Please enable JavaScript to view this site.

This submenu is called up from Mail System Managed domains by clicking on a Domain name to be edited and/or via Add managed domain... for the creation of a new Managed domain.

(new in 13.0.0)

Clicking the Edit mailprocessing groups... opens the submenu List mailprocessing groups, which enables a more granular configuration of individual options for certain user groups.

 

Sections on this page:

Settings

Bounce templates

External authentication

Internal authentication

OpenPGP Domain Encryption

S/MIME domain encryption

Internal Mail Encryption

DKIM Settings

ARC Settings

TLS Settings

Extended fields

Domain Statistics

 

 

anchor link Section Settings

 

Parameters

Description

anchor link Domain name

Name of the email domain for which emails are to be accepted and processed by the SEPPmail Secure E-Mail Gateway.

This setting is only editable when creating a new Managed domain - that is when the menu was opened via the Add managed domain... button (see ADD MANAGED DOMAIN Settings).

anchor link Forwarding server

Name of the email server to which the incoming emails for the above-mentioned Domain name are to be forwarded after processing by the SEPPmail Secure E-Mail Gateway .

 

The following is accepted as input:

 

IP address

Individual IP address (to be placed in square brackets []).

Hostname

If a hostname is used, it must be placed in square brackets []. Names without brackets are treated as an MX record!

MX-Name

MX-lookup is executed (if applicable, please also refer to System DNS add local zone)

 

When specifying an IP address, a host name or an MX name, there is the option to additionally enter an individual port. The port is entered directly afterwards, separated by a colon ":", that is "[IP address]:port", "[hostname]:port" or "MX name:port".

If no port is specified, the standard SMTP port TCP25 is used.

anchor link Header Check

Under Mails from this domain must have a header, an X header can be indicated, whose expected value is entered under with the following value:.

If an attempt is now made to send an email from the current Managed domain, it must contain the X header specified here with the corresponding value (case sensitive!). Otherwise, the email will be rejected.

The corresponding X header is removed after testing.

anchor link Exchange Online Integration

 

empty

anchor link Attention:

In pure Exchange Online infrastructures, it is imperative to ensure that the SEPPmail Secure E-Mail Gateway can only be reached by the Exchange Online Relaying IPs via port 25. If the SEPPmail Secure E-Mail Gateway is hosted in MS Azure, this can be realised via the filters of the virtual machine (if applicable, see also second warning under Exchange Online Configuration).
In mixed infrastructures without corresponding upstream protection components, at least one entry must be made under Allowed sending servers for this domain (leave empty to allow all relaying networks). Note: Entering an address here does not automatically allow relaying must be available. This can also contain a non-existent pseudo IP address.

 

empty

anchor link Note:

As of 31 August 2022, Microsoft will gradually stop sending the Tenant ID as an X header in the emails.

Thus, the Tenant ID can no longer be used to check the identity of the sender domain.

 

(changed in 12.1.16)

By entering the Microsoft 365 Tenant ID (see also Search for your Microsoft 365 Tenant ID) the relaying from Microsoft 365 (see Exchange Online Relaying) for the respective Managed domain is limited to the specific Microsoft 365 tenant.

 

 

Note:

If the input field is empty and there was nevertheless an email sent from one of the networks listed under Exchange Online Relaying with a sender email address of the respective Managed domain , the Microsoft 365 Tenant ID of the sender is output, for example

(HINT: Tenant ID detected in mail flow is XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX)

 

 

(new in 12.1.6)

anchor link List of allowed exchange online originator organisations (comma seperated list)

To check the identity of the sender domain, the header

X-OriginatorOrg

set by Microsoft 365 is used.

By comparing the header value with the respective SEPPmail Managed domain, the relaying from Microsoft 365 (see Exchange Online Relaying) for the respective Managed domain is limited to the specific Microsoft 365 tenant.

Any further alias domains can alternatively be maintained manually.

 

empty

anchor link Attention:

(changed in 12.1.18)

The input is case sensitive.

The input here is not case sensitive.

(changed in 12.1.16)

anchor link Exchange online tenant ID (informational only)

A Microsoft 365 Tenant ID displayed here (see also Search for your Microsoft 365 Tenant ID) is only for information.

 

(new in 13.0.15)

anchor link Domain is parallel connected

For a parallel connection with Exchange Online ("Forwarding Server" corresponds to "Send ALL outgoing mails from this domain to the following SMTP server (optional)" (see also Connecting Exchange Online with ATP / EOP), this option must be set. Otherwise, the direction of the mail may not be recognised correctly.

 

anchor link Password and certificate authentication

(new in 12.1.1)

If the Submission Port has been activated, by default, for a User signed in via STARTTLS, only emails can be delivered that originate from their own SMTP email address.
 

However, if, for example, an external email server is to send all or part of its email traffic via a connector that connects via STARTTLS with the SEPPmail Secure E-Mail Gateway, this can be done using the following two options.

Usually, first a dedicated User for the connection has to be created.


anchor link Allow relaying for this domain for authenticated users whose mail address matches the following regular expression:

Entry of a regular expression that represents all email addresses that are allowed to use the above connection.

anchor link Allow relaying for this domain for users whose certificate cn matches the following regular expression (submission port only):

Specification of the CN (Common Name) in the applicant of the certificate used when establishing the connection.

anchor link Allowed sending servers for this domain

(leave empty to allow all relaying networks, unless an originator org is specified above)

At this point, the IP address(es) or subnet(es) that are allowed to send on behalf of the respective Managed domain can be entered. This prevents, for example, that a client can send emails in the name of another in client-capable systems. If no entry is made here, any address listed under Mail System Relaying is allowed to send emails from this Managed domain.

Usually, the input corresponds to the IP address(es) of the entered Forwarding server (see table under Mail System Managed domains Column Server IP Address).

(changed in 13.0.8)

It is possible to enter the network 0.0.0.0/0 as the relaying network to enable the sending of e-mails from an external web server, for example. Please use with care.

 

empty

anchor link Note:

(changed in 13.0.0)

This entry does not overrule the entries made under Mail System Relaying but merely restricts them for each Managed domain !

Thus, the IP addresses entered here must be additionally available under Mail System Relaying.

Entries made here directly enable relaying via the respective Managed domain. An additional entry in the global Relaying of the higher-level menu Mail System is not required.

 

After saving, a further input field is displayed.

 

empty

anchor link Note:

If an email is rejected due to this setting, the following message appears in the log (see Logs Mail log):

IP xxx.xxx.xxx.xxx is not allowed to send mails for domain <YourCompany.tld>

Relaying denied due to allowed domain settings in Managed domain

Message Rejected. (550 Mail not accepted)

 

empty

anchor link Attention:

In client-capable environments, an entry is mandatory (see also Securing the SEPPmail Secure E-Mail Gateway)!

anchor link Send ALL outgoing mails from this domain to the following SMTP server (optional)

By entering a target server (input format identical to Mail System Managed domain ADD/EDIT MANAGED DOMAIN Settings Forwarding server IP or MX name), for the respective Managed domain the Outgoing server (see Mail System) is overridden (sender based routing).

Any possibly required TLS settings can be made under Mail System TLS Settings Add TLS Domain ADD TLS DOMAIN.

anchor link SSL certificate

(new in 13.0.8)

An SSL certificate can be specified here for each managed domain, which is used as an identification certificate for sending via this managed domain. The configuration is done in the same way as for GINA domains, see SSL.

If no certificate is configured, the default certificate configured under SSL is used.

 

empty

anchor link Note:

If SEPPmail Secure E-Mail Gateway is operated multi-tenant capable in conjunction with Microsoft M365 / Exchange Online environments, Certificate based Connectors (CBC) must be used, see MS365: SSL-Zertifikate mandantenfähig über Certificate based Connectors (CBC).

 

anchor link Postmaster address

If an email address is entered here, it will be used as the sender (from-header) for sending bounce and notification emails of the respective Managed domain.

anchor link S/MIME domain keys

Depending on the global selection under Mail System Managed domain Create S/MIME domain keys for managed domain encryption and send public key to vendor pool:, different statuses are displayed.

 

anchor link Globally on

This is displayed if the global setting On for all domains has been selected.

With this setting, the participation in the Managed Domain Service is activated or deactivated.

 

With the activation, for the corresponding Managed domain, a self-signed X.509 S/MIME domain certificate (see S/MIME domain encryption) is created automatically and transferred to the central SEPPmail licence and/or key server. The corresponding newly created S/MIME domain certificate (that means only the public key!) is then automatically distributed to all SEPPmail Secure E-Mail Gateways so that all companies operating a SEPPmail Secure E-Mail Gateway can exchange emails without any further effort among each other, at least on a domain-encrypted basis.

