Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)



Similar documents
Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards

User Guide May Using Certificates in Outlook Express

User Guide Using Certificate in Microsoft Outlook Express

TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E

Using etoken for Securing s Using Outlook and Outlook Express

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

NICCA User Guide for digitally signing Using Digital Signature Certificate (DSC) in Outlook Express

SECURE USER GUIDE OUTLOOK 2000

Installing your Digital Certificate & Using on MS Out Look 2007.

Using Entrust certificates with Microsoft Office and Windows

Encrypting Your Using the free COMODO Secure Certificate

Guide Installing Digital Certificates in Outlook 2000

Adding Digital Signature and Encryption in Outlook

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2007

Extracting an S/MIME certificate from a digital signature

Encryption. How do I send my encryption key?

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2010

Personal Secure Certificate

How to use Certificate in Microsoft Outlook

GlobalSign Solutions. Using a GlobalSign PersonalSign Certificate to Apply Digital Signatures in Microsoft Office Documents

DIGIPASS CertiID. Getting Started 3.1.0

Setting up in Outlook Express

6. Is it mandatory to have the digital certificate issued from NICCA? Is it mandatory for the sender and receiver to have a NIC id?...

How to use Certificate in Outlook Express

MessageGuard 3.0 User Guide

Exostar LDAP Proxy / Secure Setup Guide. This document provides information on the following topics:

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

How To Send An Encrypted In Outlook 2000 (For A Password Protected ) On A Pc Or Macintosh (For An Ipo) On Pc Or Ipo (For Pc Or For A Password Saf ) On An Iphone Or

ing from The E2 Shop System address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows

Using Entrust certificates with Adobe PDF files and forms

User Guide. Version 3.0 April 2006

Simple Guide to Digital Signatures

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

Client Authenticated SSL Server Setup Guide for Microsoft Windows IIS

Using TLS Encryption with Microsoft Outlook 2007

USER GUIDE WWPass Security for (Outlook) For WWPass Security Pack 2.4

Ciphermail for Android Quick Start Guide

Overview Keys. Overview

GlobalSign Enterprise Solutions

IBM Client Security Solutions. Client Security User's Guide

PKI Contacts PKI for Fraunhofer Contacts

1. How to Register Forgot Password Login to MailTrack Webmail Accessing MailTrack message Centre... 6

User Guide. Digital Signature

Instructions for Microsoft Outlook 2003

Setting up secure communication with Ericsson. Guideline for Ericsson partners

Receiving Secure from Citi For External Customers and Business Partners

Setting up Your Acusis Address. Microsoft Outlook

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Reading an sent with Voltage Secur . Using the Voltage Secur Zero Download Messenger (ZDM)

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Yale Software Library

PROCEDURE FOR DSC CONFIGURATION. A. Installation of the driver has to be done for the first time and only once.

How to install and use the File Sharing Outlook Plugin

Set Up Setup with Microsoft Outlook 2007 using POP3

DigitalPersona Privacy Manager Pro

Set up Outlook for your new student e mail with IMAP/POP3 settings

How to Secure a Groove Manager Web Site

Using Voltage Secur

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Guide to Using DoD PKI Certificates in Outlook

Account Create for Outlook Express

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Ciphermail S/MIME Setup Guide

Digital Signatures on iqmis User Access Request Form

MS Outlook Express: Basics. Lesson Notes Author: Pamela Schmidt

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Djigzo S/MIME setup guide

Outlook 2010 Setup Guide (POP3)

Entrust Managed Services PKI

Use of Common Access Cards (CACs) from Home on Windows 7 without Middleware

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Client configuration and migration Guide Setting up Thunderbird 3.1

PGP Desktop Quick Start Guide version 9.6

Internet Encryption S/Mime Standard

Outlook Web Access User Guide

DocuShare Agent User Guide

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

RoomWizard Synchronization Software Manual Installation Instructions

Clearswift Information Governance

PaperClip. em4 Cloud Client. Setup Guide

PaperClip. em4 Cloud Client. Manual Setup Guide

X.509 Certificate Generator User Manual

Instructions. Outlook (Windows) Mail (Mac) Webmail Windows Live Mail iphone 4, 4S, 5, 5c, 5s Samsung Galaxy S4 BlackBerry

