6. Is it mandatory to have the digital certificate issued from NICCA? Is it mandatory for the sender and receiver to have a NIC id?...
|
|
- Marian Elfrieda Parks
- 8 years ago
- Views:
Transcription
1 FAQ FOR S/MIME 1. What is S/MIME? What is digital certificate? What is an encrypted ? Is it mandatory to use this service? What I need to do to start using S/MIME service? Is it mandatory to have the digital certificate issued from NICCA? Is it mandatory for the sender and receiver to have a NIC id? Required Hardware and Software to support S/MIME on client Machine How to send digitally signed and encrypted mail using Mozilla Thunderbird How to send a digitally signed ? How to send a digitally signed and encrypted ? How to Decrypt the message : How to export a public certificate from your DSC? How to upload Public Certificate to NIC repository? How to Install Java? Why I am Getting Popup, while saving draft? Why I am getting a Pop up, while doing spell check? I can digitally sign the mail but cannot encrypt it? I can Encrypt the mail but cannot digitally sign it? Which Class of certificate to apply for? (Refer Point No. 2 of NIC CA Form)... 37
2 1. What is S/MIME? Secure/Multipurpose Internet Mail Extensions (S/MIME) provides a consistent way for users to send and receive secure MIME data, using digital signatures for authentication, message integrity and non-repudiation and encryption for privacy and data security. 2. What is digital certificate? Digital Certificates are the electronic counterparts to driver licenses, passports and membership cards. You can present a Digital Certificate electronically to prove your identity or your right to access information or services online. Digital Certificates, bind an identity to a pair of electronic keys that can be used to encrypt and sign digital information. A Digital Certificate makes it possible to verify someone's claim that they have the right to use a given key, helping to prevent people from using phony keys to impersonate other users. Used in conjunction with encryption, Digital Certificates provide a more complete security solution, assuring the identity of all parties involved in a transaction. A Digital Certificate is issued by a Certification Authority (CA) and signed with the CA's private key. 3. What is an encrypted ? Ans: - Encrypted mail protects the privacy of the message by converting it from plain, readable text into cipher (scrambled) text. Only the recipient who has the private key that matches the public key you have used to encrypt the message can decipher the message. Encrypting a mail is a separate process from digitally signing a message. 4. Is it mandatory to use this service? No, it is not mandatory to use this service. This service is issued by NIC for users who want to digitally encrypt and sign their message for security. Digitally encrypted mails can only be decrypted by sender or receiver using their digital certificate. 5. What I need to do to start using S/MIME service? You need to have a digital certificate provided by NIC Certificate authority, which can be stored in a USB token or directly in your browser. The DSC form is available on While requesting for the DSC, please ensure that the address that you mention in the form is the address that you wish to bind with your DSC for e.g <userid>@nic.in Also ensure that the you request for a DSC that contains both the Digital certificate and the encryption certificate (refer point no 3 in the form, select (tick mark) both the options i.e. individual (signing) and Encryption. Contact Person (NIC CA) : Mr. Sumeet Jethra (Ph sumeet@nic.in ) Messaging Services, NIC 2
3 6. Is it mandatory to have the digital certificate issued from NICCA? No, it is not mandatory to get the certificate issued from NICCA, although we recommend use of a DSC from NICCA. If you wish to use this service over the web interface i.e. you can also take this certificate from any authority who is under CCA India If you wish to use this service over a POP/IMAP client like thunderbird, then a DSC from any other CA will also work. 7. Is it mandatory for the sender and receiver to have a NIC id? Yes, the sender and receiver both need to have a NIC id if you wish to use this service over the web interface. 8. Required Hardware and Software to support S/MIME on client Machine. Operating system Browser software Private-public keys with certificates Microsoft Windows XP or Vista or later Microsoft Internet Explorer, Version 7 or later Java Runtime Environment (JRE) 6 Update 7 or later One or more private-public key pair with certificates. Certificates are required and they must be in standard X.509 v3 format. Obtain keys and certificates from a CA for each Convergence user who will use the S/MIME features. The keys and their certificates are stored on the client machine or on a smart card. The public keys and certificates are also stored in NIC repository. Smart card software (only required when keys and certificates are stored on smart cards) ActivIdentity ActiveClient, Version 6.2, or Litronic NetSign 215 Reader CAC Compliant Smart card reader Any model of smart card reading device complying with ISO 7816 supported by the client machine and smart card software. Type of Certificate Class II 9. How to send digitally signed and encrypted mail using Mozilla Thunderbird. a) In Thunderbird, select from menu "Tools" > "Options" > "Advanced". Messaging Services, NIC 3
