PGP, Pretty Good Privacy, and the PGP logo are registered trademarks of PGP Corporation in the US and other countries. IDEA is a trademark of Ascom
Tech AG. Windows and ActiveX are registered trademarks of Microsoft Corporation. AOL is a registered trademark, and AOL Instant Messenger is a
trademark, of America Online, Inc. Red Hat and Red Hat Linux are trademarks or registered trademarks of Red Hat, Inc. Linux is a registered trademark
of Linus Torvalds. Solaris is a trademark or registered trademark of Sun Microsystems, Inc. AIX is a trademark or registered trademark of International
Business Machines Corporation. HP-UX is a trademark or registered trademark of Hewlett-Packard Company. SSH and Secure Shell are trademarks of
SSH Communications Security, Inc. Rendezvous and Mac OS X are trademarks or registered trademarks of Apple Computer, Inc. All other registered
and unregistered trademarks in this document are the sole property of their respective owners.
Licensing and Patent Information
The IDEA cryptographic cipher described in U.S. patent number 5,214,703 is licensed from Ascom Tech AG. The CAST-128 encryption algorithm,
implemented from RFC 2144, is available worldwide on a royalty-free basis for commercial and non-commercial uses. PGP Corporation has secured a
license to the patent rights contained in the patent application Serial Number 10/655,563 by The Regents of the University of California, entitled Block
Cipher Mode of Operation for Constructing a Wide-blocksize block Cipher from a Conventional Block Cipher. Some third-party software included in PGP
Universal Server is licensed under the GNU General Public License (GPL). PGP Universal Server as a whole is not licensed under the GPL. If you would
like a copy of the source code for the GPL software included in PGP Universal Server, contact PGP Support (
may have patents and/or pending patent applications covering subject matter in this software or its documentation; the furnishing of this software or
documentation does not give you any license to these patents.
http://www.apache.org/), Jakarta Commons (http://jakarta.apache.org/commons/license.html) and log4j, a Java-based library used to parse HTML,
(
developed by the Apache Software Foundation. The license is at
framework for moving data from XML to Java programming language objects and from Java to databases, is released by the ExoLab Group under an
Apache 2.0-style license, available at
Foundation that implements the XSLT XML transformation language and the XPath XML query language, is released under the Apache Software
License, version 1.1, available at
Protocol") used for communications between various PGP products is provided under the Apache license found at
http://www.apache.org/licenses/LICENSE-2.0.txt. -- mx4j, an open-source implementation of the Java Management Extensions (JMX), is released under
- JacORB, a Java object used to facilitate communication between processes written in Java and the data layer, is open source licensed under the GNU
Library General Public License (LGPL) available at
open-source implementation of a CORBA Object Request Broker (ORB), and is used for communication between processes written in C/C++ and the
data layer. Copyright (c) 1993-2006 by Douglas C. Schmidt and his research group at Washington University, University of California, Irvine, and
Vanderbilt University. The open source software license is available at
downloading files via common network services, is open source software provided under a MIT/X derivate license available at
http://curl.haxx.se/docs/copyright.html. Copyright (c) 1996 - 2007, Daniel Stenberg. -- libuuid, a library used to generate unique identifiers, is released
under a BSD-style license, available at
libpopt, a library that parses command line options, is released under the terms of the GNU Free Documentation License available at
http://www.cs.fsu.edu/~engelen/license.html. -- Windows Template Library (WTL) is used for developing user interface components and is distributed
under the Common Public License v1.0 found at
automate a variety of maintenance functions and is provided under the Perl Artistic License, found at
http://www.perl.com/pub/a/language/misc/Artistic.html. -- rEFIt - libeg, provides a graphical interface library for EFI, including image rendering, text
rendering, and alpha blending, and is distributed under the license found at
http://refit.svn.sourceforge.net/viewvc/*checkout*/refit/trunk/refit/LICENSE.txt?revision=288. Copyright (c) 2006 Christoph Pfisterer. All rights reserved.
-- Java Radius Client, used to authenticate PGP Universal Web Messenger users via Radius, is distributed under the Lesser General Public License
(LGPL) found at
Copyright (c) 2009, Yahoo! Inc. All rights reserved. Released under a BSD-style license, available at
JSON-lib version 2.2.1, a Java library used to convert Java objects to JSON (JavaScript Object Notation) objects for AJAX. Distributed under the Apache
2.0 license, available at
http://ezmorph.sourceforge.net/license.html. -- Apache Commons Lang, used by JSON-lib, is distributed under the Apache 2.0 license, available at
at
http://commons.apache.org/license.html. -- Apache Commons BeanUtils, used by JSON-lib, is distributed under the Apache 2.0 license, available at
http://commons.apache.org/license.html. -- SimpleIni is an .ini format file parser and provides the ability to read and write .ini files, a common
configuration file format used on Windows, on other platforms. Distributed under the MIT License found at
license.html. Copyright 2006-2008, Brodie Thiesfield. -- uSTL provides a small fast implementation of common Standard Template Library functions and
data structures and is distributed under the MIT License found at
Mike Sharov <
the PGP SDK. Distributed under the BSD license found at
reserved.