This service is already included in the basic licence and does not require any additional encryption licences.

 

empty

anchor link Note:

Generally, the created S/MIME domain certificates are automatically released by SEPPmail for participation in the Managed Domain Service. If applicable, the release process can be accelerated by a corresponding email to support@seppmail.ch.

 

empty

anchor link Note:

If the check mark is set retrospectively and certificates already exist, the certificate with the longest validity period will be transferred.

If another certificate is generated, it will also be transferred due to the longer validity period. If this newly generated certificate is to be activated for participation in the Managed Domain Service instead of the existing certificate, this must be explicitly communicated via email to support@seppmail.ch.

If a certificate cannot be transferred when it is created, or if the transfer fails, a new transfer attempt is made at midnight.

 

empty

anchor link Attention:

Participation in the Managed Domain Service should only be realised once the entire incoming email flow for the corresponding Managed domain is routed over the SEPPmail Secure E-Mail Gateway.

Otherwise, emails which have been encrypted via the service may still reach the recipient in an unprocessed, that is encrypted manner!

If an S/MIME domain certificate has already been generated before the email flow for the respective Managed domain is routed over the SEPPmail Secure E-Mail Gateway, the support team must be informed by means of an email to support@seppmail.ch that the corresponding domain certificate must not be released.

If the email flow has been re-directed completely, the activation for the Managed Domain Service must be notified again by means of an email to support@seppmail.ch.

 

If a - participating in the Managed Domain Service - Managed domain is eliminated, for example due to a change in the company name, this must also be reported by means of an email to support@seppmail.ch. The corresponding domain certificate is then revoked by SEPPmail and the email domain is thus excluded again from the Managed Domain Service.

Similarly, after a change in the global settings to Off for all domains, all domains which are already participating would have to be reported to support@seppmail.ch for exclusion from the Managed Domain Service.

anchor link CheckBoxInactive Create S/MIME domain keys for managed domain encryption for this domain and send public key to vendor pool

By default, this option is inactive

This is displayed if the global setting Use domain settings has been selected.

anchor link Globally off

This is displayed if the global setting Off for all domains has been selected.

 

empty

anchor link Note:

If the global setting Off for all domains has only been activated once the Managed Domain Service for the respective Managed domain has already been established, the key transmitted to the SEPPmail licence and/or key server will be available to the communication partners until it is revoked by means of an email to support@seppmail.ch. Incoming Managed Domain Service encrypted emails will still be decrypted.

 

empty

anchor link Note:

The sending of emails by means of the Managed Domain Service remains unaffected by this setting.

If this is to be eliminated as well, in addition to this setting, under Domain Certificates Managed S/MIME domain certificates, the option Auto-update S/MIME domain certificates is to be deactivated immediately after installation.

anchor link CheckBoxInactive Internal mail handling

(new in 13.0.4)

The option "Send internal mails (between two managed domains) to the configured smarthost" applies to the routing of internal mails, if the general setting Use domain settings is selected.

anchor link Disclaimer

(changed in 12.0)

For using the Central Disclaimer Management (CDM), a corresponding licence is necessary.

Disclaimers and/or personalised footers can be created and edited via the menu Mail System Edit mail disclaimer....

If a licence is available, the disclaimer is attached in accordance with the following selection.

 

empty

anchor link Note:

If a granular setting is necessary for attaching a disclaimer, for example, for each department instead of for each Managed domains, this can be realised easily via Custom commands (please also refer to disclaimer()).

Alternatively, a disclaimer may also be positioned manually, directly in the email.

For this purpose, a line with the text

##MAILDISCLAIMER##

is to be added to an email in the location in which the disclaimer is to be positioned.

(extended in 12.0)

By entering a

##MAILDISCLAIMER_<disclaimer>##

(whereby <disclaimer> corresponds to the desired disclaimer from LIST DISCLAIMER ), not only the position but explicitly also the disclaimer to be used can be selected.

If the disclaimer function is also to be used within the GINA carrier emails, this can be realised via Custom commands (please also refer to disclaimer()).

 

anchor link Initial disclaimer DropDown

Selection of the disclaimer for new outgoing emails.

anchor link Reply disclaimer DropDown

(new in 12.0)

Selection of the disclaimer for outgoing email replies.

