6. Is it mandatory to have the digital certificate issued from NICCA? Is it mandatory for the sender and receiver to have a NIC id?...

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?..."

Transcription

1 FAQ FOR S/MIME 1. What is S/MIME? What is digital certificate? What is an encrypted ? Is it mandatory to use this service? What I need to do to start using S/MIME service? Is it mandatory to have the digital certificate issued from NICCA? Is it mandatory for the sender and receiver to have a NIC id? Required Hardware and Software to support S/MIME on client Machine How to send digitally signed and encrypted mail using Mozilla Thunderbird How to send a digitally signed ? How to send a digitally signed and encrypted ? How to Decrypt the message : How to export a public certificate from your DSC? How to upload Public Certificate to NIC repository? How to Install Java? Why I am Getting Popup, while saving draft? Why I am getting a Pop up, while doing spell check? I can digitally sign the mail but cannot encrypt it? I can Encrypt the mail but cannot digitally sign it? Which Class of certificate to apply for? (Refer Point No. 2 of NIC CA Form)... 37

2 1. What is S/MIME? Secure/Multipurpose Internet Mail Extensions (S/MIME) provides a consistent way for users to send and receive secure MIME data, using digital signatures for authentication, message integrity and non-repudiation and encryption for privacy and data security. 2. What is digital certificate? Digital Certificates are the electronic counterparts to driver licenses, passports and membership cards. You can present a Digital Certificate electronically to prove your identity or your right to access information or services online. Digital Certificates, bind an identity to a pair of electronic keys that can be used to encrypt and sign digital information. A Digital Certificate makes it possible to verify someone's claim that they have the right to use a given key, helping to prevent people from using phony keys to impersonate other users. Used in conjunction with encryption, Digital Certificates provide a more complete security solution, assuring the identity of all parties involved in a transaction. A Digital Certificate is issued by a Certification Authority (CA) and signed with the CA's private key. 3. What is an encrypted ? Ans: - Encrypted mail protects the privacy of the message by converting it from plain, readable text into cipher (scrambled) text. Only the recipient who has the private key that matches the public key you have used to encrypt the message can decipher the message. Encrypting a mail is a separate process from digitally signing a message. 4. Is it mandatory to use this service? No, it is not mandatory to use this service. This service is issued by NIC for users who want to digitally encrypt and sign their message for security. Digitally encrypted mails can only be decrypted by sender or receiver using their digital certificate. 5. What I need to do to start using S/MIME service? You need to have a digital certificate provided by NIC Certificate authority, which can be stored in a USB token or directly in your browser. The DSC form is available on While requesting for the DSC, please ensure that the address that you mention in the form is the address that you wish to bind with your DSC for e.g Also ensure that the you request for a DSC that contains both the Digital certificate and the encryption certificate (refer point no 3 in the form, select (tick mark) both the options i.e. individual (signing) and Encryption. Contact Person (NIC CA) : Mr. Sumeet Jethra (Ph ) Messaging Services, NIC 2

3 6. Is it mandatory to have the digital certificate issued from NICCA? No, it is not mandatory to get the certificate issued from NICCA, although we recommend use of a DSC from NICCA. If you wish to use this service over the web interface i.e. you can also take this certificate from any authority who is under CCA India If you wish to use this service over a POP/IMAP client like thunderbird, then a DSC from any other CA will also work. 7. Is it mandatory for the sender and receiver to have a NIC id? Yes, the sender and receiver both need to have a NIC id if you wish to use this service over the web interface. 8. Required Hardware and Software to support S/MIME on client Machine. Operating system Browser software Private-public keys with certificates Microsoft Windows XP or Vista or later Microsoft Internet Explorer, Version 7 or later Java Runtime Environment (JRE) 6 Update 7 or later One or more private-public key pair with certificates. Certificates are required and they must be in standard X.509 v3 format. Obtain keys and certificates from a CA for each Convergence user who will use the S/MIME features. The keys and their certificates are stored on the client machine or on a smart card. The public keys and certificates are also stored in NIC repository. Smart card software (only required when keys and certificates are stored on smart cards) ActivIdentity ActiveClient, Version 6.2, or Litronic NetSign 215 Reader CAC Compliant Smart card reader Any model of smart card reading device complying with ISO 7816 supported by the client machine and smart card software. Type of Certificate Class II 9. How to send digitally signed and encrypted mail using Mozilla Thunderbird. a) In Thunderbird, select from menu "Tools" > "Options" > "Advanced". Messaging Services, NIC 3