Additional acknowledgements and legal notices are included as part of the PGP Universal Server.
http://www.gnu.org/licenses/lgpl.html. -- Yahoo! User Interface (YUI) library version 2.5.2, a Web UI interface library for AJAX.
http://json-lib.sourceforge.net/license.html. -- EZMorph, used by JSON-lib, is distributed under the Apache 2.0 license, available
msharov@users.sourceforge.net>. -- Protocol Buffers (protobuf), Google's data interchange format, are used to serialize structure data in
http://opensource.org/licenses/cpl1.0.php. -- The Perl Kit provides several independent utilities used to
http://developer.yahoo.com/yui/license.html. --
http://www.opensource.org/licenses/mit-
http://www.opensource.org/licenses/mit-license.html. Copyright (c) 2005-2009 by
http://www.opensource.org/licenses/bsd-license.php. Copyright 2008 Google Inc. All rights
Export Information
Export of this software and documentation may be subject to compliance with the rules and regulations promulgated from time to time by the Bureau
of Export Administration, United States Department of Commerce, which restricts the export and re-export of certain products and technical data.
Limitations
The software provided with this documentation is licensed to you for your individual use under the terms of the End User License Agreement provided
with the software. The information in this document is subject to change without notice. PGP Corporation does not warrant that the information meets
your requirements or that the information is free of errors. The information may include technical inaccuracies or typographical errors. Changes may be
made to the information and incorporated in new editions of this document, if and when made available by PGP Corporation.
4
Contents
Introduction
What is PGP Universal Server? 15
PGP Universal Server Product Family 16
Who Should Read This Guide 16
Common Criteria Environments 16
Improvements in this Version of PGP Universal Server 17
Using the PGP Universal Server with the Command Line 18
Symbols 18
Getting Assistance 19
Getting product information 19
Contact Information 20
15
The Big Picture 21
Important Terms 21
PGP Products 21
PGP Universal Server Concepts 22
PGP Universal Server Features 23
PGP Universal Server User Types 25
Installation Overview 26
Open Ports 33
TCP Ports 33
UDP Ports 35
Naming your PGP Universal Server
Considering a Name for Your PGP Universal Server 37
Methods for Naming a PGP Universal Server 38
37
Understanding the Administrative Interface 39
System Requirements 39
Logging In 39
The System Overview Page 41
Managing Alerts 42
Logging In For the First Time 43
Administrative Interface Map 43
Icons 45
i
PGP Universal Server Contents
Licensing Your Software 51
Overview 51
Manual and Automatic Licensing 51
Licensing a PGP Universal Server 51
Licensing the Mail Proxy Feature 52
Operating in Learn Mode 53
Purpose of Learn Mode 53
Checking the Logs 54
Managing Learn Mode 54
Importing an Organization Key 69
Organization Certificate 70
Inspecting the Organization Certificate 71
Exporting the Organization Certificate 71
Deleting the Organization Certificate 72
Generating the Organization Certificate 72
Importing the Organization Certificate 73
Additional Decryption Key (ADK) 73
Importing the ADK 74
Inspecting the ADK 74
Deleting the ADK 74
Verified Directory Key 75
67
ii
PGP Universal Server Contents
Importing the Verified Directory Key 75
Inspecting the Verified Directory Key 75
Deleting the Verified Directory Key 76
Administering Managed Keys 77
Viewing Managed Keys 78
Managed Key Information 79
Email Addresses 81
Subkeys 81
Certificates 81
Permissions 82
Attributes 83
Symmetric Key Series 83
Symmetric Keys 85
Custom Data Objects 86
Exporting Consumer Keys 87
Exporting the Managed Key of an Internal User 88
Exporting the Managed Key of an External User 88
Exporting PGP Verified Directory User Keys 89
Exporting the Managed Key of a Managed Device 89
Deleting Consumer Keys 90
Deleting the Managed Key of an Internal User 90
Deleting the Managed Key of an External User 90
Deleting the Key of a PGP Verified Directory User 91
Deleting the Managed Key of a Managed Device 91
Approving Pending Keys 91
Revoking Managed Keys 92
Managing Trusted Keys and Certificates 95
Overview 95
Trusted Keys 95
Trusted Certificates 95
Adding a Trusted Key or Certificate 96
Inspecting and Changing Trusted Key Properties 97
Deleting Trusted Keys and Certificates 97
Searching for Trusted Keys and Certificates 98
Setting Mail Policy 99
Overview 99
How Policy Chains Work 100
Mail Policy and Dictionaries 101
Mail Policy and Key Searches 101
Mail Policy and Cached Keys 102
Migrating Settings from Version 2.0.x 102
Restoring Mail Policy Rules 103
iii
PGP Universal Server Contents
Understanding the Pre-Installed Policy Chains 108
Mail Policy Outside the Mailflow 110
Using the Rule Interface 111
The Conditions Card 111
The Actions Card 113
Building Valid Chains and Rules 114
Using Valid Processing Order 114
Creating Valid Groups 115
Creating a Valid Rule 116
Managing Policy Chains 117
Mail Policy Best Practices 117
Restoring Mail Policy to Default Settings 117
Editing Policy Chain Settings 118
Adding Policy Chains 118
Deleting Policy Chains 119
Exporting Policy Chains 120
Printing Policy Chains 120
Managing Rules 121
Adding Rules to Policy Chains 121
Deleting Rules from Policy Chains 121
Enabling and Disabling Rules 122
Changing the Processing Order of the Rules 122
Adding Key Searches 122
Choosing Condition Statements, Conditions, and Actions 123
Condition Statements 123
Conditions 124
Actions 131
Working with Common Access Cards 144