 

empty

anchor link Note:

The disclaimer in reply emails is attached directly after the reply, not in the end of the email (!) Thus, the use of the extended disclaimer function is particularly suitable for the creation of personalised footers, too!

anchor link GINA domain DropDown

Via the selection, the GINA settings to be used for the entered email domain can be selected. These can be created and edited via the menu GINA Domains Domains.

If "-DISABLED-" is selected here, for the selected Managed domain no GINA technology is available. This also means that if encryption is requested and the recipient's public key is missing, the email is rejected (bounced) (see also Bounce templates No public key).

For client-capable systems, the GINA domain(s) specifically set up for the customer must be selected here, provided that the GINA technology has not been disabled by means of "-DISABLED-".

 

(new in 14.0.0) In the following parameters, the LFT use can be specified. If not specified, the default values are inherited.  

 

anchor link Global LFT quota in MB

Defines the global quota for this domain. LFT will not exceed this value.

 

anchor link Global LFT quota warn levels

The default is "80,90,95". If the global quota exceeds one of these values, a notification email is sent.

 

anchor link CheckBoxActive Enforce global LFT quota

If activated, the global quota is strictly adhered to. If not, then only a warning is issued if the global quota is overwritten. Possible values are "true", "false" and "reset to default values".

 

anchor link User LFT quota in MB (must not be bigger than global quota of x)

Defines the quota per user of this managed domain.

 

anchor link CheckBoxActive Users are allowed to use LFT

Allows specifying if the user may use LFT. Possible values are "true", "false" and "reset to default values".

anchor link Assigned to customer

(only for client-capable systems)

Allocation to a customer who has already been created under Customers in a client-capable system.

The allocation to a customer is only possible when creating a new Managed domain - that is when the menu was opened via the button Add managed domain....

 

 

anchor link Section Bounce templates

 

In this section you can specify individualised bounce templates that were previously created using the menu Mail System Edit mail templates....

 

Parameters

Description

anchor link No authentication

By default, bounce_noauth is selected.

Shows the selected bounce template for requested encryption/signatures by non-existent users (Users).

anchor link No public key

By default, bounce_noenc is selected.

Shows the selected bounce template for failed encryption.

 

empty

anchor link Note:

If the SEPPmail Secure E-Mail Gateway is operated in a standard configuration using the Encryption Hierarchy this template is never used, since in the case of missing key material encryption is processed using the GINA technology.

anchor link No private key

By default, bounce_noseckey is selected.

Displays the selected bounce template if the key material of the internal sender is missing.

 

empty

anchor link Note:

This template is used if an internal sender requests a signature, but no valid S/MIME key pair is available on the SEPPmail Secure E-Mail Gateway for this sender (see Users USER 'USER@DOMAIN.TLD' S/MIME) or if such key pair cannot be generated (see Mail Processing Ruleset generator Key generation).

anchor link Policy not applicable

By default, bounce_policy is selected.

Generally, this template is used for all rejections due to an ENCRYPTION POLICY provided that no other template has been explicitly selected in the corresponding ENCRYPTION POLICY. Thus, if an ENCRYPTION POLICY is used for more than one Managed domain, the template of the corresponding Managed domain is used instead of a template obtained via the ENCRYPTION POLICY.

The order is then ascending:

Default template

Domain template

Policy template.

 

anchor link Send OpenPGP keys

By default, sendpgpkeys is selected.

If applicable, the template selected here overrides the global selection of the option Mail Processing Miscellaneous options Send new OpenPGP public keys to users when a key is created with template.

 

 

anchor link Section External Authentication

 

Defines the settings for authentication at the GINA interface using external user data.

 

Parameters

Description

anchor link LDAP

If the GINA technology is also used internally, for example for Large File Transfer (LFT) or internal email encryption (IME), this option enables the authentication of the users of the respective Managed domain against an external LDAP in the organisation-internal network (for example Active Directory).

This also enables users from the corresponding Managed domain to directly login at the GINA portal with their email address and the password stored in the LDAP (that means in the case of AD, the Windows password).

 

Operating mode:

If, due to the above-mentioned configuration, the email address (the main address, no email alias!) of the registering user (GINA account) and thus their DN is found in the LDAP database, another connection attempt is made with this DN and the password entered by the user in the GINA portal. If this attempt is successful, the authentication at the GINA portal is also successful.