User Guide Microsoft Exchange Remote Test Instructions

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

TELSTRA BUSINESS MAIL QUICK REFERENCE GUIDE

Check Point FDE integration with Digipass Key devices

Versions Addressed: Microsoft Office Outlook 2010/2013. Document Updated: Copyright 2014 Smarsh, Inc. All right reserved

Configuring Outlook 2013 For IMAP Connections

Secure Part II Due Date: Sept 27 Points: 25 Points

Configuring an Client to Connect to CASS Mail Servers

SENDING AND RECEIVING PROTECTED INFORMATION VIA ELECTRONIC MAIL. Naval Medical Center Portsmouth IMD Training Division

Configuring, Customizing, and Troubleshooting Outlook Express

INTRODUCTION TO CRYPTOGRAPHY

tips A quick and easy guide to securing your private information

WS_FTP Pro. Addendum to User s Guide. Software Version 6.6. Ipswitch, Inc.

Policy Based Encryption E. Administrator Guide

Transcription:

The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has the solution. Date: September 2007 Version: 0.1.0 Authors: WISeKey SA

TABLE OF CONTENTS About this User Guide... 1 About Personal eid (Digital Certificate)... 1 About WISeKey Smartcards and USB Tokens... 1 Copyright... 2 Document Conventions... 2 About Digital Signature and Encryption... 3 Digital Signature on E-mail... 3 Digital Signing Process... 3 Signature Verification Process... 3 E-mail Encryption... 4 Encryption Process... 4 Decryption Process... 4 Usage of Keys... 4 Secure E-mail using WISeKey CertifyID Personal eid... 5 Configuring your eid in Microsoft Outlook... 5 Sending a Signed Email Message... 6 Viewing a Signed Email Message... 7 Encrypting an Email Message... 10 Viewing an Encrypted Email Message... 11 Creating Contacts with Digital Certificates... 13 Saving a Contact from the Received Signed Message... 13 Creating a Contact with Digital Certificate... 14 Support... 15

About this User Guide This manual describes the steps followed for securing your email transactions using WISeKey CertifyID Digital Certificate (eid). It explains the procedure to incorporate your eid in Microsoft Outlook, Outlook Express and Outlook Web Access to send digitally signed and encrypted e-mail messages. About Personal eid (Digital Certificate) A digital certificate provides the individual user with the highest level of security; enabling identification, authentication, secure encrypted communications (e-mail, web site etc.), electronic signatures, and non-repudiation. WISeKey Personal eids associate the identity of a person with a digital identity. On one hand a digital ID, or eid can be viewed as Digital Passports that inform Internet users about their interlocutors' identity and ensure electronic messages confidentiality. Those certificates integrate seamlessly with the majority of existing systems. They are user-friendly, each action being performed via Windows-like active icons. An eid enables you to: Create digital signatures on electronic mail messages, thus ensuring message integrity and authenticity with your correspondents; Receive confidential information from any of your correspondents that only you can decrypt and read using S/MIME (You can also send confidential information to other eid users); Increase security for your applications, replacing passwords with eid authentication protection (for PKI enabled applications); Securely encrypt files and share them with other eid holders using available applications such as the free WISeCrypt Personal Edition, available from WISeKey s web site. About WISeKey Smartcards and USB Tokens WISeKey provides smartcards, readers, and secure USB tokens for individuals and enterprises. WISeKey smart cards are high quality multipurpose cards that can be used for a variety of purposes including: Secure files and documents Securely exchange information Secure electronic email Securely access facilities (wireless proximity access special version) Securely access desktops and servers Digital sign documents and files for more efficient electronic workflow and approvals User Guide 1/17 PROS-TR-0002