Applying Key Not Found Settings to External Users 145
Overview 145
Bounce the Message 146
PDF Messenger 146
Certified Delivery with PDF Messenger 147
Send Unencrypted 147
Smart Trailer 148
PGP Universal Web Messenger 149
Changing Policy Settings 150
Changing User Delivery Method Preference 151
Deleting a Dictionary 158
Exporting a Dictionary 159
Searching the Dictionaries 159
Keyservers, SMTP Archive Servers, and Mail Policy 161
Overview 161
Keyservers 161
Adding or Editing a Keyserver 162
Deleting a Keyserver 164
SMTP Servers 164
Adding or Editing an Archive Server 164
Deleting an Archive Server 165
Managing Keys in the Key Cache 167
Overview 167
Changing Cached Key Timeout 167
Purging Keys from the Cache 168
Trusting Cached Keys 168
Viewing Cached Keys 168
Searching the Key Cache 169
Configuring Mail Proxies 171
Overview 171
PGP Universal Server and Mail Proxies 171
Mail Proxies in an Internal Placement 172
Mail Proxies in a Gateway Placement 173
Changes in Proxy Settings from PGP Universal Server 2.0 to 2.5 and later 175
Mail Proxies Page 175
Creating New or Editing Existing Proxies 176
Creating or Editing a POP/IMAP Proxy 176
Creating or Editing an Outbound SMTP Proxy 178
Creating or Editing an Inbound SMTP Proxy 180
Creating or Editing a Unified SMTP Proxy 182
Email in the Mail Queue 187
Overview 187
Deleting Messages from the Mail Queue 188
Specifying Mail Routes 189
Overview 189
Managing Mail Routes 190
v
PGP Universal Server Contents
Adding a Mail Route 190
Editing a Mail Route 191
Deleting a Mail Route 191
Customizing System Message Templates 193
Overview 193
Templates and Message Size 194
PDF Messenger Templates 194
Templates for New PGP Universal Web Messenger Users 194
Editing a Message Template 195
Managing Groups 197
Understanding Groups 197
Sorting Consumers into Groups 197
Everyone Group 198
Excluded Group 198
Policy Group Order 199
Migrating Groups from Version 2.x 199
Setting Policy Group Order 199
Creating a New Group 199
Deleting a Group 200
Viewing Group Members 200
Manually Adding Group Members 201
Manually Removing Members from a Group 201
Group Permissions 202
Adding Group Permissions 203
Deleting Group Permissions 203
Setting Group Membership 204
Searching Groups 205
Creating Group Client Installations 205
How Group Policy is Assigned to PGP Desktop Installers 206
Creating PGP Desktop Installers 207
Managing Devices 211
Managed Devices 212
Adding and Deleting Managed Devices 212
Adding Managed Devices to Groups 213
Managed Device Information 214
Deleting Managed Devices from PGP Universal Server 218
Deleting Managed Devices from Groups 219
WDE Devices (Computers and Disks) 220
Understanding Entropy 226
Using the Windows Preinstallation Environment 227
X.509 Certificate Management in Lotus Notes Environments 227
Trusting Certificates Created by PGP Universal Server 228
Setting the Lotus Notes Key Settings in PGP Universal Server 230
Technical Deployment Information 231
Offline Policy 231
Using a Policy ADK 233
Out of Mail Stream Support 233
Enrolling Users through Silent Enrollment 235
Silent Enrollment with Windows 235
Silent Enrollment with Mac OS X 235
PGP Whole Disk Encryption Administration 235
PGP Whole Disk Encryption on Mac OS X with FileVault 236
How Does Single Sign-On Work? 236
Enabling Single Sign-On 237
Managing Clients Remotely Using a PGP WDE Administrator Active Directory Group 238
Managing Clients Locally Using the PGP WDE Administrator Key 239
Managing Consumer Policies 240
Adding a Consumer Policy 241
Editing a Consumer Policy 241
Deleting a Consumer Policy 242
Setting Policy for Clients 243
Client and PGP Universal Server Version Compatibility 243
Serving PGP Admin 8 Preferences 244
Establishing PGP Desktop Settings for Your PGP Desktop Clients 245
How the PGP NetShare Policy Settings Work Together 249
Multi-user environments and managing PGP NetShare 249
Backing Up PGP NetShare-Protected Files 250
Using Directory Synchronization to Manage Consumers
How PGP Universal Server Uses Directory Synchronization 251
Base DN and Bind DN 253
Consumer Matching Rules 254
Understanding User Enrollment Methods 254
vii
251
PGP Universal Server Contents
Before Creating a Client Installer 255
Email Enrollment 256
Directory Enrollment 257
Enabling Directory Synchronization 260
Adding or Editing an LDAP Directory 260
The LDAP Servers Tab 261
The Base Distinguished Name Tab 262
The Consumer Matching Rules Tab 262
Testing the LDAP Connection 263
Using Sample Records to Configure LDAP Settings 263
Deleting an LDAP Directory 263
Setting LDAP Directory Order 264
Directory Synchronization Settings 264
Managing User Accounts
Understanding User Account Types 267
Viewing User Accounts 267
User Management Tasks 267
Setting User Authentication 268
Editing User Attributes 268
Adding Users to Groups 268
Editing User Permissions 269
Deleting Users 269
Searching for Users 270
Viewing User Log Entries 270
Changing Display Names and Usernames 270
Exporting a User’s X.509 Certificate 271
Revoking a User's X.509 Certificate 272
Managing User Keys 272
Managing Internal User Accounts 273
Importing Internal User Keys Manually 273
Creating New Internal User Accounts 274
Exporting PGP Whole Disk Encryption Login Failure Data 274
Internal User Settings 275
Managing External User Accounts 279
Importing External Users 280
Exporting Delivery Receipts 280
External User Settings 281
Managing Verified Directory User Accounts 283
Importing Verified Directory Users 284
PGP Verified Directory User Settings 284
267
Recovering Encrypted Data in an Enterprise Environment
Using Key Reconstruction 287