4 b) Click the "Certificates" tab > "Security Devices". A new window will open which displays the Security Devices. c) Click the "Load" button to load a new PCKS#11 Module. Type a name for the PKCS#11 Module or keep it default(new PKCS#11 Module) and click "Browse". d) Select the file "aetpkss1.dll" in c:\windows\system32 folder and click "Open", then "OK". e) Confirm the question if you want to install this security module with "OK". f) You will receive a message that the security module was installed. g) The security module now will be displayed in the list. h) Click "OK" to leave the Security Device Manager. i) Once the account is configured. Go to Tools Account Settings security Refer figure 9.1 Figure 9.1 Messaging Services, NIC 4

5 Click on select under Digital Signing. Refer Figure 9.1 Figure 9.2 After clicking on select it will ask for your Digital Token Password. Enter Password and click on ok. Refer figure 9.2 Figure 9.3 Click on ok Button to select your signing certificate. Refer figure 9.3. Figure 9.4 Messaging Services, NIC 5

6 An alert message will prompt, as shown in figure 9.4. Click on No Figure 9.5 Click on select button under Encryption. Refer figure 9.5. Messaging Services, NIC 6

7 Figure 9.6 Click on ok Button to select your signing certificate. Refer figure 9.6 Figure 9.7 Messaging Services, NIC 7

8 Click on Digital sign message, If you want to sign every message and click on Required button, if you want to encrypt every message. Finally click on ok to accept those settings. Figure 9.8 Click on Security Encrypt This Message (If you wish to send encrypted message). Refer figure 9.8 Digital signature will be automatically highlighted. Now Click on send to send your message. Messaging Services, NIC 8

9 Figure 9.9 If you have your token inserted in your computer, you will be able to open the encrypted by clicking on it as shown in the figure 9.9. The very first time you are accessing it, it will ask for token password. Messaging Services, NIC 9

10 10. How to send a digitally signed ? GO TO https://mail.gov.in (advanced view) Note: Prior to sending digitally signed /secure all steps mentioned in Annexure A need to be completed. Figure: 10.1 Login with your User ID and Password. Refer Fig Messaging Services, NIC 10

11 After logging in you will receive a popup window as below. (This window will appear very first time you access this site.) Figure: 10.2 Select the check box and click on Run. Refer Fig Figure: 10.3 Messaging Services, NIC 11

12 At this point you are logged in to mail.gov.in interface. This will be your secure webmail interface. Refer Fig Figure: 10.4 Click on write Refer Fig Messaging Services, NIC 12

13 Figure: 10.5 Fill the To: address, Subject and From. Click Security tab check Digitally Sign. Then Click on Send. Refer Fig Messaging Services, NIC 13

14 Figure: 10.6 After Clicking on Send it will ask for the token password. Fill token password in the POPUP window and click on Accept Refer Fig Messaging Services, NIC 14

15 Figure: 10.7 Veifying digital signed . Below figure illustartes the procedure to verify digitally signed . Double click on the which is signed and click on Sign logo Refer Fig Note: DIGITALLY SIGNED MAIL 1) You can send a signed message to anyone in the internet. 2) If you want to verify the digital signature sent by you or any user, you need to have your digital signature (Smart Token) with you. Messaging Services, NIC 15

16 11. How to send a digitally signed and encrypted ? GO TO https://mail.gov.in Figure: 11.1 Login with your User ID and Password. Refer Fig After logging in you will receive a popup window as below. (This window will appear very first time you access this mail.gov.in site.) Messaging Services, NIC 16

17 Figure: 11.2 Select the check box and click on Run. Refer Fig The Always trust content from the publisher needs to be selected only once. You will not be prompted for this screen again. Messaging Services, NIC 17

18 Figure: 11.3 At this point you are logged in to mail.gov.in interface. This will be your secure webmail interface. Refer Fig Messaging Services, NIC 18