Copyright In addition to signature and PKI applications, and access control systems, the smart card can be used to secure many other sensitive applications, such as payment systems. No part of the contents of this document may be reproduced or distributed in any form or by any means without the prior written permission of WISeKey SA. is a registered trademark of WISeKey SA. is a registered trademark of WISeKey SA. Written and published in Geneva, Switzerland, by WISeKey SA. Copyright 2007 WISeKey SA. All Rights Reserved. Document Conventions This User Guide uses the following conventions: NOTE means reader take note. Notes contain helpful suggestions. IMPORTANT means the reader must follow the instructions strictly. Descriptions for significant fields are available. User Guide 2/17 PROS-TR-0002

About Digital Signature and Encryption Do you write down sensitive data on the back of a postcard? Why not? Because you know, that anyone dealing with the mail underway can read it. The same goes for e- mail, except then it's done electronically in a matter of seconds. A Public Key Infrastructure is generally considered to be associated with three primary services: Authentication - The assurance to one entity that another entity is who he/she/it claims to be. Integrity - The assurance to an entity that data has not been altered (intentionally or unintentionally) between "there" and "here," or between "then" and "now." Confidentiality - The assurance to an entity that no one can read a particular piece of data except the receiver(s) explicitly intended. Digital Signature on E-mail Authenticity may be especially important for business correspondence if you are relying on someone to provide or verify information; you want to be sure that the information is coming from the correct source. This can be assured using a digital signature on the message. A signed message also indicates that changes have not been made to the content since it was sent; any changes would cause the signature validation to be unsuccessful. DIGITAL SIGNING PROCESS SIGNATURE VERIFICATION PROCESS User Guide 3/17 PROS-TR-0002

E-mail Encryption One of the main problems with emails is protecting them from being intercepted and read by a hacker. One way of protecting yourself from this is by encrypting your emails. Email encryption means that your email data is scrambled and can only be decrypted through the use of the correct cryptographic key. ENCRYPTION PROCESS DECRYPTION PROCESS Usage of Keys If someone wants to send you a message that is meant only for you to see, they would encrypt it using your public key. Your private key is required to decrypt such a message, so even if someone intercepted the email it would be useless gibberish to them. When you send an email to someone else you can use your private key to digitally "sign" the message so that the recipient can be sure it came from you by verifying the digital signature with your public key. User Guide 4/17 PROS-TR-0002

Secure E-mail using WISeKey CertifyID Personal eid You can secure your email using free WISeKey CertifyID Personal eid. You should obtain your digital certificate (eid) from WISeKey prior to configuring it in your email applications like Microsoft Outlook, Outlook Express or Outlook Web Access. For more information visit http://www.wisekey.com/. Note 1: Obtain digital certificate using an email address that is accessible from an S/MIME capable email application. The email address you submit must be in the exact form as used by your email application, do not use mapped emails. E.g. if your email application accesses your account using john.doe@somecompany.com, then please use this address for getting certificate. Even though jdoe@somecompany.com may be a working alias for john.doe@somecompany.com, it will not work in some S/MIME capable applications. Important: The root certificates of sender s and receiver s digital certificate should be trusted by the email application or operating system in the sender and receiver s machine prior to configuration. Configuring your eid in Microsoft Outlook Steps Instructions 1 Open Microsoft Outlook. Click Tools > Options. Click Security Tab and click Settings button. 2 Click New button in the Change Security Settings dialog. 3 Enter an appropriate name in the Security Settings Name field. Click Choose button adjacent to the Signing Certificate field. Select your digital certificate from the Select Certificate dialog box and click OK. Click Choose button adjacent to the Encryption Certificate field. Select your digital certificate from the Select Certificate dialog box and click OK. Click OK to close the Change Security Settings dialog box. User Guide 5/17 PROS-TR-0002

4 if you want to sign all the messages that you send by default then in the Security Tab, enable the check box Add digital signature to outgoing messages. if you want to encrypt all the messages that you send by default then in the Security Tab, enable the check box Encrypt contents and attachments for outgoing messages. Note: It is not recommended to encrypt all messages by default, however signing all messages by default is quite acceptable. You can also decide whether to sign and/or encrypt a message while composing a message. 5 Click OK in the Options dialog box to close. Sending a Signed Email Message Steps Instructions 1 Open Microsoft Outlook and compose a new message. 2 Click Options button in the compose message dialog. Click Security Settings in the Message Options dialog box. User Guide 6/17 PROS-TR-0002

