You can allow the request and provision of your company’s public keys to external partners, therefore providing a mechanism for encrypted email exchange, by using the
The key responder will process successful requests using the following rules:
From the Home page, click System > Encryption > Mail Initiated Key Exchange.
The Mail Initiated Key Exchange page is displayed.
Configure the options as required.
|
Responder Address Provide an email address to be used for key provision. This is the address that users will send key request to. We recommend that you use a specific address for this purpose. For example, MIKE@MyCompany.com. Reply Address Provide an email address that will be used to prevent non-delivery email loops. This is the address MIKE will use to send key replies. The address should exist on your company mail server but should not auto-respond. Typically, this could be the |
You can download a template file containing instructions from key share instructions.
Depending on your organization's policy, you can publish these instructions on, for example, your company website.