19 Figure: 11.4 Go to Options tab. Refer Fig Messaging Services, NIC 19

20 Figure: 11.5 Click on Mail Local Account Security Select your certificate from the drop down box and check on Encrypt All mails During Send (If you want to encrypt all message you send) click on save. Refer Fig Messaging Services, NIC 20

21 Composing an encrypted message Figure: 11.6 Click on write to compose new message. Refer Fig Check if you want to encrypt and sign or only sign the message. Write down the address in To field. Write subject and type message in compose window. And click on send. It will ask you the token password in a POPUP window. Messaging Services, NIC 21

22 Figure: 11.7 At this point you have sent signed and encrypted message. Write down token password in the POPUP window and click on Accept Refer Fig Messaging Services, NIC 22

23 12. How to Decrypt the message : Click on the Encrypted message to open it. It will ask you for the Token Password in the POPUP window, if. Refer Fig If you have already verified your token password in current login session, it will not ask for token password. Figure: 12.1 Messaging Services, NIC 23

24 Figure: 12.2 Below screen shot is after verification of token password. Now you can see the encrypted message. Refer Fig Messaging Services, NIC 24

25 13. How to export a public certificate from your DSC? Insert your USB token/smart card in your computer. Figure 13.1 Go to Start Programs SafeSign Standard Token Administration utility. Refer Figure 13.1 Messaging Services, NIC 25

26 Figure 13.2 Double click on above highlighted token. (Ensure Token status as operational before double clicking ) Figure 13.3 Messaging Services, NIC 26

27 There will be 2 certificates (private and public) as shown in Figure 13.3 Double click on certificates one by one. Refer figure 13.3 Figure 13.4 Your encryption certificate will have Encipher secret keys. Refer Figure Now click on Save to file. Refer figure 13.4 Messaging Services, NIC 27

28 Figure 13.5 Write filename and click on save. Refer figure Messaging Services, NIC 28

29 Figure 13.6 Right click on the file Open with WordPad. Refer figure 13.6 Messaging Services, NIC 29

30 Figure 13.6 Messaging Services, NIC 30

31 14. How to upload Public Certificate to NIC repository? Figure 14.1 Login to https://msgapp.nic.in/cert/, upload your encryption certificate here. Refer fig14.1 Figure 14.2 Messaging Services, NIC 31

32 Browse for your certificate file and click on submit. If everything is OK you will receive following message. Refer fig Figure How to Install Java? If you are trying to access https://mail.gov.in from browsers other than IE (i.e. Firefox, Chrome, Safari, etc)), you will receive following message in popup. The server supports encryption and signing of messages, but these features are currently only available with Internet Explorer 7 and above The above message appears as this service is currently supported on IE only. After clicking ok you will be forwarded to your mailbox. Internet Explorer Users (IE 7 and above) The very first time you access https://mail.gov.in, it will ask for java installation, if you are connected to internet. If you don t have internet access in your PC, you have to download java version 6 from Click yes to proceed. Messaging Services, NIC 32

33 Figure 15.1 Click on Install to proceed with java installation. Refer Figure Java installation will proceed with following screen. Refer Figure 15.2 Figure 15.2 Messaging Services, NIC 33

34 Figure 15.3 Click close to finish java installation. Refer Fig Figure 15.4 Check Always trust content from this publisher radio button and click on Run. Refer Figure Messaging Services, NIC 34

35 Figure 15.5 You will be forwarded to you INBOX now. Refer figure Why I am Getting Popup, while saving draft? Ans : This warning message will pop up, if you have not inserted your token in PC while saving a draft. If you don t want to encrypt your draft click on save anyway button. Your draft will be saved as unencrypted. Messaging Services, NIC 35

36 Figure Why I am getting a Pop up, while doing spell check? Ans. : To be spell-checked, the message must be sent without encryption to the mail server. The spell checker can only work on plain text. As our servers use Secure Socket Layer (SSL) transmission, the message is protected as it is sent. However, during spell-checking, it is still exposed in plain text inside the mail server. Messaging Services, NIC 36