Here, the SEPPmail Secure E-Mail Gateway runs its own counter for incorrect password entries. If the external authentication fails more frequently than the maximum admissible number, the account is locally temporarily disabled. Here, there is no interaction with the external server anymore. The deactivation is thus exclusively local. This means that a SEPPmail Secure E-Mail Gateway administrator can always reactivate or finally disable a deactivated GINA Account in the SEPPmail Secure E-Mail Gateway administration interface.

Additionally, there is an option of excluding individual GINA Accounts from external authentication. In this case, the local password is used for the login again (please also refer to GINA Accounts GINA User Details User Data External Authentication).

 

anchor link CheckBoxInactive Authenticate GINA users from this domain to external LDAP server (eg. Active Directory)

By default, this option is inactive.

Activates the "external LDAP authentication".

anchor link CheckBoxInactive Automatically create GINA account if user exists on external LDAP server

By default, this option is inactive.

If this option is enabled, a GINA Account is automatically created upon successful authentication via LDAP, unless one already exists. The registration process for the initial registration is thus not necessary for the GINA user.

One precondition is that the GINA Domain), to which the respective user logs in, is also allocated to this Managed domain.

 

If this option is not enabled, the GINA Accounts (unless there is also no alternative IDP setting active) still need to be registered on the SEPPmail Secure E-Mail Gateway. Here, a local password must be set. However, this password is not used for authentication as long as authentication via IDP is active. A corresponding message is displayed during the initial registration of the account.

If, when logging in at the GINA portal, the local password is used instead of the IDP password (in this case only!), the user receives a corresponding note (see GINA Domains Domain GINA Edit CHANGE GINA SETTINGS FOR Language Settings Edit Translations Edit translation file Advanced view Edit translation file msgid "ext_auth_enabled").

 

If the option is deactivated retrospectively, the already existing GINA users will be asked to register when they next log in.

 

empty

anchor link Attention:

On client-capable systems, the notes in Customers Notes: regarding the assignment of GINA Domains are to be considered.

 

anchor link Server

Indication of the LDAP server(s) against which an authentication is to be realised. The hostname or IP address is accepted as input.

 

Several servers can be entered, separated by spaces. The servers are processed in the specified order until one of them returns either OK or INVALID_CREDENTIALS (incorrect password). For all other responses (or errors in the connection establishment), the next server in the list is tried.

anchor link Port

By default, this is set to 636

Specifies the port on which the external LDAP server receives requests. The standard LDAP port is 389, and 636 for LDAPS (see also TLS required).

anchor link CheckBoxActive TLS required

By default, this option is active.

Enforces the encryption of the connection to the LDAP server by means of TLSv1 or higher (LDAPS or LDAPS+STARTTLS).

anchor link Bind DN

Indication of the full distinguished name (DN) of the read-only account which is entitled to search under External user attributes Search base Email attribute in the LDAP database.

anchor link Bind password

Password for the authentication of the account entered under Bind DN.

anchor link External user attributes

LDAP objectClass

By default, this is set to *.

Input of the LDAP class of user objects on the external LDAP server.

Search base

Search path: Indicates the branch of the LDAP directory in which the users to be authenticated are to be searched for using the parameters "LDAP objectClass" and "Email attribute".

 

empty

anchor link Note:

The authentication also works for nested OUs ("recursive"). As "Search base", the highest reachable level for the "Bind DN" is to be specified.

The "Bind DN" must have the permission to search recursively.

If there are several objects in the LDAP directory tree under the "global" - that is the one further up - "Search base" to which the standard search parameter applies (mail=$email)(objectClass=*), and unsuitable objects are returned, the "LDAP object class" is to be adapted in a way that the search only returns the entries which are actually suitable for authentication.

If applicable, a search should be undertaken via an external LDAP browser in the "global" search base for - for example - "(&(mail=max.mustermann@ihre-firma.tld)(objectClass=*))". If an entry is returned which is unsuitable for authentication, this, possibly among other things, is where the problem lies. A suitable objectClass (for example objectClass=inetOrgPerson) can then be searched for via the returned entries so that only suitable entries are found.

 

Email attribute

(Default: "mail")

By default, this is set to "mail".

Indication of the LDAP database attribute under which the email address of the user to be authenticated is stored in the specified Search base.

 

empty

anchor link Attention:

An authentication by means of other values than the email address, for example the Windows login name from the sAMAccountName attribute, is not possible!

anchor link Customer Login Test

User

Email address of a user present in the indicated Search base.

