Please enable JavaScript to view this site.

This submenu is called up from Domain Certificates.

 

Sections on this page:

Domain encryption usage

Filter manual S/MIME domains

Manual S/MIME domain certificates

 

 

anchor link Section Domain encryption usage

 

Note on the functioning of the Domain encryption.

 

 

anchor link Section Filter manual S/MIME domains

 

Clicking on Filter... checks whether there is a manual entry for domain encryption via S/MIME for the entered email domain.

The search term is entered as a character string.

 

 

anchor link Section Managed S/MIME domain certificates

 

Displays the certificates of all email domains to which domain encryption is performed using S/MIME. These domains should know the S/MIME of the email domain (s) managed by this SEPPmail Secure E-Mail Gateway. The keys for these internally by SEPPmail Secure E-Mail Gateway managed email domains can be found under Mail System Managed Domains ADD/EDIT MANAGED DOMAIN in the Section S/MIME domain encryption. The public key for these domains can be, depending on the GINA configuration, securely downloaded by the communication partner via the GINA portal as well (see GINA Domains Domains CHANGE GINA SETTINGS FOR Extended settings Certificate search and management in GINA).

 

empty

anchor link Note:

The used S/MIME encryption algorithm (AESxxx/3DES) depends on the setting Mail Processing Ruleset generator Encryption/Decryption Outgoing e-mails Use default cipher for S/MIME encryption.

 

Column

Description

anchor link Mail domain

Displays the email address (RFC822 name) of the key owner.

anchor link Email address

(Pseudo) email address for Domain encryption.

anchor link Serial number

Serial number of the certificate.

anchor link Issued on

Issue date of the certificate in the form YYYY-MM-DD

anchor link Expires on

Expiration date of the certificate in the form YYYY-MM-DD

anchor link Active

Indicates whether domain encryption to the specified destination is active.

 

The Import S/MIME certificate... button can be used to integrate certificates of additional communication partners (email domains). Since the certificates are usually exchanged directly by the administrators, self-signed certificates are normally sufficient here. To exclude error sources, however, it should be ensured that the domain certificates comply with the RFC 3183 (https://tools.ietf.org/html/rfc3183).

 

empty

anchor link Attention:

The domain encryption with a target domain can only be set up with one procedure, S/MIME or OpenPGP!

If it is still attempted to import another key for the same target domain, this would be acknowledged with an error:

OpenPGP key already exists for domain ... 

.

 

empty

anchor link Note:

If email domains intended for Domain encryption are and/or will be entered with a leading full stop "." during import, the encryption also applies to all related subdomains.

This means a key entered with ".mycompany.tld" would also be valid for e.g. "ch.mycompany.tld", "de.mycompany.tld" and so on.

  

Keyboard Navigation

F7 for caret browsing
Hold ALT and press letter

This Info: ALT+q
Topic Header: ALT+t
Topic Body: ALT+b
Contents: ALT+c
Search: ALT+s
Exit Menu/Up: ESC