37 Figure I can digitally sign the mail but cannot encrypt it? Ans. : Ensure that you have encryption certificate along with signing certificate in your DSC. How to ensure <insert> 19. I can Encrypt the mail but cannot digitally sign it? Ans. : Ensure that you have signing certificate along with encryption certificate in your DSC. How to ensure (refer point no 17 above) 20. Which Class of certificate to apply for? (Refer Point No. 2 of NIC CA Form) Ans. : Class II Messaging Services, NIC 37

Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)

Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM) Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email

More information

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

I. Configuring Digital signature certificate in Microsoft Outlook 2003: I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to

More information

NICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express

NICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express NICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express 1. DESCRIPTION This guide explains the procedure for using the NICCA issued digital certificate

More information

PROCEDURE FOR DSC CONFIGURATION. A. Installation of the driver has to be done for the first time and only once.

PROCEDURE FOR DSC CONFIGURATION. A. Installation of the driver has to be done for the first time and only once. PROCEDURE FOR DSC CONFIGURATION 1. INSTALL GEMALTO TOKEN DRIVER A. Installation of the driver has to be done for the first time and only once. B. Open the Browser and go to http://nicca.nic.in C. Click

More information

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security

More information

Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)

Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM

More information

How To Set Up Your Email

How To Set Up Your Email How To Set Up Your Email Contents Page Microsoft Outlook 1 Outlook Express 6 7 Webmail (this is for those who do not use an email programme) 12 Windows Live Mail 22 Mozilla Thunderbird 26 Windows Mail

More information

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid) The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid) Wherever Security relies on Identity,

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

Using etoken for Securing E-mails Using Outlook and Outlook Express

Using etoken for Securing E-mails Using Outlook and Outlook Express Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered

More information

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of

More information

HMRC Secure Electronic Transfer (SET)

HMRC Secure Electronic Transfer (SET) HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government

More information

Outlook Web Access 2003 Remote User Guide

Outlook Web Access 2003 Remote User Guide UNITED STATES COAST GUARD Outlook Web Access 2003 Remote User Guide Using Common Access Card Access TISCOM TIS-42 07/29/2008 Version 1.0 CAC Enabled Outlook Web Access CAC Enabled OWA is a way to view

More information

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account? Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply

More information

ADFS Integration Guidelines

ADFS Integration Guidelines ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS

More information

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3 White Paper Fabasoft Folio 2015 Update Rollup 3 Copyright Fabasoft R&D GmbH, Linz, Austria, 2016. All rights reserved. All hardware and software names used are registered trade names and/or registered

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

Outlook Web Access Tipsheets

Outlook Web Access Tipsheets You can use a Web browser to access your Outlook mailbox from any computer with an Internet connection. You can use Outlook Web Access with Microsoft Internet Explorer, Mozilla Firefox and many other browsers.

More information

E-mail Encryption. How do I send my e-mail encryption key?

E-mail Encryption. How do I send my e-mail encryption key? E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout

More information

Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol

More information

Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs

Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs Rev. 06 JAN. 2008 Document Control User Guide: Using Outlook within Skandocs Introduction By referring to this user guide, it is assumed that the user has an advanced working knowledge of Skandocs (i.e.

More information

The IceWarp SSL Certificate Process

The IceWarp SSL Certificate Process IceWarp Unified Communications The IceWarp SSL Certificate Process Version 10.3 Printed on 26 November, 2010 Contents The IceWarp SSL Certificate Process 1 Choosing the Proper Certificate Type... 2 Creating

More information

IceWarp SSL Certificate Process

IceWarp SSL Certificate Process IceWarp Unified Communications IceWarp SSL Certificate Process Version 10.4 Printed on 26 June, 2012 Contents IceWarp SSL Certificate Process 1 Choosing the Proper Certificate Type... 2 Creating your

More information

Zarafa S/MIME Webaccess Plugin User Manual. Client side configuration and usage.