4 b) Click the "Certificates" tab > "Security Devices". A new window will open which displays the Security Devices. c) Click the "Load" button to load a new PCKS#11 Module. Type a name for the PKCS#11 Module or keep it default(new PKCS#11 Module) and click "Browse". d) Select the file "aetpkss1.dll" in c:\windows\system32 folder and click "Open", then "OK". e) Confirm the question if you want to install this security module with "OK". f) You will receive a message that the security module was installed. g) The security module now will be displayed in the list. h) Click "OK" to leave the Security Device Manager. i) Once the account is configured. Go to Tools Account Settings security Refer figure 9.1 Figure 9.1 Messaging Services, NIC 4
5 Click on select under Digital Signing. Refer Figure 9.1 Figure 9.2 After clicking on select it will ask for your Digital Token Password. Enter Password and click on ok. Refer figure 9.2 Figure 9.3 Click on ok Button to select your signing certificate. Refer figure 9.3. Figure 9.4 Messaging Services, NIC 5
6 An alert message will prompt, as shown in figure 9.4. Click on No Figure 9.5 Click on select button under Encryption. Refer figure 9.5. Messaging Services, NIC 6
7 Figure 9.6 Click on ok Button to select your signing certificate. Refer figure 9.6 Figure 9.7 Messaging Services, NIC 7
8 Click on Digital sign message, If you want to sign every message and click on Required button, if you want to encrypt every message. Finally click on ok to accept those settings. Figure 9.8 Click on Security Encrypt This Message (If you wish to send encrypted message). Refer figure 9.8 Digital signature will be automatically highlighted. Now Click on send to send your message. Messaging Services, NIC 8
9 Figure 9.9 If you have your token inserted in your computer, you will be able to open the encrypted by clicking on it as shown in the figure 9.9. The very first time you are accessing it, it will ask for token password. Messaging Services, NIC 9
10 10. How to send a digitally signed ? GO TO (advanced view) Note: Prior to sending digitally signed /secure all steps mentioned in Annexure A need to be completed. Figure: 10.1 Login with your User ID and Password. Refer Fig Messaging Services, NIC 10
11 After logging in you will receive a popup window as below. (This window will appear very first time you access this site.) Figure: 10.2 Select the check box and click on Run. Refer Fig Figure: 10.3 Messaging Services, NIC 11
12 At this point you are logged in to mail.gov.in interface. This will be your secure webmail interface. Refer Fig Figure: 10.4 Click on write Refer Fig Messaging Services, NIC 12
13 Figure: 10.5 Fill the To: address, Subject and From. Click Security tab check Digitally Sign. Then Click on Send. Refer Fig Messaging Services, NIC 13
14 Figure: 10.6 After Clicking on Send it will ask for the token password. Fill token password in the POPUP window and click on Accept Refer Fig Messaging Services, NIC 14
15 Figure: 10.7 Veifying digital signed . Below figure illustartes the procedure to verify digitally signed . Double click on the which is signed and click on Sign logo Refer Fig Note: DIGITALLY SIGNED MAIL 1) You can send a signed message to anyone in the internet. 2) If you want to verify the digital signature sent by you or any user, you need to have your digital signature (Smart Token) with you. Messaging Services, NIC 15
16 11. How to send a digitally signed and encrypted ? GO TO Figure: 11.1 Login with your User ID and Password. Refer Fig After logging in you will receive a popup window as below. (This window will appear very first time you access this mail.gov.in site.) Messaging Services, NIC 16
17 Figure: 11.2 Select the check box and click on Run. Refer Fig The Always trust content from the publisher needs to be selected only once. You will not be prompted for this screen again. Messaging Services, NIC 17
18 Figure: 11.3 At this point you are logged in to mail.gov.in interface. This will be your secure webmail interface. Refer Fig Messaging Services, NIC 18
19 Figure: 11.4 Go to Options tab. Refer Fig Messaging Services, NIC 19
20 Figure: 11.5 Click on Mail Local Account Security Select your certificate from the drop down box and check on Encrypt All mails During Send (If you want to encrypt all message you send) click on save. Refer Fig Messaging Services, NIC 20
21 Composing an encrypted message Figure: 11.6 Click on write to compose new message. Refer Fig Check if you want to encrypt and sign or only sign the message. Write down the address in To field. Write subject and type message in compose window. And click on send. It will ask you the token password in a POPUP window. Messaging Services, NIC 21