Password

Password of the user indicated under User.

Test connection

Clicking the Test connection button initiates a connection test. The result is displayed in the status bar (top).

 

empty

anchor link Note:

The connection data is not saved when performing the connection test. Thus, if changes have been made, they have to be saved with Save changes (bottom right in the submenu).

 

empty

anchor link Note:

To prevent a disclosure of the type of authentication process to a potential external attacker, the link "Forgot password?" will be displayed even if external authentication in the GINA login mask is activated.

 

 

anchor link Section Internal authentication

(new in 13.0.14)

 

Parameters

Description

anchor link CheckBoxInactiveAuthenticate local users as GINA users

By default, this option is inactive.

Activate if local users should be able to log in at GINA.

 

Select the condition:

If you select the mail processing groups, only users who belong to one of the selected mail processing groups are allowed to do so.

If no mail processing group is selected, all users of the managed domain may authenticate themselves.

 

The method with which a user originally was created can be analysed with the Show users created by authentication filter.

 

 

anchor link Section OpenPGP Domain Encryption

(changed in 12.1)

 

empty

anchor link Note:

This section is only available in edit mode.

 

This section shows the OpenPGP domain keys, if any.

 

Key ID

Subkey ID(s)

(new in 12.1)

User ID

Issued on

Expires on

Displays the key ID of the OpenPGP domain key(s)

Displays the key IDs of all existing subkeys.

Displays the user ID associated with the key ID. If the key was generated by the appliance, it is usually the key

OpenPGP Domain Encryption <domain-confidentiality-authority@yourdomain.tld>

Date of issue of the key

YYYY-MM-DD

Expiration date of the key

YYYY-MM-DD

 

By clicking on the Key ID, a submenu with details on the key will be opened. This offers the option of downloading the public key and/or deleting the key pair.

Clicking the Import OpenPGP Key button can be used to import an already existing key pair (see submenu IMPORT OPENPGP KEY).

Clicking the Generate new OpenPGP key button offers the possibility to generate a new key pair on the appliance. (changed in 12.1) The validity period (Validity in days) of the key generated in this way can be freely defined and is preset to 825 days.

 

 

anchor link Section S/MIME domain encryption

(changed in 12.1)

 

empty

anchor link Note:

This section is only available in edit mode.

 

This section shows the S/MIME domain keys, if any.

 

Fingerprint

Issued on

Expires on

Managed Domain Encryption

Displays the fingerprint(s) of the S/MIME domain key(s).

 

empty

anchor link Note:

If, under Settings in the section S/MIME domain keys, one of the options Globally on or Create S/MIME domain keys for managed domain encryption for this domain and send public key to vendor pool

is activated, at least one certificate is displayed.

Date of issue of the key

YYYY-MM-DD

Expiration date of the key

YYYY-MM-DD

Displays whether a key has been released and is used.

 

Possible status:

managed by SEPPmail
used for the automatically managed domain encryption (see Managed Domain Service and the status managed in SEPPmail domain encryption)
 

unmanaged
Please also refer to the status unmanaged, and/or mismatch in SEPPmail domain encryption
In the case where the status is mismatch, a corresponding warning is issued in the status bar!

 

empty

anchor link Note:

If domain encryption is to be set up manually for a communication partner who uses a third-party tool for domain encryption, it is recommended to generate a separate key pair for this purpose (see Generate S/MIME key).

Since many third-party manufacturers also require a certificate authority certificate (root CA certificates), it is still recommended to set up the local CA before creating the domain certificate.

 

If required, both the root CA certificate (see Publish local CA certificate on the search page to allow recipients to perform S/MIME signature verification) and the domain certificate itself (see Allow download of public domain keys/domain certificates) can be provided via the GINA interface.
 

 

Clicking on Fingerprint will open a submenu with details about the key (see X.509 CERTIFICATE 'Details'). This provides the option to download the public key (certificate) or to revoke or delete the key pair.

 

empty

anchor link Note:

If, in the certificate details under Key usage, the checkmark is removed at the Allow signing option, the corresponding certificate is not listed in a certificate search in GINA (please also refer to CHANGE GINA SETTINGS FOR Extended settings Allow download of public domain keys/domain certificates).

 

Clicking the Import S/MIME Key button can be used to import an already existing key pair (see submenu IMPORT PKCS#12 CERTIFICATE STRUCTURE).

