Prerequisites |
---|
You’re an Enterprise Customer who runs their own Email Key Manager. |
You’re familiar with the Client Configuration options and how to set them. |
Below is an overview of possible enterprise configurations such as passphrase management, and user setup flow.
User key pair setup
There are two options for onboarding users depending on their key pairs:
Further, you’ll find more details about each option.
Key pairs generated automatically upon first use
Users will be auto-registered, and keys will be auto-generated for users during the first use of the browser extension (users need to set up the browser extension before they set up mobile apps). If you expect all of your Google users to use encryption, and you have no prior key pairs to migrate to EKM, then use this option.
How to configure:
- Set the
enforce_keygen_algo
,enforce_keygen_expire_months
, andPRV_AUTOIMPORT_OR_AUTOGEN
Client Configuration rules. - Set the
api.accept.client.keypairs=true
property for EKM in the properties file of the Enterprise Server or Email Key Manager.
Pre-set key pairs by admin
User needs to be registered into the system by the admin from EAP, and their keys need to be pre-generated or pre-imported. A particular user can only set up the extension if the admin already created (or imported) the keys for them.
How to configure:
- Set the
PRV_AUTOIMPORT_OR_AUTOGEN
, andNO_PRV_CREATE
Client Configuration rules. - Set the
api.accept.client.keypairs=false
property for EKM in the properties file of the Enterprise Server or Email Key Manager.
Combined / transition
You can combine these two options. Pre-generate or pre-import keys for everyone that needs them (with a system configured for pre-set) initially. Once you have your initial user population set up, you may later change the configuration to auto-generate key pairs as more users join the organization.
End-user passphrases
There are two options to handle user passphrases based on your requirements.
Further, you’ll find more details about each option.
No user passphrases
During the setup process, the client app auto-generates a passphrase and stores it along with the key. From the user’s perspective, they won’t be asked to create, remember or enter any passphrase, making it similar to a regular email experience.
Passphrases set by users during setup
Users are expected to create their own passphrase during the setup of each client app. The passphrase will be saved in memory for 4 hours after each entry until the app is closed in the case of the mobile app, and until the browser is closed in the case of a browser extension. If the user needs to open or send an encrypted email after the passphrase has expired, they’ll be asked to re-enter it. Users won’t be asked for a passphrase for regular non-encrypted email usage.
If a user loses the passphrase, it can be recovered by going through the setup process of the app again with a new passphrase.