22 Figure: 11.7 At this point you have sent signed and encrypted message. Write down token password in the POPUP window and click on Accept Refer Fig Messaging Services, NIC 22
23 12. How to Decrypt the message : Click on the Encrypted message to open it. It will ask you for the Token Password in the POPUP window, if. Refer Fig If you have already verified your token password in current login session, it will not ask for token password. Figure: 12.1 Messaging Services, NIC 23
24 Figure: 12.2 Below screen shot is after verification of token password. Now you can see the encrypted message. Refer Fig Messaging Services, NIC 24
25 13. How to export a public certificate from your DSC? Insert your USB token/smart card in your computer. Figure 13.1 Go to Start Programs SafeSign Standard Token Administration utility. Refer Figure 13.1 Messaging Services, NIC 25
26 Figure 13.2 Double click on above highlighted token. (Ensure Token status as operational before double clicking ) Figure 13.3 Messaging Services, NIC 26
27 There will be 2 certificates (private and public) as shown in Figure 13.3 Double click on certificates one by one. Refer figure 13.3 Figure 13.4 Your encryption certificate will have Encipher secret keys. Refer Figure Now click on Save to file. Refer figure 13.4 Messaging Services, NIC 27
28 Figure 13.5 Write filename and click on save. Refer figure Messaging Services, NIC 28
29 Figure 13.6 Right click on the file Open with WordPad. Refer figure 13.6 Messaging Services, NIC 29
30 Figure 13.6 Messaging Services, NIC 30
31 14. How to upload Public Certificate to NIC repository? Figure 14.1 Login to upload your encryption certificate here. Refer fig14.1 Figure 14.2 Messaging Services, NIC 31
32 Browse for your certificate file and click on submit. If everything is OK you will receive following message. Refer fig Figure How to Install Java? If you are trying to access from browsers other than IE (i.e. Firefox, Chrome, Safari, etc)), you will receive following message in popup. The server supports encryption and signing of messages, but these features are currently only available with Internet Explorer 7 and above The above message appears as this service is currently supported on IE only. After clicking ok you will be forwarded to your mailbox. Internet Explorer Users (IE 7 and above) The very first time you access it will ask for java installation, if you are connected to internet. If you don t have internet access in your PC, you have to download java version 6 from Click yes to proceed. Messaging Services, NIC 32
33 Figure 15.1 Click on Install to proceed with java installation. Refer Figure Java installation will proceed with following screen. Refer Figure 15.2 Figure 15.2 Messaging Services, NIC 33
34 Figure 15.3 Click close to finish java installation. Refer Fig Figure 15.4 Check Always trust content from this publisher radio button and click on Run. Refer Figure Messaging Services, NIC 34
35 Figure 15.5 You will be forwarded to you INBOX now. Refer figure Why I am Getting Popup, while saving draft? Ans : This warning message will pop up, if you have not inserted your token in PC while saving a draft. If you don t want to encrypt your draft click on save anyway button. Your draft will be saved as unencrypted. Messaging Services, NIC 35
36 Figure Why I am getting a Pop up, while doing spell check? Ans. : To be spell-checked, the message must be sent without encryption to the mail server. The spell checker can only work on plain text. As our servers use Secure Socket Layer (SSL) transmission, the message is protected as it is sent. However, during spell-checking, it is still exposed in plain text inside the mail server. Messaging Services, NIC 36
37 Figure I can digitally sign the mail but cannot encrypt it? Ans. : Ensure that you have encryption certificate along with signing certificate in your DSC. How to ensure <insert> 19. I can Encrypt the mail but cannot digitally sign it? Ans. : Ensure that you have signing certificate along with encryption certificate in your DSC. How to ensure (refer point no 17 above) 20. Which Class of certificate to apply for? (Refer Point No. 2 of NIC CA Form) Ans. : Class II Messaging Services, NIC 37
Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)
Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email
More informationNICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express
NICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express 1. DESCRIPTION This guide explains the procedure for using the NICCA issued digital certificate
More informationI. Configuring Digital signature certificate in Microsoft Outlook 2003:
I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to
More informationPROCEDURE FOR DSC CONFIGURATION. A. Installation of the driver has to be done for the first time and only once.
PROCEDURE FOR DSC CONFIGURATION 1. INSTALL GEMALTO TOKEN DRIVER A. Installation of the driver has to be done for the first time and only once. B. Open the Browser and go to http://nicca.nic.in C. Click
More informationVeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
More informationGuide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
More informationReceiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
More informationGuide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security
More informationisupplier PORTAL ACCESS SYSTEM REQUIREMENTS
TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM
More informationHow To Set Up Your Email
How To Set Up Your Email Contents Page Microsoft Outlook 1 Outlook Express 6 7 Webmail (this is for those who do not use an email programme) 12 Windows Live Mail 22 Mozilla Thunderbird 26 Windows Mail
More informationGuide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid) Wherever Security relies on Identity,
More informationOutlook Web Access 2003 Remote User Guide
UNITED STATES COAST GUARD Outlook Web Access 2003 Remote User Guide Using Common Access Card Access TISCOM TIS-42 07/29/2008 Version 1.0 CAC Enabled Outlook Web Access CAC Enabled OWA is a way to view
More informationDIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
More informationUsing etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
More informationCHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
More informationE-mail Encryption. How do I send my e-mail encryption key?
E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout
More informationShakambaree Technologies Pvt. Ltd.
Welcome to Support Express by Shakambaree Technologies Pvt. Ltd. Introduction: This document is our sincere effort to put in some regular issues faced by a Digital Signature and USB Token user doing on
More informationGold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.
User Manual Follow these simple steps to install, configure, and use. Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10
More informationHMRC Secure Electronic Transfer (SET)
HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government
More informationADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
More informationSEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of
More informationTrusted Relationships. Sending Invitations. Sending Invitations from Outlook
Trusted Relationships Establishing Trusted Relationships through the invitation process are core to the Securencrypt security process. This insures that you can only share secure documents with someone
More information1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
More informationRev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs
Rev. 06 JAN. 2008 Document Control User Guide: Using Outlook within Skandocs Introduction By referring to this user guide, it is assumed that the user has an advanced working knowledge of Skandocs (i.e.
More informationHow To Configure Email Using Different Email Clients
How To Configure Email Using Different Email Clients This document will show step by step instructions for setting up and updating email accounts using different Email Clients. Always remember to verify
More informationEmailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password
Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol
More informationSecure E-Mail Part II Due Date: Sept 27 Points: 25 Points
Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various
More informationThe IceWarp SSL Certificate Process
IceWarp Unified Communications The IceWarp SSL Certificate Process Version 10.3 Printed on 26 November, 2010 Contents The IceWarp SSL Certificate Process 1 Choosing the Proper Certificate Type... 2 Creating
More informationIceWarp SSL Certificate Process
IceWarp Unified Communications IceWarp SSL Certificate Process Version 10.4 Printed on 26 June, 2012 Contents IceWarp SSL Certificate Process 1 Choosing the Proper Certificate Type... 2 Creating your
More informationWhite Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3
White Paper Fabasoft Folio 2015 Update Rollup 3 Copyright Fabasoft R&D GmbH, Linz, Austria, 2016. All rights reserved. All hardware and software names used are registered trade names and/or registered
More informationSSL Guide. (Secure Socket Layer)
SSL Guide (Secure Socket Layer) To find basic information about network and advanced network features of your Brother machine: uu Network User's Guide. To download the latest manual, please visit the Brother
More informationPersonal Secure Email Certificate
Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More informationZarafa S/MIME Webaccess Plugin User Manual. Client side configuration and usage.
Zarafa S/MIME Webaccess Plugin User Manual Client side configuration and usage. Zarafa S/MIME Webaccess plugin provides S/MIME functionality, for receiving and sending encrypted and / or sign messages
More informationScanShell.Net Install Guide
ScanShell.Net Install Guide Please install the software first - DO NOT PLUG IN THE SCANNER The scanner has been carefully packaged to avoid damage during transportation. Before operating the scanner, please
More informationUser Guide May 2013. Using Certificates in Outlook Express
User Guide May 2013 Using Certificates in Outlook Express FIGU RES... FIGURES.... T I TL E..............................................................................................................................
