iq.suite Crypt - Server-based encryption - Efficient encryption for Lotus Domino
|
|
|
- Peter Moody
- 9 years ago
- Views:
Transcription
1 iq.suite Crypt - Server-based encryption - Efficient encryption for Lotus Domino
2 Contents 1 Executive Summary Implementation in iq.suite Crypt PGP Implementation Scenarios for GnuPG S/MIME Implementation Scenarios for S/MIME Procedure with S/MIME iq.suite Crypt in a Nutshell GROUP Business Software AG Page 1
3 1 Executive Summary The amount of communication handled via has strongly increased in the last couple of years and is still growing. There is hardly a company that does not use to run its business processes both within the company and with external business partners. In addition to short response times, constant reachability and cost-efficient communication, major issues also include the security of s and the protection of confidential contents. Many companies therefore rely on security solutions that also include encrypting s. To be efficient, these solutions must meet the following requirements: Server-based content checking (virus protection, protection against spam/junk mail, protection against industrial espionage, etc.) encryption (e.g. for confidential offers, contract data, etc.) Low administration requirements The present whitepaper provides an overview of the issues related to the implementation of the PGP and S/MIME encryption standards within iq.suite Crypt for Domino. 2 Implementation in iq.suite Crypt iq.suite Crypt is one of the iq.suite modules. When used in combination with further iq.suite modules, it is possible to check encrypted mails for viruses (using iq.suite Watchdog) or specific contents (using iq.suite Wall). iq.suite Crypt includes the following functionalities: As all of the iq.suite modules, iq.suite Crypt is a server-based software. This ensures secure communication without active actions required from the end user. Only a single certificate/key is required for the entire company, the company certificate or company key. 1 iq.suite Crypt enables automatic encryption/decryption as well as signing and signature verification (validation with S/MIME only). iq.suite Crypt supports the PGP/GnuPG encryption standard for Windows, Linux, AIX and Sun Solaris as well as the S/MIME standard for Windows, Linux and SUN Solaris. 2.1 PGP Implementation iq.suite Crypt allows to encrypt mails with PGP or GnuPG, to receive and decrypt PGP or GnuPGP-encrypted mails and to automatically extract public keys from incoming s and install them into the key ring. 1 S/MIME usually refers to certificates while PGP or GnuPG typically use the term "key". GROUP Business Software AG Page 2
4 By analogy, all of the information provided for GnuPG also applies to any other PGP variant. To use GnuPGP within iq.suite Crypt, the following requirements have to be met: 1. GnuPGP has been installed separately. 2. A valid license for the iq.suite Crypt module is available. 3. The system environment path includes the appropriate GnuPG directory. To use GnuPGP, the configuration for iq.suite Crypt is based on policies, i.e. the rules for encryption, decryption and importing keys can be configured specifically for each user, user group or the entire company Scenarios for GnuPG This section describes various application scenarios for importing keys and encrypting/decrypting outgoing/incoming mails using GnuPG Encrypting Outgoing s Prerequisites: a) The recipient's public key is available in the key ring and is "ultimately" trusted to or it is signed with the standard or company key. For further information on confidence levels, types of signatures and their meaning, please refer to the GnuPGP Documentation. b) The iq.suite Crypt job "Encryption with GnuPG" is enabled for the applicable operating system. c) Appropriate rules have been configured for all recipients in the "Encryption with GnuPG" iq.suite Crypt job. If required, create and activate multiple jobs to do so. d) The program path for calling cmd.exe has been set. Attention: The different Windows versions use different names for the subdirectories. e) The path for calling gpg.exe has been set. f) The path to the public key ring must have been set in the parameters (Home directory). g) A detailed description of the parameters and settings is to be found in the Online Help or Administration Manual. Encryption procedure: a) The user sends his mail in the usual way. b) On the server, iq.suite Crypt fetches the public key for the mail's recipient from the GnuPGP key ring. c) The mail is encrypted (scenario for S/MIME see Encrypting Outgoing Mail). d) The mail is delivered to the recipient. GROUP Business Software AG Page 3
5 In the iq.suite Crypt job configuration document, a number of additional options are available: Provided the communication partner also runs iq.suite Crypt or another serverbased encryption module that uses GnuPG for encryption, the recipient-to-key mapping can be explicitly specified. Also a selection between PGP/MIME and PGP/Inline is possible. With PGP/Inline message text and attachment of an are encrypted separately. You can indicate whether the encryption is performed within the 's body text or if the encrypted data is sent as attachment. The name of the attachment is freely selectable. PGP/MIME enables the encryption of the whole content as one complete block (with exception of the header) Decrypting Incoming s Prerequisites: a) The iq.suite Crypt job "Decryption with GnuPG" is active. b) Appropriate rules have been configured for all recipients in the "Decryption with GnuPG" iq.suite Crypt job. If required, create and activate multiple jobs to do so. c) The program path for calling cmd.exe has been set. Attention: The different Windows versions use different names for the subdirectories. d) The path for calling gpg.exe has been set. The important parameter is "echo %PASSWORD%". e) The path to the private key ring must have been set in the parameters (Home directory). f) The password for the standard key or the private company key must have been set. g) A detailed description of the parameters and settings is to be found in the Online Help or Administration Manual. Decryption procedure: a) The key used in the incoming is identified through the address. b) The incoming mail is decrypted with the private company key. c) The decrypted mail is delivered Automatic Key Import For encrypted s from a communication partner who sends his public key along with the mail, iq.suite Crypt allows to automatically extract this public key from the mail and import it into the key ring. Prerequisites: a) The sender's public key is included in the body text of the mail, e.g. as clearly identifiable text block, or as attachment. b) The iq.suite Crypt job "Import Key for GnuPG" (check for appropriate operating system version!) is active. GROUP Business Software AG Page 4
6 c) The program path for calling cmd.exe has been set. Attention: The different Windows versions use different names for the subdirectories. d) The program newkey.cmd must be located in the GnuPGP program path. newkey.cmd is a batch file. The program calls included in this batch file require the corresponding path to have been set. A sample newkey.cmd file is to be found in the job document under the Misc. tab. e) The path to the public key ring must have been set in the parameters (Home directory). f) After successful import, the corresponding rules must have been configured for the recipients in the "Encryption with GnuPG" iq.suite Crypt job so that the imported keys can be used for encryption. If required, create and activate multiple jobs to do so. The trust status for newly imported keys has to be set by the Administrator. g) A detailed description of the parameters and settings is to be found in the Online Help or Administration Manual. Key import procedure: a) The sender's public key included in the mail is extracted from the mail. b) The public key is imported into the key ring. c) Where set accordingly, the Administrator receives a notification of the successful completion of the key import procedure. d) If sent encrypted, the mail can now be decrypted. e) The mail is delivered to the recipient. The imported key has to be assigned "ultimate trust" by the Administrator or it has to be signed with the standard (company) key. Neither the signature nor the definition of the trust status is performed automatically. 2.2 S/MIME Implementation iq.suite Crypt includes a built-in S/MIME interface. To use S/MIME within iq.suite Crypt, the following requirements have to be met: The operating system is Windows 2000/2003, XP, Linux or SUN Solaris. A valid license for the "iq.suite Crypt with S/MIME" module is available. The system environment path contains the smime directory, as all programs required are copied to that directory by the Setup procedure. A certificate (pkcs12 format) from a CA (Certification Authority) that is entitled to issue and sign user certificates to be used for encryption. In that context, this certificate is also referred to as Issuer Certificate (root.pfx). It is used by iq.suite Crypt to create the internal private user certificates that can be used to sign outgoing s. The issuer certificate has to be located as pfx file (pkcs12 format) in the GROUP Business Software AG Page 5
7 smime directory. Note: During installation, a test certificate is stored in the \smime\testcertificates directory. A company certificate (pkcs12 format) that can be used to encrypt s, created and signed by the CA above (company.pfx). It is used by iq.suite Crypt as template for the internal private user certificates. The company certificate is also used to decrypt incoming encrypted s. The company certificate has to be located as pfx file (pkcs12 format) in the smime directory. Note: During installation, a test certificate is stored in the \smime\testcertificates directory. For the administration of public certificates, the key database g_cert.nsf must be available on the local server. When processing incoming signed mails, the signature's certificate data can be automatically stored in the key database for further use if required. If