Recovering Encryption Key Material without Key Reconstruction 288
Encryption Key Recovery of CKM Keys 288
viii
287
PGP Universal Server Contents
Encryption Key Recovery of GKM Keys 288
Encryption Key Recovery of SCKM Keys 289
Encryption Key Recovery of SKM Keys 290
Using an Additional Decryption Key for Data Recovery 290
PGP Universal Satellite 293
Overview 293
Technical Information 294
Distributing the PGP Universal Satellite Software 294
Configuration 295
Deployment Mode 295
Key Mode 295
PGP Universal Satellite Configurations 296
Switching Key Modes 300
Binding 300
Pre-Binding 301
Manual Binding 302
Policy and Key or Certificate Retrieval 303
Retrieving Lost Policies 304
Retrieving Lost Keys or Certificates 305
PGP Universal Satellite for Mac OS X 309
Overview 309
System Requirements 309
Obtaining the Installer 310
Installation 310
Updates 311
Files 311
PGP Universal Satellite for Windows
Overview 313
System Requirements 314
Obtaining the Installer 314
Installation 315
Updates 316
Files 316
MAPI Support 316
External MAPI Configuration 316
Internal MAPI Configuration 317
Using MAPI 318
Lotus Notes Support 319
External Lotus Notes Configuration 319
Internal Lotus Notes Configuration 320
Using Lotus Notes 321
Notes IDs 321
313
ix
PGP Universal Server Contents
Configuring PGP Universal Web Messenger 323
Overview 323
PGP Universal Web Messenger and Clustering 324
External Authentication 325
Customizing PGP Universal Web Messenger 326
Adding a New Template 327
Troubleshooting Customization 331
Changing the Active Template 334
Deleting a Template 334
Editing a Template 334
Downloading Template Files 335
Restoring to Factory Defaults 335
Configuring the PGP Universal Web Messenger Service 335
Starting and Stopping PGP Universal Web Messenger 336
Selecting the PGP Universal Web Messenger Network Interface 336
Setting Up External Authentication 338
Creating Settings for PGP Universal Web Messenger User Accounts 339
Setting Message Replication in a Cluster 340
Configuring the Integrated Keyserver 341
Overview 341
Starting and Stopping the Keyserver Service 341
Configuring the Keyserver Service 342
Configuring the PGP Verified Directory 345
Overview 345
Starting and Stopping the PGP Verified Directory 346
Configuring the PGP Verified Directory 346
Managing the Certificate Revocation List Service
Overview 349
Starting and Stopping the CRL Service 349
Editing CRL Service Settings 350
349
Configuring Universal Services Protocol 351
Starting and Stopping USP 351
Adding USP Interfaces 351
x
PGP Universal Server Contents
System Graphs 353
Overview 353
CPU Usage 353
Message Activity 354
Whole Disk Encryption 354
Recipient Statistics 355
Recipient Domain Statistics 355
System Logs 357
Overview 357
Filtering the Log View 358
Searching the Log Files 359
Exporting a Log File 359
Enabling External Logging 360
Configuring SNMP Monitoring 361
Overview 361
Starting and Stopping SNMP Monitoring 362
Configuring the SNMP Service 362
Downloading the Custom MIB File 363
Shutting Down and Restarting Services and Power 365
Overview 365
Server Information 365
Setting the Time 365
Updating Software 366
Licensing a PGP Universal Server 366
Downloading the Release Notes 367
Shutting Down and Restarting the PGP Universal Server Software Services 367
Shutting Down and Restarting the PGP Universal Server Hardware 367
Managing Administrator Accounts 369
Overview 369
Administrator Roles 370
Administrator Authentication 370
Creating a New Administrator 371
Importing SSH v2 Keys 372
Deleting Administrators 372
Inspecting and Changing the Settings of an Administrator 373
Configuring RSA SecurID Authentication 374
Resetting SecurID PINs 375
xi
PGP Universal Server Contents
Daily Status Email 376
Protecting PGP Universal Server with Ignition Keys 377
Overview 377
Ignition Keys and Clustering 378
Preparing Hardware Tokens to be Ignition Keys 379
Configuring a Hardware Token Ignition Key 380
Configuring a Soft-Ignition Passphrase Ignition Key 381
Deleting Ignition Keys 381
Backing Up and Restoring System and User Data 383
Overview 383
Creating Backups 383
Scheduling Backups 384
Performing On-Demand Backups 384
Configuring the Backup Location 384
Restoring From a Backup 385
Restoring On-Demand 386
Restoring Configuration 386
Restoring from a Different Version 387
Updating PGP Universal Server Software 389
Overview 389
Inspecting Update Packages 390
Establishing Software Update Settings 390
Checking for New Updates 391
Uploading Update Packages 391
Manually Installing an Update 391
Setting Network Interfaces
Understanding the Network Settings 393
Connecting to a Proxy Server 394
Changing Interface Settings 394
Adding Interface Settings 395
Deleting Interface Settings 395
Editing Global Network Settings 395
Assigning a Certificate 396
Working with Certificates 396
Importing an Existing Certificate 397
Generating a Certificate Request 397
Adding a Pending Certificate 398
Inspecting a Certificate 399
Exporting a Certificate 399
Deleting a Certificate 399
393
xii
PGP Universal Server Contents
Clustering your PGP Universal Servers 401
Overview 401
Clustering and PGP Universal Web Messenger 402
Cluster Status 403
Creating a Cluster 404
Deleting Cluster Members 406
Managing Settings for Cluster Members 406
Changing Network Settings in Clusters 408
Index 409
xiii
Introduction
1
This Administrator’s Guide describes both the PGP Universal Server ™ and client
software. It tells you how to get them up and running on your network, how to
configure them, and how to maintain them. This section provides a high-level
overview of PGP Universal Server.