More informationOutlook Web Access Tipsheets
You can use a Web browser to access your Outlook mailbox from any computer with an Internet connection. You can use Outlook Web Access with Microsoft Internet Explorer, Mozilla Firefox and many other browsers.
More informationEmail Client configuration and migration Guide Setting up Thunderbird 3.1
Email Client configuration and migration Guide Setting up Thunderbird 3.1 1. Open Mozilla Thunderbird. : 1. On the Edit menu, click Account Settings. 2. On the Account Settings page, under Account Actions,
More informationOUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL
United States Army Special Operations Command (USASOC) Special Operations Forces Information Technology Enterprise Contracts (SITEC) OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL Prepared by:
More informationManual for configuring NIC VPN in Windows OS
Manual for configuring NIC VPN in Windows OS NIC is introducing a new web based VPN interface to allow s to connect to NICNET through VPN. Apart from existing Client based VPN service, this new interface
More informationConfiguring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
More informationUsing Rackspace Webmail
Using Rackspace Webmail Contents 1. Logging into Rackspace Webmail... 1 2. Add/Change your Signature... 2 3. Configure audible notifications... 5 4. Manage Auto-Reply ( Out of Office /Vacation responder)...
More informationInternet E-Mail Encryption S/Mime Standard
Internet E-Mail Encryption S/Mime Standard Disclaimer: Successfully setting up encryption functions in most e-mail clients is usually not a problematic task. However, it should be noted that, when configuring
More informationDOCUMENT MANAGEMENT SYSTEM
DOCUMENT MANAGEMENT SYSTEM USER S MANUAL By: MIS Department Software Division Page 1 of 14 1. Overview Document Management System is a powerful web based file manager and storage utility. It was developed
More informationPKI Contacts PKI for Fraunhofer Contacts
Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 15.10.2013
More informationSTAFF MAIL. User Guide. Please see the next page for an important note
STAFF MAIL User Guide Please see the next page for an important note Important note: This user guide was written to support the use of the original Staffmail system. A newly rewritten version is in preparation
More informationSimple Guide to Digital Signatures
Simple Guide to Digital Signatures Rohas Nagpal Asian School of Cyber Laws About the author Rohas Nagpal is the founder President of Asian School of Cyber Laws. He advises Governments and corporates around
More informationConfiguring an Email Client to Connect to CASS Mail Servers
Configuring an Email Client to Connect to CASS Mail Servers Table of Contents Introduction... 2 Webmail... 2 Settings... 2 Forwarding... 2 Email Client Configuration... 3 Outlook 2003... 3 Outlook 2007...
More informationExchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile
More informationTCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E
U S E R G U I D E TCS-CA Outlook Express Configuration [VERSION 1.0] C O N T E N T S 1 DESCRIPTION... 3 2 OUTLOOK EXPRESS AND CERTIFICATES... 4 3 ENABLING SECURITY SETTINGS FOR MAIL ACCOUNT... 5 3.1 Settings
More informationSection 1.0 Getting Started with the Vālant EMR. Contents
Section 1.0 Getting Started with the Vālant EMR Contents Getting Started with the Valant EMR application:... 2 Hardware Requirements for the Vālant EMR:... 3 Software Requirements for the Vālant EMR:...
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationAlberni Valley IT Services http://www.avits.ca admin@avits.ca. Virtual domain E-mail information.
Alberni Valley IT Services http://www.avits.ca admin@avits.ca Virtual domain E-mail information. Welcome! This document outlines information necessary for you to send and receive E-mail for your virtual
More informationHow to configure your Windows PC post migrating to Microsoft Office 365
How to configure your Windows PC post migrating to Microsoft Office 365 1 Contents Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 4 Several different Microsoft Office 365
More informationisecuremail User Guide for iphone
isecuremail User Guide for iphone Page 1 CONTENTS Chapter 1: Welcome... 4 Chapter 2: Getting Started... 5 Compatability... 5 Preliminary Steps... 5 Setting up a POP3 / IMAP4/ Exchange Email Account...