Zarafa S/MIME Webaccess Plugin User Manual. Client side configuration and usage. Zarafa S/MIME Webaccess Plugin User Manual Client side configuration and usage. Zarafa S/MIME Webaccess plugin provides S/MIME functionality, for receiving and sending encrypted and / or sign messages

More information

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop. User Manual Follow these simple steps to install, configure, and use. Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile

More information

How To Configure Email Using Different Email Clients

How To Configure Email Using Different Email Clients How To Configure Email Using Different Email Clients This document will show step by step instructions for setting up and updating email accounts using different Email Clients. Always remember to verify

More information

ScanShell.Net Install Guide

ScanShell.Net Install Guide ScanShell.Net Install Guide Please install the software first - DO NOT PLUG IN THE SCANNER The scanner has been carefully packaged to avoid damage during transportation. Before operating the scanner, please

More information

Personal Secure Email Certificate

Personal Secure Email Certificate Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

Configuring your email client to connect to your Exchange mailbox

Configuring your email client to connect to your Exchange mailbox Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add

More information

Shakambaree Technologies Pvt. Ltd.

Shakambaree Technologies Pvt. Ltd. Welcome to Support Express by Shakambaree Technologies Pvt. Ltd. Introduction: This document is our sincere effort to put in some regular issues faced by a Digital Signature and USB Token user doing on

More information

Manual for configuring NIC VPN in Windows OS

Manual for configuring NIC VPN in Windows OS Manual for configuring NIC VPN in Windows OS NIC is introducing a new web based VPN interface to allow s to connect to NICNET through VPN. Apart from existing Client based VPN service, this new interface

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Simple Guide to Digital Signatures

Simple Guide to Digital Signatures Simple Guide to Digital Signatures Rohas Nagpal Asian School of Cyber Laws About the author Rohas Nagpal is the founder President of Asian School of Cyber Laws. He advises Governments and corporates around

More information

DOCUMENT MANAGEMENT SYSTEM

DOCUMENT MANAGEMENT SYSTEM DOCUMENT MANAGEMENT SYSTEM USER S MANUAL By: MIS Department Software Division Page 1 of 14 1. Overview Document Management System is a powerful web based file manager and storage utility. It was developed

More information

johnireland@eircom.net

johnireland@eircom.net Email Electronic mail is the transmission of mainly text based messages across networks. This can be within a particular network - internal mail - or between networks - external mail. The most common network

More information

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

1. Open the preferences screen by opening the Mail menu and selecting Preferences... Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window

More information

Alberni Valley IT Services http://www.avits.ca admin@avits.ca. Virtual domain E-mail information.

Alberni Valley IT Services http://www.avits.ca admin@avits.ca. Virtual domain E-mail information. Alberni Valley IT Services http://www.avits.ca admin@avits.ca Virtual domain E-mail information. Welcome! This document outlines information necessary for you to send and receive E-mail for your virtual

More information

User Guide May 2013. Using Certificates in Outlook Express

User Guide May 2013. Using Certificates in Outlook Express User Guide May 2013 Using Certificates in Outlook Express FIGU RES... FIGURES.... T I TL E..............................................................................................................................

More information

Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points

Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various

More information

SSL Guide. (Secure Socket Layer)

SSL Guide. (Secure Socket Layer) SSL Guide (Secure Socket Layer) To find basic information about network and advanced network features of your Brother machine: uu Network User's Guide. To download the latest manual, please visit the Brother

More information

Internet E-Mail Encryption S/Mime Standard

Internet E-Mail Encryption S/Mime Standard Internet E-Mail Encryption S/Mime Standard Disclaimer: Successfully setting up encryption functions in most e-mail clients is usually not a problematic task. However, it should be noted that, when configuring

More information

Directorate Of Health Service s ONLINE NURSING HOME & CLINICAL ESTABLISHMENT LICENSING SYSTEM

Directorate Of Health Service s ONLINE NURSING HOME & CLINICAL ESTABLISHMENT LICENSING SYSTEM Directorate Of Health Service s ONLINE NURSING HOME & CLINICAL ESTABLISHMENT LICENSING SYSTEM A User Manual for Digital Signature 1 of 14 Index S. No. Content Name Page No. 1 What is Digital Signature?