What is PGP Universal Server?
PGP Universal Server is a single console for managing the applications that
provide email, disk, and network file encryption.
PGP Universal Server with PGP Universal Gateway Email gives you secure
messaging: it transparently protects your enterprise messages with little or no
user interaction.
The PGP Universal Server also replaces the PGP Keyserver product with a builtin keyserver, and the PGP Admin product with PGP Desktop configuration and
deployment capabilities.
PGP Universal Server automatically creates and maintains a Self-Managing
Security Architecture (SMSA) by monitoring authenticated users and their email
traffic. You can also send protected messages to addresses that are not part of
the SMSA. The PGP Universal Server encrypts, decrypts, signs, and verifies
messages automatically, providing strong security through policies you control.
PGP Universal Satellite, a client-side feature of PGP Universal Server, extends
PGP security for email messages all the way to the computer of the email user,
it allows external users to become part of the SMSA, and it gives end users the
option to create and manage their keys on their own computer (if allowed by the
PGP administrator).
PGP Desktop, a client product, is created and managed through PGP Universal
Server policy. It creates PGP keypairs and can manage user keypairs as well as
store the public keys of others. It encrypts user email and instant messaging
(IM). It can encrypt entire or partial hard drives. It also enables secure file
sharing with others over a network.
15
PGP Universal Server Introduction
PGP Universal Server Product Family
PGP Universal Server functions as a management console for a variety of
encryption solutions. You can purchase any of the PGP Desktop applications or
bundles and use PGP Universal Server to create and manage client installations.
You can also purchase a license that enables PGP Gateway Email to encrypt
email in the mailstream.
The PGP Universal Server can manage any combination of PGP encryption
applications. PGP encryption applications are:
PGP Universal Gateway Email provides automatic email encryption in the
gateway, based on centralized mail policy. This product requires
administration by the PGP Universal Server.
PGP Desktop Email provides encryption at the desktop for mail, files, and
AOL Instant Messenger traffic. This product can be managed by the PGP
Universal Server.
PGP Whole Disk Encryption provides encryption at the desktop for an
entire disk. This product can be managed by the PGP Universal Server.
PGP NetShare provides transparent file encryption and sharing among
desktops. This product can be managed by the PGP Universal Server.
Who Should Read This Guide
This Administrator’s Guide is for the person or persons who implement and
maintain your organization’s PGP Universal Server environment. These are the
PGP Universal Server administrators.
This guide is also intended for anyone else who wants to learn about how PGP
Universal Server works.
Common Criteria Environments
To be Common Criteria compliant, please refer to the best practices shown in
PGP Universal Server 2.9 Common Criteria Supplemental. Note that these best
practices supersede recommendations made elsewhere in this and other
documentation.
16
PGP Universal Server Introduction
Improvements in this Version of PGP Universal Server
This release of PGP Universal Server introduces the following new and
improved features:
Verified Directory users, and devices are now called consumers.
Consumers are sorted into groups manually, by user type, or by matching
consumer attributes to domains, dictionary entries or through LDAP values.
Group membership determines which policy consumers receive.
Expanded directory synchronization: The integrated directory
synchronization feature now connects to multiple LDAP directories.
Previous versions of PGP Universal Server could only connect to one
corporate directory at a time.
Managed PGP Mobile: PGP Universal Server now manages client policy
for PGP Mobile installations.
Operating system change: The new CentOS operating system improves
scalability and reliability, and supports a wider variety of hardware.
RSA SecurID support for administrator authentication: PGP Universal
Server now supports two-factor authentication using RSA SecurID. This
meets strong authentication requirements for environments with higher
security needs, and is compatible with existing RSA SecurID deployments.
PGP Keys
Key Management Server (KMS): The new key management feature
provides new and expanded key management capabilities for PGP
products. Key policy changes are now immediately enforced. KMS allows
management of asymmetric and symmetric keys. The API and SDK provide
key management functionality to non-PGP applications.
Server Key Mode offline use: The client can now store the SKM private
key, encrypted to a random passphrase, so users can read email offline.
PGP Messaging
ADK archival output: Administrators can archive end-to-end encrypted
email messages by decrypting the messages on PGP Universal Server
using the ADK, and sending the decrypted messages to an archive server.
Encrypted email messages are then searchable, making possible
compliance with regulatory mandates and requirements for message
retention, mail server data management, and legal discovery support.
17
PGP Universal Server Introduction
Recursive encoding: Provides an additional layer of protection to email
messages that have been partially protected and to email messages that
have been signed. Supports an additional layer of encoding if the initial layer
is not complete.
