How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)



Similar documents
4. Click Next and then fill in your Name and address. Click Next again.

Yale Software Library. PGP 9.6 for Windows

GPG4win / Kleopatra Documentation. Secure file and encryption by using GnuPG for Windows

AUSTRALIAN CUSTOMS AND BORDER PROTECTION SERVICE TYPE 3 CERTIFICATE 2014 INSTALLATION GUIDE

PDG Software. Encryption Guide

How to Setup Privacy Guard Encryption.

LiteCommerce Advanced Security Module. Version 2.8

Please note that a username and password will be made available upon request. These are necessary to transfer files.

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1

JAVS Scheduled Publishing. Installation/Configuration... 4 Manual Operation... 6 Automating Scheduled Publishing... 7 Windows XP... 7 Windows 7...

Encrypting Files Using AxCrypt

HMRC Secure Electronic Transfer (SET)

Using Your PGP Tool to Update Your Address Settings for Encrypted Messaging

Sterling Integrator. PGP Server Manager 5.1

Ubuntu Open PGP IMPLEMENTATION. Dr. ENİS KARAARSLAN 2014

1.2 Using the GPG Gen key Command

The KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer

File and encryption with GPG4win & Enigmail

Published. Technical Bulletin: Use and Configuration of Quanterix Database Backup Scripts 1. PURPOSE 2. REFERENCES 3.

CBH Provider EDI Browser Manual

GPG installation and configuration

Install and configure SSH server

PDG Software. PDG Key Manager User Guide

Encrypting with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER

PDG Software. Keyman Encryption Guide

INTRODUCTION TO CRYPTOGRAPHY

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

Installing your certificate on your Windows PC

Encryption. Introduction to using 7-Zip

Installing your certificate on your Mac

Secure A Guide for Users

PayFlex FTP - Wired Commute

Browser-based Support Console

How To - Install and configure the Symbience AL3 Download Client

eadvantage Certificate Enrollment Procedures

Notepad++ The COMPSCI 101 Text Editor for Windows. What is a text editor? Install Python 3

Capture Pro Software FTP Server System Output

SAS 9.3 Foundation for Microsoft Windows

File Share Service User guide

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Secure Part II Due Date: Sept 27 Points: 25 Points

Kerberos authentication between multiple domains may fail on LiveCycle Rights Management ES 8.2.1

Microsoft IAS Configuration for RADIUS Authorization

SecureZIP User Guide

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

SECURE USER GUIDE OUTLOOK 2000

Overview Keys. Overview

GPG Tutorial. 1 Introduction. 2 Creating a signing and encryption keys. 3 Generating a revocation certicate. Andreas Hirt July 12, 2009

Configuring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task.

Wildcard Certificates

Tutorial: Encrypted with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

Upgrading MySQL from 32-bit to 64-bit

PaperStream Connect. Setup Guide. Version Copyright Fujitsu

educ Office Remove & create new Outlook profile

Lab A: Deploying and Managing Software by Using Group Policy Answer Key

ECA IIS Instructions. January 2005

Supplement I.B: Installing and Configuring JDK 1.6

Setting up your new Live Server Account

Honeywell Secure External User Guide August 2013

LDAP Server Configuration Example

Using Websense Data Endpoint Client Software

Internet Programming. Security

Frequently Asked Questions

Get Smart Card Ready. How to Recover Your Old (Expired) Certificates

WiMAX Public Key Infrastructure (PKI) Users Overview

INSTALLING PowerScribe Workstation Client Software On A System That Has Never Had PowerScribe Installed On It

Using Entrust certificates with Microsoft Office and Windows

Windows Clients and GoPrint Print Queues

EMR-Link and Upgrading Your EMR

4cast Client Specification and Installation

ClicktoFax Service Usage Manual

Sophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012

File Manager Pro User Guide. Version 3.0

SELF SERVICE RESET PASSWORD MANAGEMENT BACKUP GUIDE

How schedule AccuTRConsole to run every hour

Interact for Microsoft Office

Figure 1: Restore Tab

Attachments Internet Explorer

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

Configure Managed File Transfer Endpoints

Technical Bulletin. SQL Express Backup Utility

Sophos Enterprise Console server to server migration guide. Product version: 5.2

How to use PGP Encryption with iscribe

Network Edition Download / Installation Instructions

WS_FTP Professional 12. Security Guide

Unipass Secur Client FAQ Document v1.1. This document a summary of some of the most common questions asked about the Unipass Secur client.