More information

ACCEPT THE SECURITY CERTIFICATE FOR THE WEB FILTER

ACCEPT THE SECURITY CERTIFICATE FOR THE WEB FILTER ACCEPT THE SECURITY CERTIFICATE FOR THE WEB FILTER ACCESS THE WEB FILTER VIA ITS LAN 1 IP ADDRESS ACCEPT THE SECURITY CERTIFICATE FOR THE WEB FILTER Access the Web Filter via its LAN 1 IP Address A. Launch

More information

Email Client configuration and migration Guide Setting up Thunderbird 3.1

Email Client configuration and migration Guide Setting up Thunderbird 3.1 Email Client configuration and migration Guide Setting up Thunderbird 3.1 1. Open Mozilla Thunderbird. : 1. On the Edit menu, click Account Settings. 2. On the Account Settings page, under Account Actions,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL

OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL United States Army Special Operations Command (USASOC) Special Operations Forces Information Technology Enterprise Contracts (SITEC) OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL Prepared by:

More information

PKI Contacts PKI for Fraunhofer Contacts

PKI Contacts PKI for Fraunhofer Contacts Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 15.10.2013

More information

USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4

USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4 USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4 March 2014 TABLE OF CONTENTS Chapter 1 Welcome... 4 Introducing WWPass Security for Email (Outlook)... 5 Supported Outlook Products...

More information

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7 Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access

More information

Trusted Relationships. Sending Invitations. Sending Invitations from Outlook

Trusted Relationships. Sending Invitations. Sending Invitations from Outlook Trusted Relationships Establishing Trusted Relationships through the invitation process are core to the Securencrypt security process. This insures that you can only share secure documents with someone

More information

STAFF MAIL. User Guide. Please see the next page for an important note

STAFF MAIL. User Guide. Please see the next page for an important note STAFF MAIL User Guide Please see the next page for an important note Important note: This user guide was written to support the use of the original Staffmail system. A newly rewritten version is in preparation

More information

TrustKey Tool User Manual

TrustKey Tool User Manual TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...

More information

Section 1.0 Getting Started with the Vālant EMR. Contents

Section 1.0 Getting Started with the Vālant EMR. Contents Section 1.0 Getting Started with the Vālant EMR Contents Getting Started with the Valant EMR application:... 2 Hardware Requirements for the Vālant EMR:... 3 Software Requirements for the Vālant EMR:...

More information

TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E

TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E U S E R G U I D E TCS-CA Outlook Express Configuration [VERSION 1.0] C O N T E N T S 1 DESCRIPTION... 3 2 OUTLOOK EXPRESS AND CERTIFICATES... 4 3 ENABLING SECURITY SETTINGS FOR MAIL ACCOUNT... 5 3.1 Settings

More information

Using Rackspace Webmail

Using Rackspace Webmail Using Rackspace Webmail Contents 1. Logging into Rackspace Webmail... 1 2. Add/Change your Signature... 2 3. Configure audible notifications... 5 4. Manage Auto-Reply ( Out of Office /Vacation responder)...

More information

isecuremail User Guide for iphone

isecuremail User Guide for iphone isecuremail User Guide for iphone Page 1 CONTENTS Chapter 1: Welcome... 4 Chapter 2: Getting Started... 5 Compatability... 5 Preliminary Steps... 5 Setting up a POP3 / IMAP4/ Exchange Email Account...

More information

Using Voltage SecureMail

Using Voltage SecureMail Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.

More information

PC Requirements and Technical Help. Q1. How do I clear the browser s cache?

PC Requirements and Technical Help. Q1. How do I clear the browser s cache? Q1. How do I clear the browser s cache? A1. Clear your browser's cache, and close all other applications that are running in your PC to free up memory space. For instructions on clearing cache (temporary

More information

Configuring an Email Client to Connect to CASS Mail Servers

Configuring an Email Client to Connect to CASS Mail Servers Configuring an Email Client to Connect to CASS Mail Servers Table of Contents Introduction... 2 Webmail... 2 Settings... 2 Forwarding... 2 Email Client Configuration... 3 Outlook 2003... 3 Outlook 2007...