Clustering
New clustering functionality: Cluster members now interact with each
other as peers, replacing the previous Primary/Secondaries model. Every
server in a cluster can serve all types of requests, and any server can
initiate persistent changes. The new cluster model also permits up to 20
nodes in a cluster.
Using the PGP Universal Server with the Command Line
Using the PGP Universal Server command line for read-only access (such as to
view settings, services, logs, processes, disk space, query the database, etc) is
supported. However, performing configuration modifications via the command
line voids your PGP Support agreement unless these procedures are followed.
Any changes made to the PGP Universal Server via the command line must be:
Symbols
Authorized in writing by PGP Support.
Implemented by a PGP Partner, reseller or internal employee who is
certified in the PGP Advanced Administration and Deployment Training.
Summarized and documented in a text file in /etc/pso on the PGP Universal
Server itself.
Changes made through the command line might not persist through reboots and
might be incompatible with future releases. PGP Support can require reverting
any custom configurations on the PGP Universal Server back to a default state
when troubleshooting new issues.
Notes, Cautions, and Warnings are used in the following ways.
Note: Notes are extra, but important, information. A Note calls your attention
to important aspects of the product. You can use the product better if you
read the Notes.
Caution: Cautions indicate the possibility of loss of data or a minor security
breach. A Caution tells you about a situation where problems can occur
unless precautions are taken. Pay attention to Cautions.
18
PGP Universal Server Introduction
Warning: Warnings indicate the possibility of significant data loss or a major
security breach. A Warning means serious problems will occur unless you
take the appropriate action. Please take Warnings very seriously.
Getting Assistance
For additional resources, see these sections.
Getting product information
The following documents and online help are companions to the PGP Universal
Server Administrator’s Guide. This guide occasionally refers to information that
can be found in one or more of these sources:
Online help is installed and is available within the PGP Universal Server
product.
PGP Universal Server Installation Guide—Describes how to install the
PGP Universal Server software.
PGP Universal Server Upgrade Guide—Describes the process of
upgrading your PGP Universal Server.
PGP Universal Mail Policy Diagram—Provides a graphical representation
of how email is processed through mail policy. You can access this
document via the PGP Universal Server online help.
Tutorials—Provides animated introductions on how to manage the mail
policy feature in PGP Universal Server 2.5 and later, and how upgraded PGP
Universal Server settings migrate into the new mail policy feature.
You can also access all the documentation and tutorials by clicking the
online help icon in the upper-right corner of the PGP Universal Server
screen.
PGP Universal Satellite for Windows and Mac OS X include online help.
PGP Universal Server and PGP Satellite release notes are also provided,
which may have last-minute information not found in the product
documentation.
Once PGP Universal Server is released, additional information regarding the
product is added to the online Knowledge Base available on PGP Corporation’s Support Portal (
https://support.pgp.com).
19
PGP Universal Server Introduction
Contact Information
Contacting Technical Support
To learn about PGP support options and how to contact PGP Technical
Support, please visit the PGP Corporation Support Home Page
(
https://support.pgp.com).
To access the PGP Support Knowledge Base or request PGP Technical
Support, please visit PGP Support Portal Web Site
(
https://support.pgp.com). Note that you may access portions of the PGP
Support Knowledge Base without a support agreement; however, you
must have a valid support agreement to request Technical Support.
To access the PGP Support forums, please visit PGP Support
(
http://forum.pgp.com). These are user community support forums hosted
by PGP Corporation.
Contacting Customer Service
For help with orders, downloads, and licensing, please visit PGP
Corporation Customer Service (
https://pgp.custhelp.com/app/cshome).
Contacting Other Departments
For any other contacts at PGP Corporation, please visit the PGP Contacts
For general information about PGP Corporation, please visit the PGP Web
Site (
http://www.pgp.com).
20
The Big Picture
2
This chapter describes some important terms and concepts and gives you a
high-level overview of the things you need to do to set up and maintain your
PGP Universal Server environment.
Important Terms
The following sections define important terms you will encounter throughout
the PGP Universal Server and this documentation.
PGP Products
PGP Universal Server: A device you add to your network that provides
secure messaging with little or no user interaction. The PGP Universal
Server automatically creates and maintains a security architecture by
monitoring authenticated users and their email traffic. You can also send
protected messages to addresses that are not part of the security
architecture.
PGP Global Directory: A free, public keyserver hosted by PGP Corporation.
The PGP Global Directory provides quick and easy access to the universe of
PGP keys. It uses next-generation keyserver technology that queries the
email address on a key (to verify that the owner of the email address wants
their key posted) and lets users manage their own keys. Using the PGP
Global Directory significantly enhances your chances of finding a valid public
key of someone to whom you want to send secured messages.
PGP Universal Satellite: The PGP Universal Satellite software resides on
the computer of the email user. It allows email to be encrypted end to end,
all the way to and from the desktop (for both internal and external users).
Using PGP Universal Satellite is one of the ways for external users to
participate in the SMSA. It also allows users the option of controlling their
keys on their local computers (if allowed by the administrator).
PGP Desktop: A client software tool that uses cryptography to protect your
data against unauthorized access. PGP Desktop is available for Mac OS X
and Windows.
PGP Whole Disk Encryption: Whole Disk Encryption is a feature of PGP
Desktop that encrypts your entire hard drive or partition (on Windows
systems), including your boot record, thus protecting all your files when you
are not using them.
21
PGP Universal Server The Big Picture
PGP NetShare: A feature of PGP Desktop for Windows with which you can
securely and transparently share files and folders among selected
individuals. PGP NetShare users can protect their files and folders simply by
placing them within a folder that is designated as protected.
