McAfee MEJCAE-AM-DA Product Guide - Page 146

The Other tab, The Encryption/Decryption tab, Other, Default note file, Triple-DES, Twofish, Legacy

Page 146 highlights

Using the E-Business Server Administration Utility Getting Started with the E-Business Server Administration Utility console Field Default BCC line Default note Default note file Command-line equivalent --smtp-bcc --smtp-note --smtp-notefile See Use to SMTP-BCC on page 108 Specify additional email addresses to which E-Business Server sends copies of encrytped data. Recipients do not see the addresses of any other message recipients; this information is hidden from them. These addresses appear in the "Bcc:" field of email messages. Use the format [email protected]. Separate multiple addresses with commas. SMTP-NOTE on page 108 Provide a message for E-Business Server to include in the body of email messages. The encrypted data is sent as an attachment to the message. SMTP-NOTE-FILE on page 108 (Similar to Default note file.) Browse to a file that contains the text you want E-Business Server to include in the body of email messages (when it sends encrypted data). The Other tab Use the Other tab to set miscellaneus software defaults. Field Default cipher algorithm Command-line version Default expiry-period (in days) Command-line equivalent - - --expires-after (Must be used in conjunction with other commands.) See Use to • CIPHER on page 91 Specify which cipher E-Business Server should use to when generating a new key pair, when changing the self-signature or passphrase on your private key, and when performing conventional encryption. Your choices include: IDEA, Triple-DES, CAST, AES, and Twofish. • CMDLINE-FORMAT on page 92 Make E-Business Server translate options from previous releases to those used by the current software release. Select Legacy to do this, or Long to use only current version options. • EXPIRES-AFTER on page 95 • key-gen on page 124 • key-sign on page 127 Specify the number of days your keys or signatures will be valid for. Note: When using the command-line version (--expires-after), you can specify an expiry date. When you use the E-Business Server Administration Utility, however, you can only specify expiry as a number of days. The Encryption/Decryption tab Use the Encryption/Decryption tab to configure default settings for encryption and decryption operations. Field Only decrypt a file if it has been signed Comment (for armored files) Discard paths when creating an archive or an SDA Command-line equivalent --authenticate --comment ebs --encrypt --discard-paths See Use to • AUTHENTICATE on page 89 • COMMENT on page 92 • DISCARD-PATHS on page 94 • encrypt on page 116 Decrypt files only if they have been signed. Add a comment to an armored file. Strip any relative path information from the list of files you want to include in a Self-Decrypting Archive (SDA) or PGParchive. E-Business Server™ 8.6 Product Guide 144

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

E-Business Server
8.6
Product Guide
144
Using the E-Business Server Administration Utility
Getting Started with the E-Business Server Administration Utility console
The Other tab
Use the
Other
tab to set miscellaneus software defaults.
The Encryption/Decryption tab
Use the
Encryption/Decryption
tab to configure default settings for encryption and decryption operations.
Default BCC line
--smtp-bcc
SMTP-BCC
on page 108
Specify additional email addresses to
which E-Business Server sends copies of
encrytped data. Recipients do not see the
addresses of any other message
recipients; this information is hidden
from them.
These addresses appear in the “Bcc:”
field of email messages.
Use the format
multiple addresses with commas.
Default note
--smtp-note
SMTP-NOTE
on
page 108
Provide a message for E-Business Server
to include in the body of email messages.
The encrypted data is sent as an
attachment to the message.
Default note file
--smtp-notefile
SMTP-NOTE-FILE
on
page 108
(Similar to
Default note file
.)
Browse to a file that contains the text you
want E-Business Server to include in the
body of email messages (when it sends
encrypted data).
Field
Command-line
equivalent
See
Use to
Default cipher
algorithm
CIPHER
on page 91
Specify which cipher E-Business Server
should use to when generating a new
key pair, when changing the
self-signature or passphrase on your
private key, and when performing
conventional encryption. Your choices
include:
IDEA
,
Triple-DES
,
CAST
,
AES
, and
Twofish
.
Command-line version
CMDLINE-FORMAT
on
page 92
Make E-Business Server translate
options from previous releases to those
used by the current software release.
Select
Legacy
to do this, or
Long
to use
only current version options.
Default expiry-period
(in days)
--expires-after
(Must be used in
conjunction with other
commands.)
EXPIRES-AFTER
on
page 95
key-gen
on page 124
key-sign
on page 127
Specify the number of days your keys or
signatures will be valid for.
Note:
When using the command-line
version (
--expires-after
), you can
specify an expiry date. When you use the
E-Business Server Administration Utility,
however, you can only specify expiry as
a number of days.
Field
Command-line
equivalent
See
Use to
Only decrypt a file if it
has been signed
--authenticate
AUTHENTICATE
on
page 89
Decrypt files only if they have been
signed.
Comment (for armored
files)
--comment
COMMENT
on
page 92
Add a comment to an armored file.
Discard paths when
creating an archive or
an SDA
ebs --encrypt
--discard-paths
DISCARD-PATHS
on
page 94
encrypt
on page 116
Strip any relative path information from
the list of files you want to include in a
Self-Decrypting Archive (SDA) or
PGParchive.
Field
Command-line
equivalent
See
Use to