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2. Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions

More information

Personal Secure Email Certificate

Personal Secure Email Certificate Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Software version: 10.5 Date of Issue: May 2012 Document issue: 1.0 Copyright 2010-2012 Entrust. All rights reserved. Entrust

More information

Outlook Web Access (OWA) for Staff

Outlook Web Access (OWA) for Staff Outlook Web Access (OWA) for Staff Note:The full version runs on Internet Explorer (IE) and the Light version runs on all other browsers (Firefox, Safari, Chrome etc). Web access URL / note the s after

More information

PrivaSphere Gateway Certificate Authority (GW CA)

PrivaSphere Gateway Certificate Authority (GW CA) PrivaSphere Gateway Certificate Authority (GW CA) Send and receive secure emails with your email program through restricting firewalls using SMIME gateway functionalities. PrivaSphere Secure Messaging

More information

Registering the Digital Signature Certificate for Bank Officials

Registering the Digital Signature Certificate for Bank Officials Registering the Digital Signature Certificate for Bank Officials Overview When Bank officials login to the MCA21 application for the first time, they need to register their Digital Signature Certificate

More information

HOW WILL I KNOW THAT I SHOULD USE THE IAS EMAIL CONTINUITY SERVICE? https://web.ias.edu/updateme/

HOW WILL I KNOW THAT I SHOULD USE THE IAS EMAIL CONTINUITY SERVICE? https://web.ias.edu/updateme/ WHEN DO I NEED TO ACCESS THE IAS EMAIL CONTINUITY SERVICE? This service is provided to address the following actions during periods where the IAS email servers are offline: 1. If you need to check for

More information

Configure Microsoft Outlook 2007 to use

Configure Microsoft Outlook 2007 to use Configure Microsoft Outlook 2007 to use Exchange Email Setting Important 1. Before configure your Microsoft outlook 2007 to use exhange you MUST log into the Web Exchange page to login and change your

More information

Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file

Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file You may use your Medium Assurance Certificate(s) on any computer that you wish to by importing them

More information

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6 MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack

More information

Vodafone Hosted Services. Getting your email. User guide

Vodafone Hosted Services. Getting your email. User guide Vodafone Hosted Services Getting your email User guide Welcome. This guide will show you how to get your email, now that it is hosted by Vodafone Hosted Services. Once you ve set it up, you will be able

More information

Access to Webmail services via a Non Trust Computer

Access to Webmail services via a Non Trust Computer Access to Webmail services via a Non Trust Computer Aintree Outlook Web Access has been provided via the AppGate SSL Portal, this service can be accessed from any computer on the Internet. Two factor SMS

More information

Entrust Managed Services PKI Administrator Guide

Entrust Managed Services PKI Administrator Guide Entrust Managed Services PKI Entrust Managed Services PKI Administrator Guide Document issue: 3.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered

More information

Installation Instructions for 9555 USB Driver

Installation Instructions for 9555 USB Driver Prior to using the data modem features of your 9555 handset; you must first install the VCOMPORT 9555 USB Driver. This driver is compatible with: Windows XP Service Pack 2, Windows 2000 Service Pack 4,

More information

How to configure your Windows PC post migrating to Microsoft Office 365

How to configure your Windows PC post migrating to Microsoft Office 365 How to configure your Windows PC post migrating to Microsoft Office 365 1 Contents Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 4 Several different Microsoft Office 365

More information

OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL

OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL United States Army Special Operations Command (USASOC) Special Operations Forces Information Technology Enterprise Contracts (SITEC) OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL Prepared by:

More information

User Manual. For. Digitally Signing of your application

User Manual. For. Digitally Signing of your application User Manual For Digitally Signing of your application How to Digital Signature In your Application Digital Signature: A digital signature is an electronic form of a signature that can be used to authenticate

More information

ID Pictures collection for Membership card of ARBH- KBHB/LFH/VHL

ID Pictures collection for Membership card of ARBH- KBHB/LFH/VHL ID Pictures collection for Membership card of ARBH- KBHB/LFH/VHL 1 Table of Contents 1. Hardware /software... 3 2. Software verification... 4 2.1 installing the EID reader middleware... 4 2.2. Java runtime

More information

DigitalPersona Privacy Manager Pro

DigitalPersona Privacy Manager Pro DigitalPersona Privacy Manager Pro DigitalPersona Privacy Manager Pro is a centrally-managed secure communication solution for businesses. It allows sensitive documents and communications to remain private,

More information

Setting Up Microsoft Outlook 2007 with GroupWise

Setting Up Microsoft Outlook 2007 with GroupWise Setting Up Microsoft Outlook 2007 with GroupWise This page is one of several you might come across on our website discussing how to setup Outlook with GroupWise. We provide several sets of instructions

More information

Learning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE

Learning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE Learning Management System (LMS) Quick Tips Contents Process Overview... 2 Sign into the LMS... 3 Troubleshooting... 5 Required Software... 5 Mobile devices are not supported... 5 Using the Check System

More information

E-mail Encryption Recipient Guidelines

E-mail Encryption Recipient Guidelines E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies

More information

Configuring Thunderbird for Flinders Mail at home.

