Table of Contents
Introduction
Your BIMI record is published, everything looks correct in DNS, but Gmail still won’t display your logo when you send from Salesforce. Frustrating, right?

This usually isn’t a missing record. It’s an authentication and alignment issue. Gmail checks for strict DMARC enforcement, SPF and DKIM alignment, and stable sender infrastructure before showing your brand mark. If one layer is weak, the logo simply does not appear.
For Salesforce teams, that gap is hard to spot. You can enable DKIM and send authenticated email, but Salesforce does not validate whether your setup is strong enough to support BIMI safely at scale.
BIMI implementation depends on authentication alignment and infrastructure control. Here’s how to fix it correctly without hurting deliverability.
Why Your BIMI Record Is Not Working in Salesforce
Your BIMI record is not working in Salesforce because Gmail cannot validate one or more authentication requirements tied to your sending domain. The DNS record may exist, but if enforcement, alignment, or logo validation fails, Gmail simply does not show your logo.
Here are the four most common causes.
1. DMARC policy is not set to enforcement
If your DMARC policy is p=none, BIMI will not activate in Gmail. Enforcement is required.
What to verify:
- DMARC policy is set to p=quarantine or p=reject
- Alignment between your “From” domain and the DKIM domain
- No conflicting subdomain DMARC records
- Enforcement is applied to the actual sending domain
Many teams publish a BIMI record while DMARC is still in monitoring mode. That avoids short-term disruption but guarantees the logo will not appear. Moving to enforcement without validating alignment first can affect deliverability.
Salesforce allows you to enable DKIM, but it does not actively validate the enforcement impact across domains. A Salesforce-native solution like MassMailer helps teams review alignment before enforcing DMARC at scale.
2. SPF and DKIM alignment do not match your sending domain
BIMI requires domain alignment, not just authentication success. SPF and DKIM must match the visible “From” domain.
Common alignment failures:
- DKIM signing from a different subdomain
- SPF passing through a relay domain
- Shared sending infrastructure affecting alignment
- Mismatch between envelope and header domains
These issues often appear after scaling the volume in Salesforce. Everything works in testing, but alignment weakens under production sending.
MassMailer, as a Salesforce-native email platform, provides visibility into authenticated sending domains inside Salesforce, helping teams detect alignment gaps before they affect BIMI display.
3. The BIMI TXT record is published incorrectly
Small syntax errors can invalidate the record completely.
Check the following:
- Record is published under default._bimi.yourdomain.com
- TXT value begins with v=BIMI1;
- SVG URL is accurate and publicly accessible
- DNS propagation has completed
Even minor formatting issues stop Gmail from validating the BIMI record.
Tools like MassMailer reduce configuration risk by centralizing domain authentication settings within Salesforce, making it easier to confirm that the correct domain and selector are being used.
4. Logo or VMC requirements are not met
A BIMI record will not display in Gmail unless the logo and certificate meet strict validation rules.
Confirm:
- SVG uses Tiny PS format
- File is hosted over HTTPS.
- Verified Mark Certificate (VMC) is issued
- VMC matches the sending domain
Many teams assume BIMI is broken when the issue is actually certificate validation. Gmail does not display partial compliance.
A Salesforce-native tool like MassMailer helps maintain authentication stability so that once VMC validation is completed, ongoing campaigns do not introduce alignment issues that suppress logo visibility.
Once those are resolved, the real challenge becomes maintaining authentication stability at scale. That’s where infrastructure control and monitoring become essential, and why BIMI cannot be treated as a one-time setup.
Why a BIMI Record Requires Authentication Control and Infrastructure Visibility
A BIMI record requires authentication control and infrastructure visibility because Gmail continuously evaluates DMARC enforcement, domain alignment, and sender reputation before displaying your logo.
If enforcement weakens, alignment shifts, or sender trust drops, the logo can disappear without notice.
1. DMARC enforcement must be continuously validated
DMARC enforcement can drift over time. Subdomains get introduced. Sending paths change. Temporary troubleshooting settings remain in place.
Common risks include:
- Subdomains sending without an enforced policy
- Monitoring mode (p=none) accidentally restored
- Relaxed alignment introduced during testing
- Enforcement applied to a different domain than the active sender
If enforcement weakens, BIMI display stops.
For teams managing authentication in Salesforce, understanding how policies are structured is critical. If you are reviewing the enforcement setup, this guide onSalesforce email authentication explains how authentication works at the domain level inside Salesforce.
2. Sender infrastructure impacts domain alignment
BIMI depends on how your domain actually sends email.
Infrastructure changes that affect trust are:
- Switching between shared and dedicated IPs
- Adding new relays
- Sudden volume spikes
- Sending from multiple subdomains
Even when SPF and DKIM technically pass, unstable infrastructure lowers trust over time. Gmail evaluates sending consistency, not just technical validation.
If you are using relays or routing through Salesforce, review howemail relay in Salesforce affects alignment and reputation. Routing decisions directly impact how inbox providers score your domain.
This is where infrastructure visibility becomes essential. Without it, alignment issues surface only after BIMI stops working.
3. Authentication health affects logo visibility in Gmail
Gmail looks beyond authentication records. It evaluates the sender's reputation continuously.
Signals that influence BIMI display:
- Spam complaint rates
- Engagement consistency
- Bounce patterns
- Historical sending behavior
A BIMI record can validate today and fail later if domain reputation declines.
For teams tracking domain performance, reviewing yourSalesforce email sender reputation helps identify early warning signs before logo suppression occurs.
Why a BIMI record is not a one-time DNS configuration
A BIMI record is not a static setup. It depends on sustained sender trust.
| One-Time Action | Ongoing Control Required |
| Publish TXT record | Maintain enforced DMARC |
| Upload SVG logo | Protect domain reputation |
| Obtain VMC | Keep alignment stable |
| Validate once | Monitor authentication continuously |
Teams that treat BIMI as a checkbox often see it fail months later.
For Salesforce teams evaluating implementation, the real decision is this:
Do you have visibility into authentication stability and sending infrastructure, or are you relying on DNS alone?
That distinction determines whether BIMI remains visible at scale.
In the next section, we’ll look at how to implement and manage a BIMI record inside Salesforce using a controlled, Salesforce-native approach like MassMailer.
How to Implement and Manage a BIMI Record in Salesforce Using MassMailer
To implement and manage a BIMI record in Salesforce, you must enforce DMARC, maintain strict domain alignment, control your sending infrastructure, and monitor sender trust continuously. MassMailer enables this level of control directly within Salesforce, so BIMI activation does not introduce delivery risk.
Salesforce can send authenticated emails. However, BIMI requires consistency under scale. That is where implementation depth matters.
Step 1: Authenticate and align your sending domain before publishing the BIMI DNS entry
Before creating a BIMI TXT record, your sending domain must pass strict alignment checks.
Inside MassMailer, you:
- Add and verify your sending domain.
- Generate and publish DKIM keys.
- Confirm SPF authorization reflects the actual sending path.
- Ensure the visible “From” address matches the authenticated domain.
- Validate domain behavior under real campaign conditions.
MassMailer centralizes authentication control and strengthensemail authentication so domain signing remains consistent. It also enforces correctSPF record alignment to prevent trust degradation.
Do not publish a logo authentication record until alignment remains stable during production sends.
Step 2: Enforce DMARC only after validation
A BIMI implementation requires DMARC set to p=quarantine or p=reject. However, enforcing policy prematurely can block legitimate traffic.
MassMailer supports controlled enforcement by allowing you to:
- Validate alignment across campaigns before policy changes.
- Confirm automated flows use the same authenticated domain.
- Monitor bounce behavior during staged sends.
- Identify inconsistencies before switching to enforcement.
This structured approach aligns with properSalesforce email limits management and reduces risk when activating stricter policies.
Enforcement must follow verification. Otherwise, you trade BIMI activation for deliverability loss.
Step 3: Publish the BIMI TXT record with verified enforcement
Once authentication and DMARC enforcement are stable, publish your BIMI TXT record.
In DNS:
- Create the record under default._bimi.yourdomain.com.
- Use the correct v=BIMI1 format.
- Reference your HTTPS-hosted SVG logo.
- Include your Verified Mark Certificate (VMC) location if applicable.
Because MassMailer ensures alignment before this stage, you publish the brand logo record, knowing Gmail can validate your domain properly.
Publishing before enforcement stability is confirmed is the most common reason BIMI fails.
Step 4: Protect IP reputation before scaling campaigns
After activation, campaign volume becomes the next risk factor.