a yet unknown certificate is required, it can be searched for in an appropriate directory using an LDAP server. The certificate is then stored in the database. An entry in the LDAP directory has to include at least the address and the certificate of the corresponding person. IBM Lotus Domino can be used as LDAP server. To use S/MIME, the configuration for iq.suite Crypt is based on policies, i.e. the rules for encryption, decryption, signatures and the verification of signatures can be configured specifically for each user, user group or the entire company Scenarios for S/MIME This section describes various application scenarios for outgoing/incoming mails where S/MIME is used for encryption/decryption, signing and the verification of signatures Encrypting Outgoing Mails Prerequisites: a) The recipient certificate is available in the key database g_cert.nsf or accessible via LDAP and identifiable through the address. b) The iq.suite Crypt job "Encrypt with S/MIME is active. c) Appropriate rules have been configured for all recipients in the "Encrypt with S/MIME" iq.suite Crypt job. If required, create and activate multiple jobs to do so. d) The names of the company and issuer certificates are to be explicitly specified in the job parameters. For encryption, only the company certificate's password is needed (can be set with the %password% variable). The issuer certificate's password is needed for S/MIME signatures only and can be set with the %issuerpassword% variable. e) When using an LDAP server, make sure the address (IP or DNS name) and the port for the LDAP server are set correctly (ldapserver and ldapserverport parameters). f) As an option, the "-signmessage" parameter can be used to set whether or not an encrypted is also to be automatically signed. GROUP Business Software AG Page 6
8 g) A detailed description of the parameters and settings is to be found in the Online Help or Administration Manual. Encryption procedure: a) The user sends his mail in the usual way. b) On the server, the iq.suite Crypt S/MIME interface fetches the public key for the mail's recipient from the key database or the LDAP server (or the local [Cache DB] buffer in case multiple mails are sent at short intervals). c) The mail is encrypted (for the PGP scenario, also refer to Encrypting Outgoing s). d) The is delivered to the recipient. Additional options are available in the configuration document for the iq.suite Crypt job: Provided the communication partner also runs iq.suite Crypt or another serverbased encryption module that uses a company certificate for encryption, the recipient-to-key mapping can be explicitly specified (also refer to Procedure with S/MIME) Signing Outgoing Mails Prerequisites: a) The company certificate and the associated issuer certificate are located in the smime directory as *.pfx files, e.g. company.pfx and root.pfx. The passwords for both certificates have been set with the %Password% and %Issuerpassword% variables. b) The iq.suite Crypt job "Sign S/MIME Outgoing Message" is configured and active. c) Important: In the job document, both the parameters --from = %FROM% and --outputformat=clearsigned have been set. d) In the "Sign S/MIME Outgoing Message" iq.suite Crypt job, the corresponding rules must have been configured for the recipients. If required, create and activate multiple jobs to do so. e) A detailed description of the parameters and settings is to be found in the Online Help or Administration Manual. Signing procedure: a) The user sends his mail in the usual way. b) A certificate for the sender of the is created "on the fly", i.e. in the following steps: i) Open company certificate. ii) Change address in the certificate, i.e. the existing company address is replaced with sender's address. In addition, the series number in the company certificate is changed. iii) The new certificate is signed with the issuer certificate (to be found in the smime directory). GROUP Business Software AG Page 7
9 c) The new certificate is saved as new file in pkcs12 format: <from>_<domain part of the issuer certificate>.pfx The name "from" is derived from the --from = %FROM% parameter in the job document. Example: john.smith_belle.view.pfx If a pfx file with the same name already exists, that file is used. The new certificates are stored in the smime directory. A separate subdirectory is created for each new certificate, with the two first letters of the user name used as subdirectory name. If these two letters are the same for several users, the new certificates are stored in a common subdirectory. d) The sender's data is signed with the new certificate or the existing one. e) The data is sent. The recipient is able to read the mail and receives a message that the mail has been signed. To return an encrypted answer to the sender, the certificate needs to be made available to the recipient's mail system in such a way that it can be used for encryption. In the case of Outlook, this is the Windows Certificate store, but it can also be an LDAP directory. For details, please refer to the corresponding mail client manuals. GROUP Business Software AG Page 8