Configuring Thunderbird for Flinders Mail at home. Configuring Thunderbird for Flinders Mail at home. Downloading Thunderbird can be downloaded from the Mozilla web site located at http://www.mozilla.org/download.html This web site also contains links

More information

Can I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.

Can I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID. How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined

More information

MSGCU SECURE MESSAGE CENTER

MSGCU SECURE MESSAGE CENTER MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and

More information

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures A. Secure File Transfer Protocol (SFTP) Procedures Overview IEHP utilizes our Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits to using

More information

Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2007

Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2007 Email Signing and Encryption using Microsoft outlook 2007 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.

More information

ANZ TRANSACTIVE GETTING STARTED GUIDE AUSTRALIA & NEW ZEALAND

ANZ TRANSACTIVE GETTING STARTED GUIDE AUSTRALIA & NEW ZEALAND ANZ TRANSACTIVE GETTING STARTED GUIDE AUSTRALIA & NEW ZEALAND TRANS-TASMAN 11.2015 Simplifying and connecting your transaction banking across Australia and New Zealand DISCLAIMER > > References to Australia(n)

More information

Manual for Installing CA Root Certificates and User Digital

Manual for Installing CA Root Certificates and User Digital Manual for Installing CA Root Certificates and User Digital Certificate A. Installing the CA root certificate 1. Download the CCA, NICCA, NIC Sub CA and VPNCA root certificates from the website http://vpn.nic.in

More information

Getting Started with University Gmail

Getting Started with University Gmail Getting Started with University Gmail USER GUIDE V1.0 User Services IT Services University of Malta 2013 User Services IT Services University of Malta Msida MSD 2080 Malta May only be reproduced with permission

More information

SafeNet Authentication Client (Mac)

SafeNet Authentication Client (Mac) SafeNet Authentication Client (Mac) Version 8.2 SP2 Revision A Administrator s Guide 1 Copyright 2014 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document

More information

E-CERT C ONTROL M ANAGER

E-CERT C ONTROL M ANAGER E-CERT C ONTROL M ANAGER for e-cert on Smart ID Card I NSTALLATION G UIDE Version v1.7 Copyright 2003 Hongkong Post CONTENTS Introduction About e-cert Control Manager... 3 Features... 3 System requirements...

More information

X.509 Certificate Generator User Manual

X.509 Certificate Generator User Manual X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on

More information

Token User Guide. Version 1.0/ July 2013

Token User Guide. Version 1.0/ July 2013 Token User Guide Version 1.0/ July 2013 Index Overview... 3 Usage requirements... 4 KIT contents... 5 Smart Card installation... 6 Reader driver installation... 7 In the case of Windows XP... 7 In the

More information

Clearswift Information Governance

Clearswift Information Governance Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration

More information

Pre requisites for Digital Signature

Pre requisites for Digital Signature Pre requisites for Digital Signature Know about Digital Signature Certificate You should have a legally valid Class III digital certificate as per Indian IT Act from the licensed Certifying Authorities

More information

New World Construction FTP service User Guide

New World Construction FTP service User Guide New World Construction FTP service User Guide A. Introduction... 2 B. Logging In... 4 C. Uploading Files... 5 D. Sending Files... 6 E. Tracking Downloads... 10 F. Receiving Files... 11 G. Setting Download

More information

Welcome To MORTH e-procurement https://morth.eproc.in

Welcome To MORTH e-procurement https://morth.eproc.in Welcome To MORTH e-procurement https://morth.eproc.in Agenda Pre-Requisites Before Login to System Supplier Enrollment Register Digital Certificate Login Pre-Requisites Before Logging in Minimum System

More information