Define an automatic mail signing endpoint

You can define a mail encryption endpointClosed A profile of encryption settings for the Email Gateway to use for recipients that match the endpoint. without specifying the PGP or S/MIMEClosed Secure Multipurpose Internet Mail Extensions (S/MIME) is a specification for secure email messages that uses the X.509 format for digital certificates and uses various encryption algorithms such as 3DES. certificateClosed A digital means of proving your identity. When you send a digitally-signed message, you are sending your certificate and public key. Certificates are issued by a certification authority and can expire or be revoked. that contains the sender's private keyClosed The secret key kept on the sender's computer that the sender uses to digitally sign messages to recipients and to decrypt messages from recipients. Private keys should be password protected.. Secure Email Gateway automatically searches for the correct key certificate to use. Following on from the steps in Define endpoints, continue below to define an automatic mail signing endpoint:

  1. In the Encryption and Signing Options area, deselect the Encrypt the message using: option.
  2. Select Sign the messages using: and choose either the sender's key, or the following certificate.

      If you select the following certificate, click the Search button to find a particular certificate from the Certificate Store. The search operates on the certificate Details field.

    If you select the sender's key, when the email message is sent, the Gateway selects a PGP or S/MIME key certificate with the sender’s email address as its owner.

  3. In the PGP Options area, click Click here to change these settings, and then follow the instructions on screen.

      PGP signing is not available in FIPS mode. If your Secure Email Gateway is operating in FIPS mode, you will only be able to use S/MIME defaults. This is to maintain compliance with FIPS 140-2.
  4. In the S/MIME Options area, click Click here to change these settings, and then follow the instructions on screen.

  5. Apply the configuration.

Notes

See also...