10 1. Internal sender sends Based on sender/recipient constellation iq.suite recognises that the should be signed. 3. The company certificate will be duplicated. 4. The address in the duplicated company certificate will be replaced by senders address. 5. The modified duplicated company certificate will be signed with a ROOT certificate. 6. The modified certificate will be stored in the file system, next to the company s certificate. 7. The modified certificate will be used to sign the . GROUP Business Software AG Page 9
11 Encrypting and Signing Outgoing Mails There two possible procedures: The outgoing mail is encrypted and signed with a single job. An outgoing encrypted is also automatically signed; see Signing Outgoing Mails with S/MIME. Under Operations, the mode has to be changed from Sign to Encrypt. This is the recommended procedure. Alternatively, it is possible to define two mail reception jobs for different user groups: one job for a user group that receives signed mails only (see Signing Outgoing Mails with S/MIME) and another one for a user group that only receives encrypted but unsigned mails (see Encrypting Outgoing Mail). Both of the user groups have to be disjoint from each other. If there are users included in both groups, use the first procedure Decrypting Incoming Mails Prerequisites: a) The iq.suite Crypt job "Decrypt S/MIME Message" is active. b) Appropriate rules have been configured for all recipients in the "Decrypt S/MIME Message" iq.suite Crypt job. If required, create and activate multiple jobs to do so. c) A detailed description of the parameters and settings is to be found in the Online Help or Administration Manual. Decryption procedure: a) The issuer name is used to identify the certificate used in the incoming mail. b) The decryption procedure automatically includes a verification of the signature (see Steps a through d under Verifying Incoming Mail Signature Signature verification procedure). If the mail has been signed with a certificate not yet included in the g_cert.nsf key database, it is imported into the database and then verified. From then on, it is possible to send encrypted mails to the sender. If the certificate already exists, it is verified. c) Then, the mail is decrypted with the company certificate (company.pfx). d) The decrypted mail is delivered. e) At the end of the body text, the recipient of the mail is provided with a report on the successful decryption and signature verification Verifying Incoming Mail Signature Prerequisites: a) The iq.suite Crypt job "Verify S/MIME Signature" is active. b) Appropriate rules have been configured for the recipients in the "Verify S/MIME Signature" iq.suite Crypt job. If required, create and activate multiple jobs to do so. GROUP Business Software AG Page 10
12 c) A detailed description of the parameters and settings is to be found in the Online Help or Administration Manual. Signature verification procedure: a) The certificate/signature is extracted from the incoming mail. In case the sender certificate is not part of the , it can be retrieved from an LDAP server (if available) or the Cache DB. b) If the certificate is not found in the g_cert.nsf, it is imported into the database. From then on, it is possible to send encrypted mails to the sender (see Encrypting Outgoing Mail with S/MIME). c) The sender certificate is used to verify the signed data: d) The systems first checks whether the certificate matches the signature (using mail address and certificate number). e) It then checks whether the sender matches the certificate. f) Finally, it creates a report on the signature verification (Steps c to e). g) The sender's signature is removed from the mail and the report is added to the mail. h) The mail is delivered to the recipient Decrypting Incoming Mails with Signature Verification The decryption of incoming s automatically includes the verification of the signature, see Decrypting Incoming Mails with S/MIME. Nonetheless, a separate signature verification job should also be available. Incoming mails can be both unencrypted and unsigned or encrypted only or signed only. The important point is to run the corresponding iq.suite jobs in the appropriate order, i.e. the decryption job before the signature verification job. The " noverify" parameter can be used to configure an encryption-only job, i.e. without signature verification. 2.3 Procedure with S/MIME Perform the following steps to set up an S/MIME-based connection with a future communication partner: Activate the corresponding Crypt job "Verify S/MIME Signature" or / and "Decrypt S/MIME Message". The future communication partner sends a signed mail and attaches the certificate. The certificate is (automatically) imported into the g_cert.nsf certificate database or the LDAP directory. Activate the corresponding Crypt job "Encrypt S/MIME Message". The recipient is assigned to the appropriate encryption policy list, i.e. the corresponding recipient is added to the "EncryptionRecipients S/MIME" selection rule. GROUP Business Software AG Page 11