More informationHow To Use Exhange On Outlook 2007 2007 On A Pc Or Macintosh Outlook 2007 On Your Pc Or Ipad (For Windows Xp) On Your Ipad Or Ipa (For Your Windows Xp). (For A Macintosh) On A
Configure Microsoft Outlook 2007 to use Exchange Email Setting Important 1. Before configure your Microsoft outlook 2007 to use exhange you MUST log into the Web Exchange page to login and change your
More informationjohnireland@eircom.net
Email Electronic mail is the transmission of mainly text based messages across networks. This can be within a particular network - internal mail - or between networks - external mail. The most common network
More information1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6
MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack
More informationOUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL
United States Army Special Operations Command (USASOC) Special Operations Forces Information Technology Enterprise Contracts (SITEC) OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL Prepared by:
More informationE-mail Encryption Recipient Guidelines
E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies
More informationInstallation Instructions for 9555 USB Driver
Prior to using the data modem features of your 9555 handset; you must first install the VCOMPORT 9555 USB Driver. This driver is compatible with: Windows XP Service Pack 2, Windows 2000 Service Pack 4,
More informationID Pictures collection for Membership card of ARBH- KBHB/LFH/VHL
ID Pictures collection for Membership card of ARBH- KBHB/LFH/VHL 1 Table of Contents 1. Hardware /software... 3 2. Software verification... 4 2.1 installing the EID reader middleware... 4 2.2. Java runtime
More informationUSER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4
USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4 March 2014 TABLE OF CONTENTS Chapter 1 Welcome... 4 Introducing WWPass Security for Email (Outlook)... 5 Supported Outlook Products...
More informationEntrust Managed Services PKI Administrator Guide
Entrust Managed Services PKI Entrust Managed Services PKI Administrator Guide Document issue: 3.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered
More informationVodafone Hosted Services. Getting your email. User guide
Vodafone Hosted Services Getting your email User guide Welcome. This guide will show you how to get your email, now that it is hosted by Vodafone Hosted Services. Once you ve set it up, you will be able
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationUsing Voltage SecureMail
Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.
More informationMSGCU SECURE MESSAGE CENTER
MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and
More informationEntrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
More informationConfiguring Thunderbird for Flinders Mail at home.
Configuring Thunderbird for Flinders Mail at home. Downloading Thunderbird can be downloaded from the Mozilla web site located at http://www.mozilla.org/download.html This web site also contains links
More informationPC Requirements and Technical Help. Q1. How do I clear the browser s cache?
Q1. How do I clear the browser s cache? A1. Clear your browser's cache, and close all other applications that are running in your PC to free up memory space. For instructions on clearing cache (temporary
More informationWebmail. Setting up your email account
Setting up your email account In these notes, yourdomain means the full domain name (i.e. the part of an email address after the @ sign). This doesn t include www, but does include.co.uk or.com. For example,
More informationGenerating and Installing SSL Certificates on the Cisco ISA500
Application Note Generating and Installing SSL Certificates on the Cisco ISA500 This application note describes how to generate and install SSL certificates on the Cisco ISA500 security appliance. It includes
More informationGETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures
A. Secure File Transfer Protocol (SFTP) Procedures Overview IEHP utilizes our Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits to using
More informationInitial Setup of Mozilla Thunderbird with IMAP for Windows 7
Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access
More informationNew World Construction FTP service User Guide
New World Construction FTP service User Guide A. Introduction... 2 B. Logging In... 4 C. Uploading Files... 5 D. Sending Files... 6 E. Tracking Downloads... 10 F. Receiving Files... 11 G. Setting Download
More informationManual for Installing CA Root Certificates and User Digital
Manual for Installing CA Root Certificates and User Digital Certificate A. Installing the CA root certificate 1. Download the CCA, NICCA, NIC Sub CA and VPNCA root certificates from the website http://vpn.nic.in
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationPrerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2007
Email Signing and Encryption using Microsoft outlook 2007 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.
