Please enable JavaScript to view this site.

The SEPPmail Secure E-Mail Gateway includes an entire certification authority. This can be configured as a self-signed CA or sub-CA.

 

Sections on this page:

Introduction

Issued to

Issued by

Validity

Fingerprint

Certificate revocation list

Settings

Backup

 

anchor link Introduction

 

Alternatively, trusted CA certificates can be obtained automatically via the Managed Public Key Infrastructure (MPKI) connectors.

 

empty

anchor link Note:

The CA certificate of this menu item is machine-related and thus not synchronised in the Cluster. If necessary, a separate certificate must be used on each cluster partner or the same certificate must be imported.

The Settings, on the other hand, are synchronised.

 

empty

anchor link Note:

The use of a self-signed CA is usually not recommended for signing emails, as the signatures cannot usually be verified automatically by the recipients.

However, setting up the internal certification authority can be useful, as the specified attributes are also used for creating domain certificates (see Mail System Managed domain ADD/EDIT MANAGED Domains S/MIME domain encryption).

 

If a certificate is already included, it is displayed as follows.

Otherwise, Request or create a certificate authority... can be used to create a certificate signing request (CSR) for a CA or sub-CA certificate and/or a self-signed CA certificate. However, using a self-signed CA certificate is only recommended for test systems, for the reasons given above.

 

empty

anchor link Attention:

When signing the CSR, make sure that the attributes

is a sub-CA

can issue server certificates

can issue client certificates

are specified.

 

Via Import existing certificate authority..., an existing CA or sub-CA certificate can be imported. The subsequently appearing sub menu IMPORT AN EXISTING CERTIFICATE (AUTHORITY) has an identical structure to SSL IMPORT AN EXISTING CERTIFICATE.

 

empty

anchor link Note:

If the CA is to work as a sub-CA, the sub-CA certificate including the certificate chain up to the root CA must be inserted here.

Without a valid certificate chain, the issuing of certificates will fail.

 

If the top of the status bar of the menu displays the information Remember to import the signed certificate, only the button Continue certificate signing request... is displayed. This button is used to continue or complete the obtainment of a certificate started by means of Request or create a certificate... via CSR.

 

With Sign Certificate Request, it is possible to sign externally generated CSRs with the internal CA. Clicking the button opens the SIGN CERTIFICATE REQUEST submenu, in which the actual signature process can be performed.

 

 

anchor link Section Issued to

 

This section displays information about the owner of the CA certificate.

Depending on the certificate, not all parameters listed here must be given.

 

Parameters

Description

anchor link Common Name

Specifies the name of your own certification authority

anchor link Email address

As a rule, the email address of the administrator of your own certification authority or their department is entered.

anchor link Org. unit (OU)

Organisational unit, such as a department name, e.g. "Security"

anchor link Organisation (O)

Specifies the organisation for which the certificate was issued, for example "Company"

anchor link Locality (L)

Location, for example a town like "Neuenhof"

anchor link State (ST)

Federal state, canton, province or similar, for example "AR" for "Appenzell Ausserrhoden"

anchor link Country (C)

Country, for example "CH" for "Switzerland"

anchor link Serial No.

Serial number of the certificate

 

These parameters are displayed as "Issuer" for certificates issued by the internal CA.

 

 

anchor link Section Issued by

 

This section displays information about the issuer of the CA certificate (root certificate).

Depending on the issuer, not all parameters listed here have to be given.

 

Parameters

Description

anchor link Name (CN)

Specifies the name of your own certification authority

anchor link Email address

As a rule, the email address of the administrator of your own certification authority or their department is entered.

anchor link Org. unit (OU)

Organisational unit, such as a department name, e.g. "Security"

anchor link Organisation (O)

Specifies the organisation for which the certificate was issued, for example "Company"

anchor link Locality (L)

Location, for example a town like "Neuenhof"

anchor link State (ST)

Federal state, canton, province or similar, for example "AR" for "Appenzell Ausserrhoden"

anchor link Country (C)

Country, for example "CH" for "Switzerland"

 

 

anchor link Section Validity

 

Specifies the validity of your own CA certificate.

 

Parameters

Description

anchor link Issued on

Issue date of the certificate

anchor link Expires on

Expiration date of the certificate

 

 

anchor link Section Fingerprint

 

The fingerprint is the checksum (also hash or fingerprint) and is used to verify a certificate. At this point, the hash algorithm (for example MD5 SHA1 or SHA256) with which the checksum was formed as well as the calculated value are displayed. If several fingerprints of different algorithms are available, each one is output in a separate line.

 

Parameters

Description

anchor link Hash algorithm of the certificate

Example of a SHA1 fingerprint:

48:2D:99:B1:64:C1:14:9C:B3:F2:C0:8D:FA:7F:40:9F:22:F5:11:F5

 

 

anchor link Section Certificate revocation list

 

abbreviated CRL. If the internal certification authority has been configured, it keeps a revocation list for the certificates issued by it. If a private key has been compromised, it can be declared invalid (revoked) in the user configuration (see Users USER 'USER@DOMAIN.TLD' S/MIME) which will then make it appear in the revocation list. This can be downloaded via the Create and download CRL button and thus queried.

 

 

anchor link Section Settings

 

In this section, the settings for the self-signed or sub-CA are entered.