13 Importing a certificate into an LDAP directory depends on the operating system. Similarly, on his side, the communication partner has to import and verify the certificates provided by you. Notes/Domino To import the certificate, the standard Domino function is used. For a detailed description of the procedure, please refer to the Domino Manual. The procedure requires the user to be entered in the name and address book (not registered). Outlook users The certificate is imported into the Certificate Store of the Windows operating system. In addition, the Issuer ID (from the issuer certificate of the company certificate) has to be set to "Trustworthy" by the Outlook client Certificate Manager. The operating system includes a number of trustworthy issuers such as, among others, Verisign. When creating your own certificates, e.g. with iq.suite Trust, the Trustworthy status has to bet separately. Otherwise, incoming mails will be decrypted in Outlook and their signature will also be verified, but for each mail a message will point out that the certificate is not trustworthy. For more details on the import procedure and setting a certificate to trustworthy, please refer to your Windows Manual. To set up a connection to another server is performed in a similar way. This may be the case when two different companies wish to communicate securely by way of company certificates, but with mails automatically assigned to the corresponding recipients and senders. In this case, perform the following steps: Get the certificate from the other server through the reception of a signed mail or as file in p7b format. Send your own certificate to the other server i.e. send a signed mail with the certificate attached or transmit the certificate in p7b format to the partner by some other means (e.g. by floppy disk). Import the certificate into the LDAP directory (e.g. Domino) Assign the recipient to the appropriate encryption policy list. iq.suite Crypt S/MIME is interoperable with systems working on a S/MIME Standard. GROUP Business Software AG Page 12
14 3 iq.suite Crypt in a Nutshell Highlights Company-wide encryption guidelines The flexible configuration of senderrecipient combinations and domains allows the definition of specific encryption relationships between different persons, groups and companies. Thus, centralized guidelines enable encryption for all users or selected groups of people. Transparent efficiency The use of standardized methods and the central processing on the server ensure transparency for the user as well as independence from the client used. Any combination of encryption partners, such as client-client, server-server and client-server, is freely configurable. Different encryption standards The simultaneous use of different encryption methods, such as PGP and S/MIME, offers the highest security for a wide variety of application purposes and communication partners. Flexible rule sets Using an intelligent and freely definable rule-based mechanism for selective encryption of e mail contents, iq.suite Crypt pro-vides high-level flexibility and security. Integrated central administration Features Definition of centralized encryption policies for communication via Internet and public networks Transparency of encryption for users, independent of client used Selective encryption through address checks for any sender-recipient combinations, recipient groups and Internet domains Integration into any encryption administration and public-key infrastructure (PKI) Centralized archival of personal and company-related public keys on the server No encryption key management required from end users Simultaneous use of different methods with long keys, e.g. PGP, S/MIME Detailed logging functions Integrated certificate database Configurable messages to sender, recipient and Administrator Multiple platform support for all operating systems Optimized multi-processing and multithreading, including for partitioned servers and clusters Scaleable architecture Seamless integration with additional iq.suite products GROUP Business Software AG Page 13
15 About GBS GROUP Business Software is the leading provider of IBM Lotus based solutions and services in the fields of Cloud Computing, Management and Archiving, Instant Messaging, CRM, Corporate Compliance and Administration. The GBS business units offer "Collaborative Business Solutions" to support companies and end users in their daily work and to simplify business processes. While competitors only offer partial solutions for collaborative systems, GBS provides a comprehensive and harmonized solution portfolio which includes all areas of collaboration. By integrating GBS solutions in business processes, companies and organizations achieve their goals easier, faster and more efficiently. Competencies Central: GBS solutions make it possible to manage and control business-critical process from a central location, thus relieving both administrative staff and end users in their daily work. With all users included on a company-wide basis using a server-based system, all of their operations can be controlled and managed from a central interface. Uncomplicated: GBS solutions feature outstanding usability and unmatched efficiency. While reducing the necessary user interaction to a bare minimum, the server-based solutions provide intelligent automatisms that contribute to increasing productivity and cost-effectiveness. Compliant: Centrally defined processes ensure compliance with corporate policies and statutory requirements. Intuitive configuration options allow to flexibly adapt the solutions used to specific market requirements, corporate specifications or new laws. Customers GROUP is based in Europe and Northern America. Companies worldwide rely on GBS solutions for the security, organization and efficiency of their systems. GBS customers include well-known companies from all over the world, such as Deutsche Bank, Ernst & Young, Honda, Allianz and Miele. For further information please visit GROUP Business Software AG Page 14
16 2011 GROUP Business Software AG Our product descriptions are of a general and descriptive nature only. They do not stipulate any specific features nor do they represent any form of warranty or guarantee. We reserve the right to change the specifications and design of our products without notice at any time, in particular in order to keep abreast of technical developments. The information contained in this document presents the topics from the viewpoint of GROUP Business Software AG at the time of publishing. Since GROUP Business Software AG needs to be able to react to changing market requirements, this is not an obligation for GROUP Business Software AG and GBS cannot guarantee that the information presented in it is accurate after the publication date. This document is intended for information purposes only. GROUP Business Software AG does not extend warranty for this document, in either explicit or implied form. This also applies to quality, execution, standard commercial practice or suitability for a particular purpose. All the product and company names that appear in this document may be trademarks of their respective owners. [email protected] GROUP Business Software AG Page 15
PrivaSphere Gateway Certificate Authority (GW CA)
PrivaSphere Gateway Certificate Authority (GW CA) Send and receive secure emails with your email program through restricting firewalls using SMIME gateway functionalities. PrivaSphere Secure Messaging
CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper
CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
IBM Lotus Protector for Mail Encryption. User's Guide
IBM Lotus Protector for Mail Encryption User's Guide Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.0. Released December 2010. This
The GlobalCerts TM SecureMail Gateway TM
Glob@lCerts PRODUCT OVERVIEW: The GlobalCerts TM SecureMail Gateway TM Automatic encryption and decryption is unique to the SecureMail Gateway. The GlobalCerts SecureMail Gateway is based on a network
Djigzo email encryption. Djigzo white paper
Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
DJIGZO EMAIL ENCRYPTION. Djigzo white paper
DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
Office Standardization. E-Mail Encryption Gateway. A Brief Guide for External Communication Partners.
Office Standardization. E-Mail Encryption Gateway. A Brief Guide for External Communication Partners. 1 A Brief Description of the Solution. All employees of Deutsche Telekom can use the E-Mail Encryption
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows
Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows SecureZIP for Windows interoperates with leading PKI vendors including Entrust, VeriSign, and RSA to enable the
Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011
Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 1 Options for encrypted e-mail communication with AUDI AG Confidential information may only be transmitted in encrypted form
Receiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Documentation. Administration Manual. iq.suite 12.1. For Microsoft Exchange. Document Version 1.0
Documentation Administration Manual iq.suite 12.1 For Microsoft Exchange Document Version 1.0 EDITOR S NOTE Editor s Note All rights reserved. This manual and the programs described therein are copyright-protected
1 Functionalities of iq.suite Update Manager... 3. 2 Installation... 5. 2.1 New Installation... 5. 2.2 Update Installation... 8. 3 Configuration...
Contents 1 Functionalities of iq.suite Update Manager... 3 2 Installation... 5 2.1 New Installation... 5 2.2 Update Installation... 8 3 Configuration... 9 3.1 Configuration of iq.suite Update Manager...
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
Using Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
April 2005. PGP White Paper. PGP Universal 2.0 Technical Overview
April 2005 PGP White Paper PGP Universal 2.0 Technical Overview 1 Table of Contents EXECUTIVE SUMMARY... 2 INTRODUCTION... 3 THE PGP ECOSYSTEM... 4 WHAT IS THE PGP ECOSYSTEM?... 4 PGP Global Directory...
