Using S/Mime To Protect Email Transmission; E-Mail Encryption - Ricoh Aficio MP W5100 Operating Instructions Manual

Security reference
Hide thumbs Also See for Aficio MP W5100:
Table of Contents

Advertisement

Using S/MIME to Protect Email Transmission

By registering a user certificate in the Address Book, you can send e-mail that is encrypted with a public
key which prevents its content from being altered during transmission. You can also prevent sender
impersonation (spoofing) by installing a device certificate on the machine, and attaching an electronic
signature created with a private key. You can apply these functions separately or, for stronger security,
together.
To send encrypted e-mail, both the sender (this machine) and the receiver must support S/MIME.
For details about using S/MIME with the scanner function, see "Security Settings to E-mails", Scanner
Reference.
Compatible Mailer Applications
The S/MIME function can be used with the following applications:
• Microsoft Outlook 98 and later
• Microsoft Outlook Express 5.5 and later
• Netscape Messenger 7.1 and later
• Lotus Notes R5 and later
• To use S/MIME, you must first specify "Administrator's E-mail Address" in [System Settings].
• If an electronic signature is specified for an e-mail, the administrator's address appears in the "From"
field and the address of the user specified as "sender" appears in the "Reply To" field.
• When sending e-mail to users that support S/MIME and users that do not support S/MIME at the
same time, the e-mail is separated into encrypted and unencrypted groups and then sent.
• When using S/MIME, the e-mail size is larger than normal.

E-mail Encryption

To send encrypted e-mail using S/MIME, the user certificate must first be prepared using Web Image
Monitor and registered in the Address Book by the user administrator. Registering the certificate in the
Address Book specifies each user's public key. After installing the certificate, specify the encryption
algorithm using Web Image Monitor. The network administrator can specify the algorithm.
E-mail Encryption
1. Prepare the user certificate.
2. Install the user certificate in the Address Book using Web Image Monitor. (The public key on the
certificate is specified in the Address Book.)
3. Specify the encryption algorithm using Web Image Monitor.
Using S/MIME to Protect Email Transmission
3
135

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents