How to create a BIMI-supported SVG Logo file

BIMI (Brand Indicators for Message Identification) is a standard that displays validated trademarked logos for all DMARC authenticated emails. Before the logo can be displayed in the inbox, it must meet a number of specific requirements.

BIMI only supports Scaleable Vector Graphic Tiny Portable/Secure 1.2 format (SVG Tiny-PS 1.2). This specific SVG format was chosen by the BIMI Working Group as it is highly secure and lesser prone to potential malware or tracking-related vulnerabilities. Compared with popular bitmap formats like GIF, JPG, and PNG, the vector graphics are made out of lines and curves that can be scaled infinitely without loss of detail. SVG is often smaller in file size, loads quicker, and adapts to responsive sizing.

How to prepare your SVG file ready for BIMI

Using the SVG editor of your choice (we’ve used Adobe Illustrator for demonstration purposes), you can prepare your SVG file for export by following these simple steps:

    1. Inspect the objects within the “Layers” panel to make sure there are no bitmaps, linked files, texts or groups.

2. If your logo is image-based (contains embedded JPG or PNG files), the best option is to ask the designer of the logo to modify the file so that it is a fully vector-based file. If not, you can use the Trace Image button to convert your image into a graphic.

3. SVG files should not contain text objects, which appear in the “Layers” panel as “Type”. To meet the requirements, select your text layer and select the “Create Outlines” option from the “Type” menu.

    4. Finally, you’ll need to ungroup all groups to make sure exporting the SVG is a smooth process. Select all objects from your “Layers” panel using Ctrl+A and select the “Ungroup” option in the “Object” menu. You may have to repeat this process until all groups in the document are ungrouped.

Top tips for a better-displayed BIMI logo

  1. Images are best with a square aspect ratio (1:1).
  2. The image should be centered so that it displays optimally in a square, a rounded square, or a circle.
  3. Non-transparent backgrounds are best, as rendering of transparency can be unpredictable.

Exporting as a SVG Tiny-PS 1.2 file

Since a BIMI SVG logo must use square dimensions with a 1:1 aspect ratio, the height/width of the SVG image must be the same. To achieve this, you can “Edit Artboards” within Adobe Illustrator.

When you are ready to save your file, click ‘File > Save As’. This will bring up a dialog box, where you can name your file. Make sure the file format is set as SVG and not SVG compressed.

Once clicked, an SVG dialogue box will popup entitled “SVG Options”. In the “SVG Profiles” dropdown, select “SVG Tiny 1.2” and ensure the “Image Location” is set to “Preserve”. Finally, click on the “SVG Code” button to review the code, which opens up in a file editor. Make sure that the file contains version=”1.2” and baseProfile=” tiny”. There should be no base64, meaning Adobe Illustrator was able to create a vector-only version of your logo.

Editing the code within a Text Editor

Next, you’ll need to open your SVG file in a text editor (e.g., Notepad or Notepad++), or a code editor like Sublime Text, Visual Studio Code, or similar. Complete the following steps to clean up the code:

  1. First you need to find the baseProfile=”tiny” and replace it with baseProfile=”tiny-ps”.
  2. Next, find the x=”0px” y=”0px” from the line starting with <svg as seen on the image. The same element also often contains overflow=”visible” attribute that needs to be removed as it is not supported by BIMI SVG standard.
  3. Then, you need to add the required <title> tag into your SVG below the <svg …>. The purpose of the title is to provide accessibility so that it reflects your brand.
  4. Finally, Save the file.

Uploading your SVG logo to OnDMARC

OnDMARC and Entrust – your one-stop shop for implementing BIMI

We have partnered with Entrust, one of two Google-approved certification authorities, to provide the only integrated BIMI and VMC integration available on the market. This is a game-changer for users who now don’t have to navigate different platforms and providers to reach the right DMARC policy and apply for a Verified Mark Certificate in order to be BIMI-ready. By using OnDMARC, users are able to successfully take care of both these actions from a single pane of glass, with full support from industry specialists included. 

If you’re looking for a market-leading, integrated BIMI and VMC solution, with full support from DMARC implementation through to logo advice and submission, contact us to book a consultation today.

Additional resources

PUBLISHED BY

Harry Stephens

11 Nov. 2021

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
News

Red Sift Recognized on Deloitte’s EMEA Fast 500™ List

Francesca Rünger-Field

We’re thrilled to share that Red Sift has been included in Deloitte’s 2023 EMEA Fast 500 list. This recognition stems from 389% revenue growth over three years, $54 million in Series B funding, acquiring ASM innovator Hardenize, and introducing the Red Sift Pulse Platform. Read the press release here. About the award The Deloitte Technology Fast…

Read more
Brand Protection

The vital role of cybersecurity for Nonprofits: A deep dive 

Sean Costigan

Save the Children, a beacon of hope and change, has been dedicated to improving the lives of children for over a century. Founded in London, it now has a presence in 29 nations, employing 844 staff members in the UK alone and engaging over 3600 formal volunteers. As charities and nonprofits like Save the…

Read more
News

Red Sift brings DMARC data to the SOC with new Cisco XDR…

Rebecca Warren

Today, we’re thrilled to announce that we’re extending our partnership by joining the Cisco Security Technical Alliance and integrating Red Sift OnDMARC with Cisco XDR. This integration builds on the Domain Protection partnership we announced in November 2023 to bring visibility of business email compromise into the SOC (security operations center). At release, Red…

Read more
Certificates

Preventing certificate related violations in cybersecurity frameworks:  A guide to certificate monitoring…

Rebecca Warren

TLS is one of the most widely adopted security protocols in the world allowing for unprecedented levels of commerce across the internet.  At the core of the TLS protocol is TLS certificates. Organizations must deploy TLS certificates and corresponding private keys to their systems to provide them with unique identities that can be reliably…

Read more