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing Encryption on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 4 2 Encryption Options... 5 3 Basics of Encryption... 7 3.1 Public Key... 7 3.2 Private
Domino Certification Authority and SSL Certificates
Domino Certification Authority and SSL Certificates Setup Domino as Certification Authority Process Client Certificate Requests Mike Bartlett ibm.com/redbooks Redpaper Redpaper International Technical
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
Djigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E
U S E R G U I D E TCS-CA Outlook Express Configuration [VERSION 1.0] C O N T E N T S 1 DESCRIPTION... 3 2 OUTLOOK EXPRESS AND CERTIFICATES... 4 3 ENABLING SECURITY SETTINGS FOR MAIL ACCOUNT... 5 3.1 Settings
E-mail encryption with business partners
(Guideline for ) Date: 2013-07-15 Document type: user description Version: 3.2 : Editorial team PKI cio.siemens.com Table of contents 1. Intention of the document:... 3 2. Prerequisites on business partner
Internet E-Mail Encryption S/Mime Standard
Internet E-Mail Encryption S/Mime Standard Disclaimer: Successfully setting up encryption functions in most e-mail clients is usually not a problematic task. However, it should be noted that, when configuring
Synchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
User Guide Using Certificate in Microsoft Outlook Express
CERTIFYING AUTHORITY User Guide Using Certificate in Microsoft Outlook Express CONTACT TATA CONSULTANCY SERVICES - [E-SECURITY: PKI SERVICES] 6TH FLOOR, 5-9-62, KHAN LATEEF KHAN ESTATE FATEH MAIDAN ROAD,
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
Security-Product by IT SOLUTIONS. Email security at the highest level JULIA. E-Mail Security. Cloud Security
Security-Product by IT SOLUTIONS Email security at the highest level Cloud Security JULIA MailOffice E-Mail Security wedn Sign Sig To Global protection for your emails Convenience Statistics module: graphic
Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
Implementing Transparent Security for Desktop Encryption Users
Implementing Transparent Security for Desktop Encryption Users Solutions to automate email encryption with external parties Get this White Paper Entrust Inc. All All Rights Reserved. 1 1 Contents Introduction...
Ciphermail Gateway PDF Encryption Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
Ciphermail for BlackBerry Reference Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail for BlackBerry Reference Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 3 2 BlackBerry add-on 3 2.1
E-Mail Management Solutions. Spamfinder. MailDepot. MailSealer. 100% spam protection for your business. Compliant, permanent e-mail archiving
E-Mail Management Solutions Spamfinder MailDepot MailSealer 100% spam protection for your business Compliant, permanent e-mail archiving digital signature and e-mail encryption Spamfinder Anti-spam and
Ciphermail for BlackBerry Quick Start Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail for BlackBerry Quick Start Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. Introduction This guide will explain how to setup and configure a Ciphermail
Ciphermail for Android Quick Start Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail for Android Quick Start Guide June 19, 2014, Rev: 5460 Copyright 2011-2014, ciphermail.com 3 CONFIGURATION WIZARD 1 Introduction This quick start guide helps you
Siebel Installation Guide for UNIX. Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014
Siebel Installation Guide for UNIX Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014 Copyright 2005, 2014 Oracle and/or its affiliates. All rights reserved. This software and related documentation
Sending E-mails without the risk! Secure E-Mail Communications with Rohde & Schwarz
Sending E-mails without the risk! Secure E-Mail Communications with Rohde & Schwarz Guide V1.1.1 Only the most recent version of this document is valid. Contents I List of figures... 2 1 Foreword... 3
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Netwrix Auditor for Windows Server
Netwrix Auditor for Windows Server Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
POP3 Connector for Exchange - Configuration
Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange
IBM Lotus Protector for Mail Encryption
IBM Lotus Protector for Mail Encryption for Windows User's Guide 2.1.1 Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.1. Released
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
Netwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
End-to-End Email Encryption for Everybody?
White paper End-to-End Email Encryption for Everybody? Why private individuals and corporations need different solutions White paper End-to-End Email Encryption for Everybody? Why private individuals and
Using etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
Email Integration for Open Text Fax Appliance and Open Text Fax Appliance, Premier Edition
Email Integration for Open Text Fax Appliance and Open Text Fax Appliance, Premier Edition Open Text Fax and Document Distribution Group October 2009 2 White Paper Contents Introduction...3 Who Should
Email Security Solutions
TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS
Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Abstract These Application Notes describe the
Importing data from Linux LDAP server to HA3969U
Importing data from Linux LDAP server to HA3969U Application Notes Abstract: This document describes how to import data and records from Linux LDAP servers to Storageflex HA3969U systems, and by doing
Quest Collaboration Services 3.6.1. How it Works Guide
Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
UPSTREAM for Linux on System z
PRODUCT SHEET UPSTREAM for Linux on System z UPSTREAM for Linux on System z UPSTREAM for Linux on System z is designed to provide comprehensive data protection for your Linux on System z environment, leveraging
www.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013
www.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
User Guide. MailMarshal Secure 5.5. August 2006
User Guide MailMarshal Secure 5.5 August 2006 THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT.