Enable Add digital signature to this message checkbox. Click OK. Click Close button in Message Options dialog box. Note: Digital Signature on the message can be enabled by clicking compose message dialog. button in the 3 Click Send button. Your message will be digitally signed and sent to the recipient. Note: If your key is stored in the smart card, it will prompt for PIN of smart card before sending the message. You should provide the PIN during this process. Viewing a Signed Email Message Steps Instructions 1 Open Microsoft Outlook. Open the signed message you received. Note: Microsoft Outlook will verify sender s signature before opening the signed message. Appropriate error messages will be displayed if the signature is not verified. User Guide 7/17 PROS-TR-0002

2 Click on the icon to view the details regarding sender s identity. Click Details button. User Guide 8/17 PROS-TR-0002

3 Double click on the [Signer: ] to view the signature and certificate details. 4 Click on View Certificate button in the General Tab to view sender s certificate. User Guide 9/17 PROS-TR-0002

Encrypting an Email Message You should have the recipient s public key certificate before encrypting an email. The recipient s digital certificate should be available in Outlook Contacts. If you are sending to a person within your Active Directory domain, the public keys are available automatically. Otherwise, follow the steps mentioned later in the document in section Creating Contacts with Digital Certificates. Steps Instructions 1 Open Microsoft Outlook and compose a new message. 2 Click the Options button in the compose message dialog. Click Security Settings in the Message Options dialog box. Enable Encrypt message contents and attachments to this message checkbox. Click OK. Click the Close button in the Message Options dialog box. Note: Encryption on the message can be enabled by clicking compose message dialog. button in the User Guide 10/17 PROS-TR-0002

3 Click the Send button. Your message will be encrypted and sent to the recipient. Viewing an Encrypted Email Message Steps Instructions 1 Open Microsoft Outlook. Open the signed message you received. Note 1: Microsoft Outlook will decrypt the message before opening the encrypted message. Appropriate error messages will be displayed if it is not successful. Note 2: If your key is stored in the smart card, it will prompt for the PIN of the smart card before decrypting the message. You should provide the PIN during this process. User Guide 11/17 PROS-TR-0002

2 Click on the icon to view the details of the encrypted message. 3 Double click on the Encryption Layer to view the encryption and certificate details. User Guide 12/17 PROS-TR-0002

4 Click on View Certificate button in the General Tab to view the recipient s certificate. Creating Contacts with Digital Certificates To encrypt a message, you need to have the recipient s digital certificate in Outlook Contacts. S AVING A CONTACT FROM THE RECEIVED SIGNED MESSAGE Steps Instructions 1 Open a signed message from the Inbox received by the person whom you want to send encrypted message. 2 Right click on the sender s name in the Sender field. Click Add to Outlook Contacts menu item. 3 Add necessary details in the General Tab of Contact Dialog. Click the Certificates Tab and check whether the person s certificate h correctly incorporated. User Guide 13/17 PROS-TR-0002

4 Click Save and Close button in the Contact dialog. CREATING A CONTACT WITH DIGITAL CERTIFICATE This procedure can be followed when you don t have a signed message from the person who you want to encrypt message. Important: You should have the person s encryption certificate with you in DER encoded certificate file. Steps Instructions 1 Open Microsoft Outlook and select Contacts. Click New to create a new contact. 2 Add the necessary details in the General Tab of Contact Dialog. Click the Certificates Tab. Click the Import button. Select the recipient s certificate using File Dialog. Click Yes on the message box. 3 Click the Save and Close button in the Contact dialog. User Guide 14/17 PROS-TR-0002

Support Should you require support at any stage of this procedure then please contact WISeKey SA :- WISeKey SA WTC II / 29 Rte de Pré Bois Geneva CH-1215 Tel. +41 22 594 3000 Email : support@wisekey.com User Guide 15/17 PROS-TR-0002