MailSealer Certificates

Certificates are required for Mailsealer to function correctly and are maintained here.

  • The certificate management includes private, public, certificate authorities (intermediate and root certificates), CRLs (Certificate Revocation Lists), external certificate sources and the REDDOXX CA.
    • Certificates can be added, exported, validated and deleted
    • The trust status of certificates can be checked by right-clicking -> Validate.
    • For the encryption of mails via S/MIME, the public key of the recipient, the private key of the sender and the key of the certificate authority are required.
    • If the REDDOXX CA is used, private keys are created automatically.

Here you can add the private certificates of the users.
Click on Add and select either "Certificates and Keys in PEM Format", in this case the certificate and the corresponding key must be available in a PEM file,
or "Certificates and Keys in PKCS#12 / PFX Format", in which case the certificate must be inserted as a file and the associated password must be entered.

The certificates are validated during insertion, if this is not successful, the intermediate certificates and root certificates must still be checked and added if necessary.
Finally, this can be verified with right click => validate.

If desired, it is also possible to export the added certificates (as well as the certificate chain); the corresponding private key can also be specified.

To import a large number of private certificates at once, all certificates and associated passwords must be in PEM format and copied together into a single file.
Then select in MailSealer via S/MIME Certificates > Private End-User Certificates > Add, specify the PEM file (which contains all certificates and passwords in PEM format) and confirm with Save.

Public certificates are imported in PEM format via Add, can also be validated and exported (including the complete certificate chain).

Intermediate certificates are imported in PEM format via Add, can also be validated and exported (including the complete certificate chain).

Root certificates are imported in PEM format via Add, can also be validated and exported (including the complete certificate chain).
With 2034 SP2 it is also possible to adjust the trust status via "Toggle trust status".
This is necessary if a root certificate is transmitted by a remote peer (as this must not be trusted initially)