More informationSecure Message Center User Guide
Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account
More informationRegistering the Digital Signature Certificate for Bank Officials
Registering the Digital Signature Certificate for Bank Officials Overview When Bank officials login to the MCA21 application for the first time, they need to register their Digital Signature Certificate
More informationACCEPT THE SECURITY CERTIFICATE FOR THE WEB FILTER
ACCEPT THE SECURITY CERTIFICATE FOR THE WEB FILTER ACCESS THE WEB FILTER VIA ITS LAN 1 IP ADDRESS ACCEPT THE SECURITY CERTIFICATE FOR THE WEB FILTER Access the Web Filter via its LAN 1 IP Address A. Launch
More information1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
More informationPrivaSphere Gateway Certificate Authority (GW CA)
PrivaSphere Gateway Certificate Authority (GW CA) Send and receive secure emails with your email program through restricting firewalls using SMIME gateway functionalities. PrivaSphere Secure Messaging
More informationEmail Update Instructions
1 Email Update Instructions Contents Email Client Settings The Basics... 3 Outlook 2013... 4 Outlook 2007... 6 Outlook Express... 7 Windows Mail... 8 Thunderbird 3... 9 Apple Mail... 10 Apple Mail 8.2...
More informationBusiness Internet Email service from Bell User Guide
Business Internet Email service from Bell User Guide Table Of Contents (click a page number to access that page) Getting Started 3 Access your email remotely using Webmail 3 Basic Features 4 Out Of Office
More informationAccess to Webmail services via a Non Trust Computer
Access to Webmail services via a Non Trust Computer Aintree Outlook Web Access has been provided via the AppGate SSL Portal, this service can be accessed from any computer on the Internet. Two factor SMS
More informationGetting Started with University Gmail
Getting Started with University Gmail USER GUIDE V1.0 User Services IT Services University of Malta 2013 User Services IT Services University of Malta Msida MSD 2080 Malta May only be reproduced with permission
More informationE-CERT C ONTROL M ANAGER
E-CERT C ONTROL M ANAGER for e-cert on Smart ID Card I NSTALLATION G UIDE Version v1.7 Copyright 2003 Hongkong Post CONTENTS Introduction About e-cert Control Manager... 3 Features... 3 System requirements...
More informationHOW WILL I KNOW THAT I SHOULD USE THE IAS EMAIL CONTINUITY SERVICE? https://web.ias.edu/updateme/
WHEN DO I NEED TO ACCESS THE IAS EMAIL CONTINUITY SERVICE? This service is provided to address the following actions during periods where the IAS email servers are offline: 1. If you need to check for
More informationTrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
More informationSetting Up Microsoft Outlook 2007 with GroupWise
Setting Up Microsoft Outlook 2007 with GroupWise This page is one of several you might come across on our website discussing how to setup Outlook with GroupWise. We provide several sets of instructions
More informationOutlook 2002. 1. Start Outlook, and click on mserver.wlu.ca. 2. From the Tools menu, choose Options
Mserver to Ipmail Conversion Instructions The new email server called ipmail is configured to allow only encrypted email sessions. Members of the Laurier community who are currently using unencrypted email
More informationEmail Quick-Start Guide
For TradeMark Media s email system Thank you for choosing TradeMark Media for your email hosting. You ve made a wise choice. TradeMark Media offers comprehensive spam and virus protection, POP3 and WebMail
More informationImporting your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file
Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file You may use your Medium Assurance Certificate(s) on any computer that you wish to by importing them
More informationCan I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.
How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined
More informationDirectorate Of Health Service s ONLINE NURSING HOME & CLINICAL ESTABLISHMENT LICENSING SYSTEM
Directorate Of Health Service s ONLINE NURSING HOME & CLINICAL ESTABLISHMENT LICENSING SYSTEM A User Manual for Digital Signature 1 of 14 Index S. No. Content Name Page No. 1 What is Digital Signature?
More informationX.509 Certificate Generator User Manual
X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on
More informationPre requisites for Digital Signature
Pre requisites for Digital Signature Know about Digital Signature Certificate You should have a legally valid Class III digital certificate as per Indian IT Act from the licensed Certifying Authorities
More informationOutlook Express POP Instructions - Bloomsburg University Students
1. Open Outlook Express by clicking Start, All Programs, and Outlook Express. 2. Click on the Tools menu and click Accounts. 1 3. Click on Add Mail 4. Enter your name and click Next. 2 5. Enter your full
More informationLearning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE
Learning Management System (LMS) Quick Tips Contents Process Overview... 2 Sign into the LMS... 3 Troubleshooting... 5 Required Software... 5 Mobile devices are not supported... 5 Using the Check System
More information