Please enable JavaScript to view this site.

In this menu, the certificates available for S/MIME encryption are displayed as follows:

 

Column

Description

anchor link Email address

Displays the email address (RFC822 name) of the key owner.

anchor link Certificate subject

Displays the X.509 subject.

anchor link Serial number

Serial number of the certificate.

anchor link Fingerprint

Displays the fingerprint (hash) of the certificate.

anchor link Validity

Specifies the validity of the certificate. Possible statuses are

"none", which means "OK".

REVOKED

EXPIRED

DISABLED
(if, in X.509 CERTIFICATE 'Details' Key usage, the checkmark under Allow encryption has been removed and none of the two other status applies)

anchor link OCSP/CRL check

Result of the OCSP/CRL check. Possible statuses are

OK

?

uncheckable

uncheckable (no supported CRL/OCSP mechanism)

revoked

anchor link Issued on

Issue date of the certificate in the form YYYY-MM-DD

anchor link Expires on

Expiration date of the certificate in the form YYYY-MM-DD

 

Click on the email address to switch to the submenu X.509 CERTIFICATE 'Details' with details of the certificate.

 

The input field with the Filter... button is used for searching for corresponding keys based on the characteristics indicated in the table. The search term is entered as a character string.

 

Clicking on the Import S/MIME certificate... button opens the X.509 Certificates Import S/MIME certificate... submenu for the import of individual or several (bulk) certificates of communication partners.

 

The Advanced settings... button leads to the submenu of the same name, in which the - if necessary automated - cleaning of certificates is carried out.

 

empty

anchor link Note:

If several valid certificates are available for a single recipient, the session key is encrypted with each of these certificates.
If, for example, the recipient uses several hardware clients on which different (private) keys are available, this ensures that the email can be read on all clients, provided that their associated public keys are known on the appliance.

 

empty

anchor link Note:

S/MIME certificates are automatically collected from signed incoming emails, provided these certificates originate from a certification authority listed under X.509 Root Certificates with the status "trusted".

Additionally, OpenPGP keys provided via the GINAportal as well as via the Key server are collected here. In general, however, no insecure certificates (SHA-1 and MD5, MD4, MD2) are imported.

Thus the number of available encryption certificates - and thus the possibility for S/MIME encrypted communication with third parties - is constantly and automatically growing.

  

Keyboard Navigation

F7 for caret browsing
Hold ALT and press letter

This Info: ALT+q
Topic Header: ALT+t
Topic Body: ALT+b
Contents: ALT+c
Search: ALT+s
Exit Menu/Up: ESC