VAULTIVE & MICROSOFT: COMPLEMENTARY ENCRYPTION SOLUTIONS. White Paper
COMPLEMENTARY ENCRYPTION SOLUTIONS White Paper Table of Contents Section I: Vaultive & Microsoft: Complementary Encryption Solutions... 2 Section II: Vaultive is a Microsoft ISV Partner... Appendix A:
LDAP Synchronization Agent Configuration Guide
LDAP Synchronization Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights
Email Encryption Made Simple
Email Encryption Made Simple For organizations large or small Table of Contents Who Is Reading Your Email?....3 The Three Options Explained....3 Organization-to-organization encryption....3 Secure portal
Synchronization Tool. Administrator Guide
Synchronization Tool Administrator Guide Synchronization Tool Administrator Guide Documentation version: 1.5 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,
SECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
Netwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Cryptshare for Outlook User Guide
Cryptshare for Outlook User Guide V1.6.2 Befine Solutions AG Werthmannstr. 15 79098 Freiburg i. Br. Germany Web: https://www.cryptshare.com E-Mail: [email protected] Tel.: +49 761 389 13 0 Fax: +49 761
MAPI Connector Overview
The CommuniGate Pro Server can be used as a "service provider" for Microsoft Windows applications supporting the MAPI (Microsoft Messaging API). To use this service, a special Connector library (CommuniGate
Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server.
Collax Mail Server Howto This howto describes the setup of a Collax server as mail server. Requirements Collax Business Server Collax Groupware Suite Collax Platform Server including Collax Communication
DomainKeys Identified Mail DKIM authenticates senders, message content
DomainKeys Identified Mail DKIM authenticates senders, message content Alt-N Technologies, Ltd. 2201 East Lamar Blvd, Suite 270 Arlington, Texas 76006 Phone: (817) 525-2005 Fax: (817) 525-2019 http://www.altn.com/
Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2007
Email Signing and Encryption using Microsoft outlook 2007 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.
Optus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
IBM i. Networking E-mail. Version 7.2
IBM i Networking E-mail Version 7.2 IBM i Networking E-mail Version 7.2 Note Before using this information and the product it supports, read the information in Notices on page 53. This document may contain
Secured email Enterprise eprivacy Suite
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy
User Guide May 2013. Using Certificates in Outlook Express
User Guide May 2013 Using Certificates in Outlook Express FIGU RES... FIGURES.... T I TL E..............................................................................................................................
Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication
Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication Authentication is about security and user experience and balancing the two goals. This document describes the authentication
IBM Lotus Domino Document Manager 6.5.1
Collaborative document management for the enterprise IBM 6.5.1 Highlights Provides high-value, low-cost Manages documents for document management for IBM Lotus Notes, Microsoft organization-wide applicability
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web
T E C H N I C A L S A L E S S O L U T I O N
Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com
Ciphermail Gateway Administration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Administration Guide September 23, 2014, Rev: 9112 Copyright 2008-2014, ciphermail.com. Acknowledgements: Thanks goes out to Andreas Hödle for feedback. CONTENTS
Symantec Encryption Solutions for Email, Powered by PGP Technology
Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2010
Email Signing and Encryption using Microsoft outlook 2010 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.
Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points
Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various
Email Archiving User Guide Outlook Plugin. Manual version 3.1
Email Archiving User Guide Outlook Plugin Manual version 3.1 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith Road Hammersmith London W14 8TH United Kingdom Omniquad
Netop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX
SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data
Omniquad Exchange Archiving
Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith
BrightStor ARCserve Backup for Linux
BrightStor ARCserve Backup for Linux Agent for MySQL Guide r11.5 D01213-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's
Tumbleweed MailGate Secure Messenger
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Tumbleweed MailGate Secure Messenger JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS MailGate Secure Messenger Tumbleweed
White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3
White Paper Fabasoft Folio 2015 Update Rollup 3 Copyright Fabasoft R&D GmbH, Linz, Austria, 2016. All rights reserved. All hardware and software names used are registered trade names and/or registered
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
StreamServe Encryption and Authentication
StreamServe Encryption and Authentication User Guide 4.1.2 SP2 Rev A StreamServe Encryption and Authentication User Guide 4.1.2 SP2 Rev A 2007 StreamServe, Inc. StreamServe is a trademark of StreamServe,
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
