Please enable JavaScript to view this site.

This sub-menu is called up from Users.

 

Sections on this page:

User Data

Group membership

Extended fields

S/MIME

OpenPGP

Remote POP3

Customer

 

 

anchor link User Data

 

Parameters

Description

anchor link User ID

Displays the unique "User ID" of the respective user.

For automatically created users, this always corresponds to the email address. The "User ID" cannot be changed for existing users as it is the user's unique identification characteristic.

 

empty

anchor link Note:

If users with identical User ID have already been created before the update to version 11.1, the login to the administration interface via the User ID is no longer possible. Alternatively, they can login by entering the email instead of the User ID in the Login.

To clear duplicate User IDs, please contact the support team (see Support).

anchor link Full name

Displays the name of the respective user.

For automatically created users, this corresponds to the display name of the sender from the From header, if available. Otherwise, the email address is also used here.

 

empty

anchor link Note:

If certificates are obtained automatically via MPKI in which not only the email address but also the user name is confirmed, it is mandatory to enter a name here (no email address).

anchor link Email

Displays the email address of the user. This cannot be changed for existing users as it is the user's unique identification characteristic.

anchor link Password

Optionally, a password can be assigned to a user here.

The password must meet the password rules (see submenu CHANGE PASSWORD POLICY).

 

empty

anchor link Note:

It is not necessary to assign a password to use the appliance. By assigning a password, a user is enabled to interactively log in at the appliance - meaning to the administration interface. For this purpose, the respective user must also be assigned to the corresponding groups (see Groups).

anchor link MFA Settings

(new in 13.0.16)

If the user is in a group that requires MFA / 2-factor authorization (see Advanced Settings), this can be switched off here by checking Disable MFA requirement .

 

Clicking the Reset MFA Initialization button means that the user can perform the next login without an MFA token and then must go through the MFA initialisation process again.

anchor link MFA QR Code
(new in 13.0.16)

During MFA initialisation:

Scan the QR code with your favourite authenticator app.

anchor link MFA Setup Confirmation
(new in 13.0.16)

During MFA initialisation:

Enter the confirmation code from the Authenticator app to complete the MFA setup.

anchor link GINA domain

(new in 14.0.0)

Here the LFT use for this user in the GINA domain can be specified. If not specified, the default values are inherited.

 

anchor link User LFT quota in MB (must not be bigger than global quota of x)

Allows specifying a user LFT quota.

 

anchor link User is allowed to use LFT

Allows specifying if the user may use LFT. Possible values are "true", "false" and "reset to default values".

anchor link Encryption settings

Specifies the permissions for cryptographic actions of the respective user.

 

empty

anchor link Note:

If both options are selected, no user licence is claimed for the user. This is useful, for example, for technical users who do not send emails to the Internet (for example backup users).

Furthermore, inactive users do not have to be deleted. This has the advantage that their key material is retained on the appliance. In addition, received emails may continue to be decrypted. However, it must be ensured that the recommended number of users (see Sizing) is not significantly exceeded.

 

anchor link CheckBoxInactive May not encrypt mails

By default, this option is inactive.

Prohibits the user from encrypting emails. However, if "Encrypt" is requested due to the ruleset settings - irrespective of whether this is done automatically or via a trigger (see also Mail Processing Ruleset generator Encryption Outgoing e-mails and/or ENCRYPTION POLICY), the email is bounced.

Activating both options sets the user to inactive which releases the Signature And Encryption license.

anchor link CheckBoxInactive May not sign mails

By default, this option is inactive.

Prohibits the user from signing emails. However, if "Signing" is requested due to the ruleset settings - irrespective of whether this is done automatically or via a trigger (see also Mail Processing Ruleset generator Signing Outgoing e-mails and/or ENCRYPTION POLICY), the email is bounced.

anchor link MPKI subject part

This field has the same syntax as the MPKI settings of the selected CA, if applicable. If an optional entry differs from the MPKI settings, the entry in the MPKI settings will be overwritten by it when generating a certificate.

 

empty

anchor link Attention:

Not every CA and/or MPKI setting allows changes to the static subject part. If changes are nevertheless made here, no certificates will be issued for this user via the MPKI.

If changes are permitted, the CA may still expect a specified (partial) expression in the static subject part when issuing a certificate. If this part is missing in the individual settings, no certificate will be issued via the MPKI.

anchor link Notifications DropDown

Individual settings for issuing the GINA read confirmations.

