sendvia uses your own Amazon SES account to send emails. This gives you full control over your sending reputation, costs, and limits. This guide walks you through creating an AWS account, setting up the necessary IAM permissions, and connecting it to sendvia.
If you don't have an AWS account, go to aws.amazon.com and click Create an AWS Account. You'll need a credit card and a phone number for verification.
New AWS accounts start in the SES sandbox, which limits sending to verified email addresses only. You'll request production access in step 6.
Amazon SES is available in several regions. Choose the one closest to your users or your servers. Common choices:
You'll enter this region when adding a domain in sendvia. Pick one and stick with it — your domain verification and access keys are region-specific.
It's best practice to create a dedicated IAM user for sendvia rather than using your root account credentials.
sendvia-senderOn the permissions screen, choose Attach policies directly. You need to attach two AWS managed policies:
AmazonSESFullAccess and select it — grants permission to send email, manage identities, and create configuration sets.AmazonSNSFullAccess and select it — required so sendvia can automatically create an SNS topic to receive delivery, bounce, and complaint notifications from SES.Click Next, review, then click Create user.
Once the user is created, go to IAM → Users → your user → Security credentials → Create access key.
New AWS accounts are placed in the SES sandbox. In sandbox mode you can only send to email addresses you have individually verified — not suitable for production use.
To request production access:
Once you have your access key ID, secret access key, and chosen region, you're ready to add a sending domain in sendvia.
yourdomain.com), your AWS access key, secret key, and regionOnce verified, you can start sending immediately using the API. Grab your API key from Account settings.
DKIM, SPF and a basic DMARC record get you sending, but tightening your DMARC policy and adding BIMI significantly improves inbox placement and brand visibility.
DMARC enforcement
The initial DMARC record uses p=none, which monitors authentication failures without taking action. Once you've confirmed legitimate mail is passing (review the aggregate reports sent to your rua address), upgrade your policy in stages:
p=quarantine — failing emails go to spam instead of the inboxp=reject — failing emails are blocked entirely (strongest protection)Update your _dmarc TXT record by changing p=none to p=quarantine (and later p=reject). This protects your domain from spoofing and tells mailbox providers you take authentication seriously — directly improving deliverability.
BIMI — Brand Indicators for Message Identification
BIMI displays your brand logo next to your emails in supporting inboxes — including Apple Mail, Yahoo Mail, and Gmail. It builds trust with recipients and increases open rates.
Requirements:
p=quarantine or p=reject (enforcement is mandatory)Add this TXT record to your DNS:
Replace yourdomain.com with your actual domain and the l= URL with the full path to your SVG logo.
Gmail & VMC: Gmail requires a Verified Mark Certificate (VMC) in addition to the BIMI record. A VMC is a digital certificate that verifies your logo ownership, issued by certificate authorities like DigiCert or Entrust. The certificate URL goes in the a= field of your BIMI record. Other mail clients (Apple Mail, Yahoo) display BIMI logos without a VMC.
Questions? Contact support and we'll help you get set up.