Enables filter selection policies to be configured that define the type of emails to verify. E.g. the complete signed email and/or emails with signed attachments.
Allows filter selection policies to be configured which identify emails needing to be server side signed based on keywords found in the ‘From’, ‘To’, ‘CC’, ‘Subject’ and/or email body. Email can also be filtered based on a particular type of attachment (e.g. PDF, DOC, TXT etc.).
ADSS Secure Email Server can also sign emails and attachments which are coming into an organisation and even perform archival services.
Allows you to configure your final trust points and other aspects of signature validation, e.g. how to check the revocation status of certificates using OCSP or CRLs.
Signs emails filtered using the standard S/MIME specifications recognised by all popular email clients (e.g. Outlook®, Outlook Express®, Lotus Notes® etc.). Verifies emails that have been S/MIME signed with either clear or opaque signatures. It therefore supports signed emails from all popular email clients (e.g. Outlook®, Outlook Express®, Lotus Notes® etc.).
Emails and attachments can be signed using either corporate keys or unique user keys. Users can be identified from the sender’s email address or using other techniques.
Supports the signing of attachments using signature formats including PDF, XML DSig, PKCS#7, CMS, CAdES-T, CAdES-X-Long, XAdES-T and XAdES-X-Long. When using PDF Signatures, sophisticated signature profiles can be set up which define the signature appearance and on which pages this appearance should be created. Invisible signatures and certified signatures are also supported.
Verifies signed attachments including those with standard and complex signature formats including PDF, XML DSig, PKCS#7, CMS, ETSI CAdES and XAdES with formats ES, ES-T, ES-X-Long, ES-EPES and ES-A.
All signing transactions are securely logged to provide a detailed audit trail of what was signed and when. The logs are protected from unauthorised modification using standard ADSS Server features.
All verification transactions are securely logged to provide a detailed audit trail of what was verified and when. The logs are protected from unauthorised modification using standard ADSS Server security features.
Allows you to configure how the verification results are to be provided to the original recipient (e.g. a simple and clear message inserted at the top of the email, detailed results attached to the email etc). It also allows you to configure how to route emails, both ones that pass verification checks and those that fail to be trusted, including blocking emails that failed to be trusted to sending a copy to an administrator for investigation.