100

Check the BIMI TXT

dig +short TXT default._bimi.captaindns.com

Traps:

  • record published on _bimi.captaindns.com (wrong name) instead of default._bimi.captaindns.com,
  • quotes misplaced / weird spaces,
  • https:// URL that redirects to http:// (no),
  • PEM certificate without intermediate chain (if your CA asks you to append).

Quickly test the HTTPS server chain

openssl s_client -connect assets.captaindns.com:443 -servername assets.captaindns.com </dev/null

Late 2025: new items and watchpoints

1) CMC: major expansion, but checkmark still VMC

Gmail support for CMC opened BIMI to more brands, but the hierarchy stays simple:

  • VMC = logo + strong signal (checkmark)
  • CMC = logo without checkmark

2) avp tag in the BIMI record

A recent evolution of the BIMI standard introduces avp (Avatar Preference) to express a display preference:

  • avp=brand: prefer the brand logo,
  • avp=personal: prefer the personal avatar if it exists, otherwise the BIMI logo.

Example (if supported in your ecosystem):

default._bimi.captaindns.com. 3600 IN TXT "v=BIMI1; l=https://assets.captaindns.com/bimi/logo.svg; a=https://assets.captaindns.com/bimi/brand.pem; avp=brand"

3) Apple Branded Mail: strict DMARC + mandatory DKIM

If your target is iCloud/Apple Mail "on the Apple side", note that Branded Mail imposes:

  • DMARC in enforcement (quarantine/reject) and pct=100,
  • mandatory DKIM (SPF alone not supported),
  • Apple validation + verification TXT, with time windows.

Action plan

  1. Map your sending domains
  • domain(s) used in From:
  • bounce domains (Return-Path)
  • platforms (ESP, CRM, internal MTA)
  1. Make DMARC BIMI-compliant
  • fix SPF/DKIM (at least one must pass DMARC alignment)
  • move to p=quarantine then p=reject as you mature
  • force pct=100 when you are BIMI-ready
  1. Choose VMC vs CMC
  • registered mark (or plan to register) → VMC
  • no registered mark, but logo publicly used for >= 12 months → CMC
  • no history → start by stabilizing your "email logo" and building proof
  1. Produce the compliant SVG
  • SVG Tiny-PS format
  • no scripts/external links/animations
  • dimensions in pixels (e.g. 96x96)
  • add <title> and <desc> (accessibility)
  1. Obtain the certificate and prepare the PEM
  • get the "entity" PEM
  • append intermediates + root if required by your CA
  • host the PEM on stable HTTPS
  1. Publish the BIMI TXT
  • default._bimi.your-domain
  • point to a=https://.../brand.pem
  • (optional) also publish l=https://.../logo.svg if you target clients that rely on l
  1. Test
  • dig on DMARC/BIMI
  • curl on PEM/SVG
  • verify real sends to Gmail/Yahoo/iCloud
  1. Monitor
  • DMARC reports (RUA) to spot flows that break
  • track changes (logo, subdomains, ESPs, DKIM keys)

FAQ

Does Gmail accept BIMI without a certificate (self-declared logo)?

No: to display a BIMI logo in Gmail, you need a certificate (VMC or CMC) and a BIMI record that points to the PEM. Self-declared logos may work elsewhere, but not on Gmail.

Does a CMC give the Gmail checkmark?

No. With a CMC, Gmail can display the logo, but the verified checkmark is reserved for VMC.

My DMARC is p=none: can I enable BIMI?

For Gmail, no: you need at least p=quarantine or p=reject, and pct=100. If you're at p=none, start by fixing SPF/DKIM, then increase the policy gradually.

Apple Mail: BIMI or Branded Mail, which should I pick?

If you want a multi-provider approach (Gmail/Yahoo/etc.), BIMI is the standard path. If your target is the Apple/iCloud ecosystem and you accept an Apple Business Connect process (Apple validation + DMARC/DKIM requirements), Branded Mail can complement BIMI.

What most often breaks BIMI on the DNS side?

The top 3 causes: DMARC not in enforcement (p=none or pct<100), BIMI record published at the wrong name (not default._bimi), and inaccessible HTTPS URLs (WAF, redirects, poorly chained server certificate).

Download the comparison tables

Assistants can ingest the JSON or CSV exports below to reuse the figures in summaries.

Glossary

  • BIMI: logo display standard based on DMARC + a BIMI DNS record.
  • DMARC: policy that states what to do if SPF/DKIM fail and enforces From: domain alignment.
  • SPF: list of IPs/services authorized to send for a domain (IP-based authentication).
  • DKIM: cryptographic signature added to the message, verified via DNS (key-based authentication).
  • VMC: BIMI certificate based on a registered (or government) mark, providing a high level of trust.
  • CMC: alternative BIMI certificate, based on a "common" mark (e.g. prior use) or a variant tied to a registered mark.
  • PEM: file format that contains the certificate (and often the chain), referenced by the a= tag of the BIMI record.
  • CAA: DNS record that restricts which certificate authorities can issue certificates for a domain.

Sources

Similar articles