Transferring Scans from your Dolphin into Destiny

Identity Finder Setup

PGP Desktop Quick Start Guide version 9.6

Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical

X.400 Messaging Server Suite Evaluation Guide. Configuring Isode's M-Switch for X.400 Messaging. Isode

Supplement I.B: Installing and Configuring JDK 1.6

Getting started with 2c8 plugin for Microsoft Sharepoint Server 2010

PUBLIC Password Manager for SAP Single Sign-On Implementation Guide

Creating an Apple APNS Certificate

Capture Pro Software FTP Server Output Format

BitLocker To Go User Guide

Autodesk Product Manager Tool

MAC/OSX - How to Encrypt Data using TrueCrypt. v

Installation Guide. (June 2014)

Transcription:

EMAIL ENCRYPTION Guide June 3, 2013

TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file... 7 Command Prompt Decryption... 7 Explorer Decryption... 8 Page 2

Steps to Create Encryption Public Key The purpose of this document is to provide a quick start guide for individuals wishing to encrypt TravelTrax reports prior to them being transmitted over email. The prerequisites for following this guide are an understanding of public/private key encryption, a copy of GPG installed (can be downloaded from http://www.gnupg.org/), and a TravelTrax account. Installing GPG 1. The installation file for GPG can be obtained at ftp://ftp.gnupg.org/gcrypt/binary/gnupg-w32cli- 1.4.9.exe. After downloading the installer, run gnupg-w32cli-1.4.9.exe. 2. Follow the on-screen instructions, click Next until the installation has completed, and click Finish to finalize the installation. Page 3

Key Generation Process Below is a screenshot of the key generation process. In most situations, the default values are sufficient. 1. To begin the process, you must execute the following command: gpg --gen-key Page 4

2. Select what type of key you want to generate. In most cases, the default option (1) DSA and Elgamal is sufficient. 3. When you get to the Real name field, enter the recipient s real name (or a group name if appropriate). 4. Email address is the email address that will be receiving the reports (for example, if all reports are sent to a distribution list reports@orbitz.com, you would input that address). 5. Comment can be left blank. 6. After confirming your details, you will be required to enter a password to protect your key. Please ensure that you remember this password, as it cannot be recovered if lost. 7. Export the public key to a text file so it can be used within the TravelDashboard user profile. Type the following command: gpg --armor --export email.address@orbitz.com > pubkey.txt (Be sure to input the email address used during the key generation process). 8. This exports your public key to a text file, pubkey.txt. Note that no confirmation is displayed indicating that the process has completed. To confirm that the key has been exported successfully, browse to the file using Notepad or a similar text editor and open it. You have now successfully created a public key that can be used to encrypt email attachments! Page 5

Update User Settings Once you have an encryption key, you need to update your user settings to add the new public key. Follow the instructions below: 1. Log into TRAVELTRAX Web Reporting site. 2. Click on Edit User Settings. 3. Paste the text from pubkey.txt including -----BEGIN PGP PUBLIC KEY BLOCK----- and ----- END PGP PUBLIC KEY BLOCK----- into the Encryption Public Key box. 4. Click Save to complete. Once saved all emailed reports will be sent encrypted using your public key. Page 6

Decrypting an encrypted file Upon receiving an encrypted file, you will notice it has.gpg as a file extension. In the image below, a Credit Card Spend summary report has been sent via email and it was encrypted. To decrypt the file, first save the attachment to an easy to remember location. Command Prompt Decryption The command prompt decryption functionality is included with the basic install of GPG. Other options are available and covered later in this document. Follow these steps to decrypt an encrypted report: 1. Open a command prompt session. 2. Navigate to the location where the file was saved. 3. Input the following command: gpg --output outputfile.zip -- decrypt filename.zip.gpg, outputfile.zip = the desired filename for the decrypted file filename.zip.gpg = the filename of the encrypted file. 4. After entering your password, your file will be decrypted and ready for viewing. Page 7

Explorer Decryption There are also several utilities that allow you to decrypt a file within Windows Explorer itself. One of the most popular is GPGee 1. Go to http://gpgee.excelcia.org/. 2. Download and install GPGee by following the instructions on the website. 3. Configure the GPGee settings by right-clicking on any report file that you saved. You will see a new menu for GPGee (see below). 4. Select Configure. 5. Update the program path to reflect the location that you installed GPG (typically C:\Program Files (86)\GnuPG). 6. Set the public and secret keyring paths. 7. Click Ok and your system is configured to decrypt files. Page 8

8. To decrypt a file, right click on the encrypted file and select Verify/Decrypt under the GPGee menu. 9. You will be presented with the screen below and required to enter your secret passphrase (the one that you set during the key generation process). 10. After clicking Ok, you will receive a message indicating that the decryption has completed successfully. Page 9