PGP Virtual Disk: PGP Virtual Disk volumes are a feature of PGP Desktop
that let you use part of your hard drive space as an encrypted virtual disk.
You can protect a PGP Virtual Disk volume with a key or a passphrase. You
can also create additional users for a volume, so that people you authorize
can also access the volume.
PGP Zip: A feature of PGP Desktop that lets you put any combination of
files and folders into a single encrypted, compressed package for
convenient transport or backup. You can encrypt a PGP Zip archive to a PGP
key or to a passphrase.
PGP Universal Web Messenger: The PGP Universal Web Messenger
service allows an external user to securely read a message from an internal
user before the external user has a relationship with the SMSA. If PGP
Universal Web Messenger is available via mail policy for a user and the
recipient’s key cannot be found, the message is stored on the PGP
Universal Server and an unprotected message is sent to the recipient. The
unprotected message includes a link to the original message, held on the
PGP Universal Server. The recipient must create a passphrase, and then
can access his encrypted messages stored on PGP Universal Server.
PDF Messenger: PDF Messenger enables sending encrypted PDF
messages to external users who do not have a relationship with the SMSA.
In the normal mode, as with PGP Universal Web Messenger, the user
receives a message with a link to the encrypted message location and uses
a PGP Universal Web Messenger passphrase to access the message. PDF
Messenger also provides Certified Delivery, which encrypts the message to
a one-time passphrase, and creates and logs a delivery receipt when the
user retrieves the passphrase.
PGP Universal Server Concepts
keys.<domain> convention: PGP Universal Server automatically looks for
valid public keys for email recipients at a special hostname, if no valid public
key is found locally to secure a message. This hostname is keys.<domain>
(where <domain> is the email domain of the recipient). For example,
Example Corporation’s externally visible PGP Universal Server is named
keys.example.com.
PGP Corporation strongly recommends you name your externally visible
PGP Universal Server according to this convention because it allows other
PGP Universal Servers to easily find valid public keys for email recipients in
your domain.
For more information, see Naming your PGP Universal Server (on page
22
37).
PGP Universal Server The Big Picture
Security Architecture: Behind the scenes, the PGP Universal Server
creates and manages its own security architecture for the users whose
email domain it is securing. Because the security architecture is created
and managed automatically, we call this a self-managing security
architecture (SMSA).
PGP Universal Server Features
Administrative Interface: Each PGP Universal Server is controlled via a
Web-based administrative interface. The administrative interface gives you
control over PGP Universal Server. While many settings are initially
established using the web-based Setup Assistant, all settings of a PGP
Universal Server can be controlled via the administrative interface.
Backup and Restore: Because full backups of the data stored on your PGP
Universal Server are critical in a natural disaster or other unanticipated loss
of data or hardware, you can schedule automatic backups of your PGP
Universal Server data or manually perform a backup.
You can fully restore a PGP Universal Server from a backup. In the event of
a minor problem, you can restore the PGP Universal Server to any saved
backup. In the event that a PGP Universal Server is no longer usable, you
can restore its data from a backup onto a new PGP Universal Server during
initial setup of the new PGP Universal Server using the Setup Assistant. All
backups are encrypted to the Organization Key and can be stored securely
off the PGP Universal Server.
Cluster: When you have two or more PGP Universal Servers in your
network, you configure them to synchronize with each other; this is called a
“cluster.”
Dictionary: Dictionaries are lists of terms to be matched. The dictionaries
work with mail policy to allow you to define content lists that can trigger
rules.
Directory Synchronization: If you have LDAP directories in your
organization, your PGP Universal Server can be synchronized with the
directories. The PGP Universal Server automatically imports user
information from the directories when users send and receive email; it also
creates internal user accounts for them, including adding and using X.509
certificates if they are contained in the LDAP directories.
Ignition Keys: You can protect the contents of a PGP Universal Server,
even if the hardware is stolen, by requiring the use of a hardware token or a
software passphrase, or both, on start.
Keyserver: Each PGP Universal Server includes an integrated keyserver
populated with the public keys of your internal users. When an external
user sends a message to an internal user, the external PGP Universal
Server goes to the keyserver to find the public key of the recipient to use to
secure the message. The PGP Universal Server administrator can enable or
disable the service, and control access to it via the administrative interface.
23
PGP Universal Server The Big Picture
Learn Mode: When you finish configuring a PGP Universal Server using the
Setup Assistant, it begins in Learn Mode, where the PGP Universal Server
sends messages through mail policy without taking any action on the
messages, and does not encrypt or sign any messages.
Learn Mode gives the PGP Universal Server a chance to build its SMSA
(creating keys for authenticated users, for example) so that when when
Learn Mode is turned off, the PGP Universal Server can immediately begin
securing messages. It is also an excellent way for administrators to learn
about the product.
You should check the logs of the PGP Universal Server while it is in Learn
Mode to see what it would be doing to email traffic if it were live on your
network. You can make changes to the PGP Universal Server’s policies
while it is in Learn Mode until things are working as expected.
Mail Policy: The PGP Universal Server processes email messages based
on the policies you establish. Mail policy applies to inbound and outbound
email for both PGP Universal Server traffic and email processed by PGP
client software. Mail policy consists of multiple policy chains, comprised of
sequential mail processing rules.