 

Send a notification when recipient reads GINA mail:

 

empty

anchor link Note:

If a read confirmation was requested in the email client (disposition-notification-to header), the reliable GINA read confirmation is issued in any case, regardless of the settings made.

anchor link domain default

Default setting.

In the update, the setting from GINA Domains Domains CHANGE GINA SETTINGS FOR Extended settings Sender receives notification when recipient reads GINA mails) is used.

anchor link always

Enforces issuing a read confirmation for every GINA email.

anchor link never

Suppresses the issue of a read confirmation for GINA emails.

anchor link Account status

If an account is explicitly locked via this menu, this lock is to be removed manually again, if applicable. Automatic locks are removed via setting (CHANGE PASSWORD POLICY).

 

anchor link RadioButtonInactive locked

Shows whether the user is locked (for example, after multiple incorrect entries of the password) or whether the administrator can lock the user by activating the button.

 

empty

anchor link Note:

Locked users are also prevented from authenticating themselves via SMTP-Auth, POP or IMAP (see Remote POP3).

anchor link RadioButtonActive enabled

Shows whether the user is active or whether the administrator can return the user to the active status by activating the button "Active".

anchor link Creation data

(new in 12.1)

Shows information on how a user was created.

 

anchor link Created by whom

Shows by whom the user was created.

anchor link Created by what

Shows which process created the user.

 

hmtoggle_arrow0possible status
createuser.pl (per command line) import users at admin GUI (per bulk import via administration interface) LDIF import at admin GUI (per restore of backup via administration interface) new user at admin GUI (via administration interface) restApi.app (remote via API) RuleEngine (automatically via ruleset processing) web.app (per GINA self registration or external authentication)

anchor link Created at

Shows the time the user was created

anchor link Usage statistics

Displays the user's usage statistics.

anchor link Last outgoing e-mail

Time of the last outgoing email

anchor link S/MIME encrypted e-mails sent

Number of emails sent that were encrypted using S/MIME technology.

anchor link S/MIME encrypted e-mails received

Number of emails received that were encrypted using S/MIME technology

anchor link OpenPGP encrypted e-mails sent

Number of emails sent that were encrypted using OpenPGP technology.

anchor link OpenPGP encrypted e-mails received

Number of emails received that were encrypted using OpenPGP technology.

anchor link S/MIME Domain encrypted mails sent

Number of emails sent that were domain-encrypted using S/MIME technology.

anchor link S/MIME Domain encrypted mails received

Number of emails received that were domain-encrypted using S/MIME technology.

anchor link OpenPGP Domain encrypted mails sent

Number of emails sent that were domain-encrypted using OpenPGP technology.

anchor link OpenPGP Domain encrypted mails received

Number of emails received that were domain-encrypted using OpenPGP technology.

anchor link S/MIME signed e-mails sent

Number of emails sent that were signed by means of the S/MIME technology

anchor link S/MIME signed e-mails received

Number of emails received that were signed using S/MIME technology.

anchor link GINA encrypted e-mails sent

Number of emails that were encrypted using the GINA technology

 

 

anchor link Group membership

 

In this section, the group memberships of the user are displayed (see also Groups).

 

 

anchor link Extended fields

(new in 13.0.0)

 

See Mail Processing Extended Fields.

 

Active

Name

Value

Type

Displays whether the "Extended Field" is in status

"Active" green checkmark

or

"Inactive" red circle

and therefore ready to use or not.

Displays the name of the respective "Extended Fields" as set up under Mail Processing Extended Fields Extended Fields Name.

Displays the value of the respective "Extended Fields". If this corresponds to the one under Mail Processing Extended Fields Extended Fields Default value, then behind the entry field

default value

is displayed, otherwise

domain specific value

Displays the Type of the respective "Extended Fields" as entered under Mail Processing Extended Fields Extended Fields.

 

 

anchor link S/MIME

 

Serial

Certificate authority

Issued on

Expires on

Displays the serial numbers of the certificates.

Displays the issuing certification authority

Date of issue of the key

YYYY-MM-DD

Expiration date of the key

YYYY-MM-DD

 

By clicking on the Serial number, the submenu X.509 CERTIFICATE 'Details' is opened. This provides the option to download the public key (certificate) or to revoke or delete the key pair.

 

Click the Import S/MIME key and certificate... to import an already existing certificate, for example a purchased certificate of a trusted CA (see Mail System ADD/EDIT MANAGED DOMAIN S/MIME domain encryption IMPORT PKCS#12 CERTIFICATE STRUCTURE).

 

empty

anchor link Note:

Only valid keys can be imported.

 

By clicking the Generate S/MIME key and certificate... button, a new key pair is generated on the appliance by the integrated certification authority.

 

If a MPKI has been set up and the Managed domain to which the user belongs has been admitted for obtaining certificates (see MPKI Connectors MPKI managed domains), the button Generate key and <MPKI> certificate... appears in accordance with the corresponding available certification authority. Clicking this button generates a key pair. The public key is signed by the MPKI and is thus available as a trusted certificate.

If this option is activated, possibly expiring user certificates are automatically renewed as soon as their remaining validity period falls below the specified number of days.

 

empty

anchor link Attention:

If no MPKI is used and the certificates and keys are managed manually, it must be ensured that new certificates are always issued on the basis of a new private key.

If the old private key is used, the existing, possibly expired certificates may be overwritten during import. Incoming mails encrypted with this old key can then no longer be decrypted.

 

empty

anchor link Note:

The validity period of the certificate with the longest validity can be found in the file user-stats.csv which comes with the Daily Report (see also Groups statisticsadmin).

This is particularly helpful if no MPKI has been set up for the automatic renewal of certificates.

 

 

anchor link OpenPGP

 

In this section, the OpenPGP keys of the user are displayed, if available.

 

Key ID

Subkey ID(s)

(new in 12.1)

User ID

Issued on

Expires on

Displays the key IDs of the existing OpenPGP keys.

Displays the key IDs of all existing subkeys.

Displays the user ID associated with the key ID. This corresponds to the email address of the user.

Date of issue of the key

YYYY-MM-DD

Expiration date of the key

YYYY-MM-DD

 

By clicking on the Key ID, a submenu with details on the key will be opened. This offers the option of downloading the public key and/or deleting the key pair.

 

By clicking the Import OpenPGP key pairs button an already existing key pair can be imported (see submenu Mail System ADD/EDIT MANAGED DOMAIN OpenPGP Domain Encryption IMPORT OPENPGP KEY).

 

Clicking the Generate new OpenPGP key pair... button offers the possibility to generate a new key pair on the appliance. The validity period as well as the automatic update of the generated key correspond to the value entered under CA Settings Validity in days.

 

By clicking on the Key ID, a submenu with details on the key will be opened. This offers the option of downloading the public key and/or deleting the key pair.

 

 

anchor link Remote POP3

 

If under Mail System Managed Domains, the option Fetch e-mail from remote POP3 server has been selected, the POP3 and/or IMAP access data for the corresponding user can be entered here. The SEPPmail Secure E-Mail Gateway will pull emails according to the set time interval (see above). Here, IMAPS and/or STLS (POP3S) is preferred.

 

Parameters

Description

anchor link User ID

Input of the user ID for logging into the POP3/IMAP account and/or for SMTP-Auth. As a rule, the user ID corresponds to the email address.

anchor link Password

Password belonging to the user ID.

anchor link Mail server

POP3 or IMAP server from which emails are to be retrieved.

anchor link Options


 

anchor link CheckBoxInactive Use SSL instead of STARTTLS

By default, this option is inactive.

If SSL is to be used instead of STARTTLS for establishing a secure connection (IMAPS/STLS), this option is to be activated.

 

 

anchor link Customer

 

This section only appears for client-capable systems (see menu item Customer).

It enables the user to be assigned to a client.

 

empty

anchor link Note:

The assignment of users to the respective clients is normally done automatically on the basis of the domain part of the email address. Therefore, manual changes should normally not be performed.

 

All changes made are saved via the Save changes button.

 

A user can be deleted with Delete user.

 

empty

anchor link Note:

If valid key material is assigned to a user, it must be deleted before the user is deleted. Otherwise, a warning message appears.

  

Keyboard Navigation

F7 for caret browsing
Hold ALT and press letter

This Info: ALT+q
Topic Header: ALT+t
Topic Body: ALT+b
Contents: ALT+c
Search: ALT+s
Exit Menu/Up: ESC