The key exchange between SEPPmail Secure E-Mail Gateways is automatically implemented upon activation of the option Automatically create and publish S/MIME domain keys for all domains via the Managed Domain Service. This ensures that all SEPPmail Secure E-Mail Gateways communicate with each other in a domain-encrypted manner.

Clicking the Generate S/MIME key button offers the possibility to generate a new key pair on the appliance. (changed in 12.1) The validity period (Validity in days) of the key generated in this way can be freely defined and is preset to 825 days.

.

empty

anchor link Note:

If the internal CA was already set up before generating the domain certificate, the attributes entered there are used when creating it.

This can be particularly useful if a communication partner with a gateway from another manufacturer requests more detailed information in the domain certificate even if this is not necessary according to RFC.

 

Generally, SAN certificates are generated for which, in the Subject Alternative Name initially the domain name and, subsequently, the email address is entered, for example

mycompany.tld domain-confidentiality-authority@mycompany.tld

 

 

anchor link Section Internal Mail Encryption

(changed in 12.1)

 

empty

anchor link Note:

This section is only available in edit mode.

 

Fingerprint

Issued on

Expires on

Displays the fingerprint(s) of the S/MIME domain key(s) which is/are required for the internal email encryption as of IME 2.0.

Date of issue of the key

YYYY-MM-DD

Expiration date of the key

YYYY-MM-DD

 

Clicking the Import S/MIME Key button can be used to import an already existing key pair (see submenu IMPORT PKCS#12 CERTIFICATE STRUCTURE).

Generate new S/MIME key generates a new key pair for internal mail encryption. (changed in 12.1) The validity period (Validity in days) of the key generated in this way can be freely defined and is preset to 825 days.

Once the key pair has been created, the certificate can be exported by clicking on the fingerprint.

To be able to use the certificate with the SEPPmail Microsoft Outlook Add-In later, usually, a contact with the email address from the CN of this IME certificate and this certificate itself is created in the "global address list (GAL)" of the Exchange server. In most cases, this adds the certificate of the contact into the machine-related certificate memory of the clients under "Other persons" "Certificates".

 

empty

anchor link Note:

By default, the folder "Other persons" is only created in the certificate memory once a certificate has been imported for a contact in the Outlook address book or once an entry has been created in Exchange in the Global Address List (GAL).

The contact to generally be created in the GAL should start with a special character, for example with an underscore character "_". This is due to the fact that the SEPPmail Microsoft Outlook Add-In automatically searches for this entry when starting MS Outlook. If the entry is listed towards the end of the GAL due to the alphabetical sorting, this search may take a very long time. Consequentially, the start of MS Outlook would be delayed accordingly.

This in turn could lead to an automatic deactivation of the SEPPmail Microsoft Outlook Add-In unless the corresponding configuration measures are taken to prevent this.

 

 

anchor link Section DKIM Settings (optional)

 

Parameters

Description

anchor link CheckBoxInactive Generate a DKIM key pair for this domain

By default, this option is inactive.

Placing a check mark and subsequently clicking on Save changes generates a DKIM key pair for the corresponding managed domain. As of this point in time, all outgoing emails of the Managed domain will bear a DKIM signature.

anchor link Selector:

(new in 13.0.0)

By default, this option is set to "default".

 

empty

anchor link Attention:

To ensure that the DKIM signature can be checked by the recipient, the public part of the DKIM key is to be published as a text entry in the DNS mandatorily.

The adaptations to be implemented for a DNS zone file can be obtained from the field

Before enabling, make sure that the following TXT entry exists in your DNS zone file:

.

Some Internet service providers (SIP) do not allow the zone file to be directly edited. Here, initially, an input is to be made in the format

<selector>._domainkey.<managed domain>

also if keeping the Selector on the default value "default" for example:

default._domainkey.mycompany.tld

followed by another input field, in which the content of the field

entry for '<selector>._domainkey.mycompany.tld' as text:

, for example

default._domainkey.mycompany.tld

is to be entered.

If the created text input is correctly published by the DNS, the third field should be overwritten as follows:

found a valid DNS entry for this DKIM key:

Otherwise, the field is overwritten with

DNS entry missing or invalid:

. In the field itself, the text input as read by the SEPPmail Secure E-Mail Gateway is visible.

 

(new in 13.0.8)

anchor link Section ARC Settings (optional)

 

ARC sealing/signing of emails is possible. Especially in conjunction with Exchange Online connections, this can reduce/eliminate false positives in spam detection by Microsoft.

