Please enable JavaScript to view this site.

QuoVadis Trustlink-specific sections in MPKI

 

Information on QuoVadis Trustlink MPKI is available at www.quovadisglobal.ch/Dienstleistungen/ZertifikatsServices.aspx.

 

Sections on this page:

Default parameters

Domain specific parameters

Certificate

Settings

 

 

anchor link Section Default parameters

 

Depending on the contract, the necessary settings have to be made here. These are usually made available by QuoVadis Trustlink upon the conclusion of the contract between the email domain owner and QuoVadis Trustlink

 

Parameters

Description

anchor link Service URL

Specifies the URL via which the MPKI is accessed.

QuoVadis Trustlink communicates the URL with the access data. As a rule, the URL is "https://tlconnector.quovadisglobal.com/<YourCompany>/<YourOrganisation>".

anchor link Static subject part

This part appears in the certificate of the corresponding user as an extension of the "Applicant" field and can be freely defined in the framework of a distinguished name - for example /C=[two-character country code]/OU=[organisation detail]/O=[organisation] - whereby the indication of the country code is mandatory.
 

empty

anchor link Attention:

Even slight deviations mean that certificates cannot be issued.

In particular, special characters can be problematic since they may be interpreted incorrectly when copying or entered incorrectly in the event of a manual input (e.g. different apostrophes: ´, `, ')

When copying the corresponding entries, care must also be taken not to accidentally copy a space at the beginning or end of the entry.

 

 

anchor link Section Domain specific parameters (optional)

 

If the SEPPmail Secure E-Mail Gateway manages several email domains (Managed Domains), this option can be used to specify specific parameters for creating user certificates for each domain.

After saving the domain specific option via Save entries another input field appears in each case.

 

Parameters

Description

anchor link Domain:

Specifies the email domains for which the following two parameters should be valid.

Only domains which were also named when the application was submitted to the certification body, or which were later validated separately, may be entered. Different domain names may result in certificates not being issued.

 

empty

anchor link Attention:

The input for domain validation is case sensitive!

 

empty

anchor link Attention:

The domain entered here must be selected under Connectors MPKI managed domains in order to obtain certificates.

anchor link URL:

A service URLwhich may differ from the default parameter is provided by QuoVadis Trustlink with the access data.

anchor link Static subject part

See Section Default parameters Static subject part
 

empty

anchor link Attention:

Even slight deviations mean that certificates cannot be issued.

In particular, special characters can be problematic since they may be interpreted incorrectly when copying or entered incorrectly in the event of a manual input (e.g. different apostrophes: ´, `, ')

When copying the corresponding entries, care must also be taken not to accidentally copy a space at the beginning or end of the entry.

 

 

anchor link Section Certificate

 

Used for authentication with the certification authority provider (QuoVadis Trustlink)

 

Parameters

Description

anchor link PKCS12 identity file

Certificate for authentication vis-à-vis the certification authority (QuoVadis Trustlink).

This file is provided by QuoVadis and is provided with a password (see parameter PKCS12 password)

If the access to the certification authority is successful, the following message appears at this point:

an operator certificate with valid password has been found.

 

empty

anchor link Note:

As of 30 days before the operator certificate expires, a message is added to the Daily Report (see also Groups admin and statisticsadmin), and the status of the Daily Reports is changed to IMPORTANT.

anchor link PKCS12 password

Password to activate the "private keys" contained in the PKCS12 identity file.

This is also provided by QuoVadis Trustlink.

anchor link SSL chain certificates

To ensure that the SEPPmail Secure E-Mail Gateway is able to supplement the certificate chain to the root certification authority (QuoVadis Trustlink) when signing emails, it must be made known. To do this, the certificate chain must be uploaded via a corresponding certificate file.
The display field below shows the uploaded intermediate certificates in text format.

 

QuoVadis Trustlink usually provides the certificate chain via a PEM file with the name "SSL_tlconnector_quovadisglobal_com_<jjjjmmdd>.pem"

.

 

 

anchor link Section Settings

 

Settings for the automatic renewal of certificates.

 

empty

anchor link Note:

The validity period of the certificates of the individual users can be found in the file user-stats.csv which comes with the Daily Report (see also Groups statisticsadmin).

This is especially helpful if no automatic renewal of certificates has been set.

 

Parameters

Description

anchor link CheckBoxInactive Automatically renew expiring certificates if validity days left less than

This option is inactive by default and pre-set to 30.

Initiates the automatic renewal of certificates of active users (Users) if the remaining validity period is the set value. One pre-condition in this respect is that the corresponding user sends an email within the set overlap time. This prevents certificates from being obtained for "corpses" in the Users menu, including certificates subject to a fee, if applicable. The thus initiated process runs overnight (!).

 

empty

anchor link Note:

If the MPKI is activated retrospectively, existing, manually imported certificates are also taken into account. The certificate of the user with the longest validity period (expires on) is decisive for the renewal via MPKI.

Certificates of the internal certification authority as well as revoked or expired certificates are not taken into account.

 

empty

anchor link Note:

The greater the overlap in the certificate validity, the greater the chance that the communication partner will come into possession of a valid public key, which they need for sending encrypted emails.


anchor link CheckBoxInactive Automatically create certificates for active users without certificates

By default, this option is inactive.

This function obtains a certificate for all existing active Users, who are not in possession of a valid (!) certificate, automatically overnight (!).

 

Active Users are users who have sent an email in the last 30 days and do not have the State inactive.

 

empty

anchor link Attention:

Only works if the following option is active at the same time: Automatically renew expiring certificates if validity days left less than

anchor link Chain certificates (needed to sign emails)

By clicking on Add or update..., the intermediate certificates under X.509 Root Certificates required for supplementing the certificate chain when signing are added/updated.

 

empty

anchor link Note:

This action is mandatory after completion of the MPKI configuration!

 

The changes made are saved via the Save button.

 

  

Keyboard Navigation

F7 for caret browsing
Hold ALT and press letter

This Info: ALT+q
Topic Header: ALT+t
Topic Body: ALT+b
Contents: ALT+c
Search: ALT+s
Exit Menu/Up: ESC