Organization Certificate: You must create or obtain an Organization
Certificate to enable S/MIME support by PGP Universal Server. The
Organization Certificate signs all X.509 certificates the server creates.
Organization Key: The Setup Assistant automatically creates an
Organization Key (actually a keypair) when it configures a PGP Universal
Server. The Organization Key is used to sign all PGP keys the PGP Universal
Server creates and to encrypt PGP Universal Server backups.
Caution: It is extremely important to back up your Organization Key: all
keys the PGP Universal Server creates are signed by the Organization Key,
and all backups are encrypted to the Organization Key. If you lose your
Organization Key and have not backed it up, the signatures on those keys
are meaningless and you cannot restore from backups encrypted to the
Organization Key.
PGP Verified Directory: The PGP Verified Directory supplements the
internal keyserver by letting internal and external users manage the
publishing of their own public keys. The PGP Verified Directory also serves
as a replacement for the PGP Keyserver product. The PGP Verified
Directory uses next-generation keyserver technology to ensure that the
keys in the directory can be trusted.
Server Placement: A PGP Universal Server can be placed in one of two
locations in your network to process email.
With an internal placement, the PGP Universal Server logically sits between
your email users and your mail server. It encrypts and signs outgoing SMTP
email and decrypts and verifies incoming mail being picked up by email
clients using POP or IMAP. Email stored on your mail server is stored
secured (encrypted).
24
PGP Universal Server The Big Picture
With a gateway placement, the PGP Universal Server logically sits between
your mail server and the Internet. It encrypts and signs outgoing SMTP
email and decrypts and verifies incoming SMTP email. Email stored on your
mail server is stored unsecured.
For more information, see Configuring Mail Proxies (on page
PGP Universal Server Installation Guide.
Setup Assistant: When you attempt to log in for the first time to the
administrative interface of a PGP Universal Server, the Setup Assistant
takes you through the configuration of that PGP Universal Server.
PGP Universal Server User Types
Administrators: Any user who manages the PGP Universal Server and its
security configuration from inside the internal network.
Only administrators are allowed to access the administrative interface that
controls PGP Universal Server. A PGP Universal Server supports multiple
administrators, each of which can be assigned a different authority: from
read-only access to full control over every feature and function.
Consumers: Internal, external, and Verified Directory users, and devices.
External Users: External users are email users from other domains
(domains not being managed by your PGP Universal Server) who have
been added to the SMSA.
Internal Users: Internal users are email users from the domains being
managed by your PGP Universal Server.
171) and the
PGP Universal Server allows you to manage PGP Desktop deployments
to your internal users. The administrator can control which PGP Desktop
features are automatically implemented at install, and establish and
update mail security policy for PGP Desktop users that those users
cannot override (except on the side of being more secure).
PGP Verified Directory Users: Internal and external users who have
submitted their public keys to the PGP Verified Directory, a Webaccessible keyserver.
Devices: Managed devices, WDE computers, and WDE disks.
Managed devices are arbitrary objects whose keys are managed by
PGP Universal Server. WDE computers, and WDE disks are devices
that are detected when users enroll.
Other Email Users: Users within your organization can securely send email
to recipients outside the SMSA.
First, the PGP Universal Server attempts to find a key for the recipient. If
that fails, there are four fallback options, all controlled by mail policy:
bounce the message back to the sender (so it is not sent unencrypted),
send unencrypted, Smart Trailer, and PGP Universal Web Messenger mail.
25
PGP Universal Server The Big Picture
Smart Trailer sends the message unencrypted and adds text giving the
recipient the option of joining the SMSA by installing PGP Universal
Satellite, using an existing key or certificate, or using PGP Universal Web
Messenger. PGP Universal Web Messenger lets the recipient securely read
the message on a secure website; it also gives the recipient options for
handling subsequent messages from the same domain: read the messages
on a secure website using a passphrase they establish, install PGP
Universal Satellite, or add an existing key or certificate to the SMSA.
Installation Overview
The following steps are a broad overview of what it takes to plan, set up, and
maintain your PGP Universal Server environment.
Most of the steps described here are described in detail in later chapters. Steps
1 and 4 are described in the PGP Universal Server Installation Guide. Note that
these steps apply to the installation of a new, stand-alone PGP Universal Server.
If you plan to install a cluster, you must install and configure one PGP Universal
Server following the steps outlined here. Subsequent cluster members will get
most of their configuration settings from the initial server by replication.
The steps to install and configure a PGP Universal Server are as follows:
1 Plan where in your network you want to locate your PGP Universal
Server(s).
Where you put PGP Universal Servers in your network, how many PGP
Universal Servers you have in your network, and other factors all have a
major impact on how you add them to your existing network.
Create a diagram of your network that includes all network components and
shows how email flows; this diagram details how adding a PGP Universal
Server impacts your network.
For more information on planning how to add PGP Universal Servers to your
existing network, see Adding the PGP Universal Server to Your Network in
the PGP Universal Server Installation Guide.
2 Perform necessary DNS changes.
Add IP addresses for your PGP Universal Servers, an alias to your
keyserver, update the MX record if necessary, add keys.<domain>,
hostnames of potential Secondary servers for a cluster, and so on.
Properly configured DNS settings (including root servers and appropriate
reverse lookup records) are required to support PGP Universal Server. Make
sure both host and pointer records are correct. IP addresses must be
resolvable to hostnames, as well as hostnames resolvable to IP addresses.
3 Prepare a hardware token Ignition Key.
26
Loading...
+ 390 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.