 

Parameters

Description

anchor link CheckBoxInactive Add ARC seal to incoming mails for this domain

By default, this option is inactive.

Placing a check mark and subsequently clicking on Save changes activates the ARC seal, based on the key source set below.

anchor link Key source:

 

By default, this option is set to "Use the DKIM key". This is the DKIM key of the managed domain.

 

Alternatively, a Master ARC key or a separate ARC key for this managed domain can be used.

The Master ARC key is defined in Mail Settings.

 

 

anchor link Section TLS Settings (optional)

 

If a TLS encrypted connection is to be established for the downstream groupware system for an email domain (see table under Mail System Managed domains Column Server IP Address), the TLS encryption can be configured at this point.

Setting up TLS connections is described in the chapter on the submenu ADD TLS DOMAIN.

 

 

anchor link Section Extended fields

(new in 13.0.0)

 

See Mail Processing Extended Fields.

 

Active

Name

Value

Type

Displays whether the "Extended Field" is in status

"Active" green checkmark

or

"Inactive" red circle

and therefore ready to use or not.

Displays the name of the respective "Extended Fields" as set up under Mail Processing Extended Fields Extended Fields Name .

Displays the value of the respective "Extended Fields". If this corresponds to the one under Mail Processing Extended Fields Extended Fields Default value, then behind the entry field

default value

is displayed, otherwise

domain specific value

Displays the Type of the respective "Extended Fields" as entered under Mail Processing Extended Fields Extended Fields.

 

 

anchor link Section Domain Statistics

(changed in 12.1)

 

empty

anchor link Note:

This section is only available in edit mode.

 

In this statistics, only the cryptography technologies which have already been used on the SEPPmail Secure E-Mail Gateway are displayed.

 

Parameters

Description

anchor link Number of accounts in this domain

Number of users created on the SEPPmail Secure E-Mail Gateway (corresponds to user licences).

anchor link S/MIME-encrypted

emails sent

Number of emails sent that were encrypted using the S/MIME technology.

anchor link S/MIME-encrypted

emails received

Number of emails received that were encrypted using the S/MIME technology.

anchor link OpenPGP-encrypted emails sent

Number of emails sent that were encrypted using the OpenPGP technology.

anchor link OpenPGP-encrypted emails received

Number of emails received that were encrypted using the OpenPGP technology.

anchor link S/MIME domain-encrypted emails sent

Number of emails sent which were domain-encrypted by means of the S/MIME technology.

anchor link S/MIME domain-encrypted emails received

Number of emails received which were domain-encrypted by means of the S/MIME technology.

anchor link OpenPGP domain-encrypted emails sent

Number of emails sent which were domain-encrypted by means of the OpenPGP technology.

anchor link OpenPGP domain-encrypted emails received

Number of emails received that were domain-encrypted by means of the OpenPGP technology.

anchor link S/MIME signed

emails sent

Number of emails sent that were signed by means of the S/MIME technology.

anchor link S/MIME signed

emails received

Number of emails received that were signed by means of the S/MIME technology.

anchor link GINA encrypted

emails sent

Number of emails sent that were encrypted by means GINA technology

 

All changes made are saved via the Save changes button.

Deleting a domain can be done with Delete domain.

 

empty

anchor link Note:

If the domain has a domain key (see S/MIME domain encryption and/or OpenPGP Domain Encryption), a corresponding warning appears in the status bar, and the deletion is to be confirmed again by pressing Delete domain.

 

empty

anchor link Attention:

If the domain actively participates in the Managed Domain Service (status managed in SEPPmail domain encryption) with one of the S/MIME keys, even after the second actuation of Delete domain another warning appears in the status bar, which informs the user of this.

Before the deletion, by clicking on Delete domain again, a ticket must be sent to support@seppmail.ch to report the termination of the participation in the Managed Domain Service.

Otherwise, emails from SEPPmail Secure E-Mail Gateways to this domain will continue to be encrypted by means of the Managed Domain Service, which can no longer be decrypted by the recipient due to a lack of a private key.

  

Keyboard Navigation

F7 for caret browsing
Hold ALT and press letter

This Info: ALT+q
Topic Header: ALT+t
Topic Body: ALT+b
Contents: ALT+c
Search: ALT+s
Exit Menu/Up: ESC