The mentioned extension settings are the default settings when setting up a self-signed CA.

If a sub-CA is to be set up, the operator of the main CA usually specifies the corresponding values.

 

Parameters

Description

anchor link Static subject part

By default, the static subject part shows the parameters for the corresponding country (here, the two-character ISO country identification is to be used), organisational unit and organisation, for example

/C=GB/OU=Security/O=Company

anchor link CA validity in days

By default, the value is set to 3650.

Specifies the validity of the certificates issued in days.

 

hint

anchor link Note:

This setting also applies to the OpenPGP key pairs generated by the appliance.

The maximum value may not exceed 31342 days.

 

anchor link CRL validity in days

By default, the value is set to 30.

Specifies the validity of the Certificate revocation list in days.

anchor link Automatic renewal

 

empty

anchor link Note:

The selection of Managed Domains for which the automatic renewal of the certificates is to be active is taken over from the setting MPKI Connector MPKI managed domains.

 

anchor link CheckBoxInactive Automatically renew expiring certificates if validity days left less than

This option is inactive by default and pre-set to 90.

Initiates the automatic renewal of certificates of active users (Users) if the remaining validity period is the set value. One pre-condition in this respect is that the corresponding user sends an email within the set overlap time. This prevents certificates from being obtained for "dead bodies" in the Users menu. The thus initiated process runs overnight (!).

Certificates of the internal certification authority as well as revoked or expired certificates are not taken into account.

 

empty

anchor link Note:

The greater the overlap in the certificate validity, the greater the chance that the communication partner will come into possession of a valid public key, which they need for sending encrypted emails.

 

hint

anchor link Note:

This setting also applies to the OpenPGP key pairs generated by the appliance.

 

hint

anchor link Note:

The validity period of the certificates of the individual users can be found in the file user-stats.csv which comes with the Daily Report (see also Groups statisticsadmin).

This is especially helpful if no automatic renewal of certificates has been set.

 

empty

anchor link Note:

Domain certificates (explicitly excluding IME!) and PGP keys which are about to expire are renewed according to the same criteria as user keys.

 

anchor link CheckBoxInactive Automatically create certificates for active users without certificates

By default, this option is inactive.

This function obtains both S/MIME as well as OpenPGP keys for all existing active Users automatically overnight (!) unless corresponding valid (!) key material exists.

 

Active Users are users who have sent an email in the last 30 days and do not have the State inactive.

 

empty

anchor link Attention:

Only works if the following option is active at the same time: Automatically renew expiring certificates if validity days left less than

anchor link Extension setting

name:

authorityKeyIdentifier

value:

keyid,issuer:always

Adds to the certificates issued by this certification authority the information about the issuing certification authority, given by the value (value:)

keyid: subjectKeyIdentifier (see next option)

issuer: IssuerName, serial number

always: Returns an error message if copying the specified options fails

name:

subjectKeyIdentifier

value:

hash

Specifies the type of fingerprint of the issued certificate

hash forms a hash value according to RFC 3280

hex: A predefined hex value is appended to the certificate (not recommended!)

name:

subjectAltName

value:

email:copy

Enables the inclusion of further alternative names in the issued certificate.

email: Email address

copy: automatically adds a copy of the email address from the "SubjectName".

URI uniform resource indicator

DNS: DNS domain name

RID registered ID: OBJECT IDENTIFIER

IP: IP address in v4 or v6 format

dirName should point to a distinguished name (DN). Multiple inputs possible with +

name:

basicConstraints

value:

CA:FALSE

Indicates whether the certificate issued is a certificate authority certificate.

CA Possible values are TRUE or FALSE

pathlen optional for CA:TRUE: specifies the maximum number of CAs which

name:

nsComment

value:

OpenSSL Generated Certificate

Comment entry for the certificate

Freely selectable comment

name:

nsCertType

value:

client, email

Specifies the type of certificate (Netscape)

client, server, email, objsign, reserved, sslCA, emailCA, objCA

name:

keyUsage

value:

nonRepudiation, digitalSignature, keyEncipherment

Specifies the permitted use(s) for the certificate.

digitalSignature: Digital signature

nonRepudiation: detectability

keyEncipherment: key encryption

dataEncipherment: data encryption

keyAgreement: key agreement

keyCertSign: certificate signature

cRLSign: revocation list signature

encipherOnly encryption only

decipherOnly decryption only

(Extension setting)

(to be added manually if necessary)

name:

crlDistributionPoints

value:

URI:https://<YourCA>/certs.crl

Adds the path to the certificate authority's revocation list distribution point to the certificate.

URI Path to the revocation list. Multiple URLs are entered separated using commas.

anchor link New extension

name:


value:


Further settings can be made at this point if required.

After saving a further extension, another input line appears.

 

 

anchor link Section Backup

 

Via Download certificate the SSL certificate (i.e. only the public key) can be downloaded in the PEM format.

If in the Cluster the same certificate is used for all cluster members, it can be distributed via the button Transfer to cluster members button to all members.

This transfer only works between backends (see Cluster Cluster members).

 

  

Keyboard Navigation

F7 for caret browsing
Hold ALT and press letter

This Info: ALT+q
Topic Header: ALT+t
Topic Body: ALT+b
Contents: ALT+c
Search: ALT+s
Exit Menu/Up: ESC