As you increase send volume:
- Complaint visibility increases.
- Reputation scoring becomes stricter.
- Alignment gaps surface under load.
MassMailer isolates domain reputation and aligns with a disciplinedemail deliverability IP strategy to protect inbox trust. It also strengthensmass email campaign execution by tying volume control to authenticated sending.
Do not scale campaigns immediately after activating your BIMI record. Validate reputation stability first.
Step 5: Monitor sender trust continuously to keep your logo visible
Gmail evaluates sender reputation continuously. If complaints rise or alignment weakens, logo visibility may stop without notice.
To maintain your Brand Indicators setup:
- Track complaint rates tied to high-volume sends.
- Monitor bounce spikes after enforcement changes.
- Avoid sudden increases in frequency.
- Maintain consistent domain usage across automation.
MassMailer reinforcesemail deliverability best practices and helps prevent patterns that lead toemails going to spam suppression.
BIMI visibility depends on sustained sender trust, not initial validation.
Activation checklist before relying on BIMI for brand credibility
Before you depend on your BIMI record for brand visibility, confirm:
- Your sending IP reputation is isolated and stable.
- Authentication alignment remains consistent under real campaign load.
- DMARC enforcement has been validated across subdomains.
- Complaint and bounce trends are monitored continuously.
- Automation workflows do not introduce alignment drift.
If any of these depend on manual checks, your logo authentication record remains fragile.
MassMailer transforms BIMI from a static DNS configuration into a controlled implementation layer. That control determines whether your logo appears consistently or disappears silently.
How to Evaluate BIMI Record Readiness Before Scaling Salesforce Campaigns
You evaluate BIMI record readiness by confirming that authentication remains aligned, DMARC enforcement is stable, IP reputation is protected, and sender trust holds under real campaign volume. If any of these weaken during scale, Gmail can suppress your logo even though the BIMI DNS record is technically correct.
Before increasing volume, validate the following:
- Your DKIM signature matches the exact domain shown in the “From” address across all campaign types.
- Your SPF authorization reflects the real sending path and does not rely on secondary relays that alter alignment.
- You enforce your DMARC policy at
p=quarantineorp=rejectand apply it to the active sending domain. - Your largest recent campaign maintained stable complaint and bounce rates.
- Your sending IP reputation remains isolated and does not depend on shared infrastructure behavior.
- Your automation flows, alerts, and bulk sends use the same authenticated domain without exception.
- Your recent campaigns did not trigger spam placement spikes or blacklist warnings.
- Your domain reputation has remained stable over the past 30–60 days under consistent volume.
- Your sending limits align with operational capacity and do not create sudden volume bursts.
- Your enforcement policy changes were validated before activation, not after deliverability declined.
If you cannot confidently answer “yes” to each point, your BIMI record may activate initially but fail after scaling.
MassMailer simplifies this evaluation by centralizing authentication, infrastructure control, and campaign visibility in one environment. You validate domain behavior directly, where you execute campaigns instead of checking alignment across disconnected tools. That reduces enforcement risk and protects sender trust during growth.
Conclusion
If you plan to scale campaigns with an active BIMI record, you must control authentication, enforcement, and reputation before volume increases. Otherwise, Gmail will suppress your logo without warning.
Publishing a BIMI TXT record is simple. Sustaining logo visibility under pressure is not.
If your current setup relies on manual checks or shared infrastructure, you are scaling risk along with volume. Instead, centralize alignment, protect IP reputation, and validate enforcement before growth.
MassMailer gives you that control.
If you are serious about protecting brand credibility at scale, book a MassMailer demo. See exactly how your authentication and infrastructure hold up before you enforce DMARC and increase volume.
Frequently Asked Questions
1. Can a BIMI record work without a dedicated IP?
2. How long does it take for Gmail to display a BIMI logo?
3. Can BIMI stop working after it is activated?
4. Does Salesforce native email fully support BIMI requirements?
5. Is a Verified Mark Certificate (VMC) mandatory for Gmail?
6. What is the biggest risk when scaling after publishing a BIMI record?
Start Your Free Trial Today
Experience MassMailer the easiest way to send personalized emails from Salesforce.
Related Blogs
Salesforce SPF Record: Setup, Recommended Value, and Common Errors
Salesforce Email Encryption: How It Works, Setup & Limitations
MassMailer Resources
MassMailer Glossary