Share via


S/MIME for message signing and encryption in Exchange Server

Applies to: Exchange Server 2013

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a widely accepted method (or more precisely, a protocol) for sending digitally signed and encrypted messages. S/MIME allows you to encrypt emails and digitally sign them. When you use S/MIME with an email message, it helps the people who receive that message to be certain that what they see in their inbox is the exact message that started with the sender. It will also help people who receive messages to be certain that the message came from the specific sender and not from someone pretending to be the sender. To do this, S/MIME provides for cryptographic security services such as authentication, message integrity, and non-repudiation of origin (using digital signatures). It also helps enhance privacy and data security (using encryption) for electronic messaging. For a more complete background about the history and architecture of S/MIME in the context of email, see Understanding S/MIME.

As an Exchange administrator, you can enable S/MIME-based security for the mailboxes in your organization. Use the guidance in the topics linked here along with the Exchange Management Shell to set up S/MIME. To use S/MIME in supported email clients, the users in your organization must have certificates issued for signing and encryption purposes and data published to your on-premises Active Directory Domain Service (AD DS). Your AD DS must be located on computers at a physical location that you control and not at a remote facility or cloud-based service somewhere on the internet. For more information about AD DS, see Active Directory Domain Services.

Supported scenarios and technical considerations

You can set up S/MIME to work with any of the following end points:

  • Outlook 2010 or later

  • Outlook Web App (OWA)

  • Exchange ActiveSync (EAS)

The steps that you follow to set up S/MIME with each of these end points is slightly different. Generally, you will need to do the following steps:

  • Install a Windows-based Certification Authority and set up a public key infrastructure to issue S/MIME certificates. Certificates issued by third-party certificate providers are also supported. For details, see Active Directory Certificate Services Overview.

  • Publish the user certificate in an on-premises AD DS account in the UserSMIMECertificate and/or UserCertificate attributes.

  • Set up a virtual certificate collection in order to validate S/MIME. This information is used by OWA when validating the signature of an email and ensuring that it was signed by a trusted certificate.

  • Set up the Outlook or EAS end point to use S/MIME.

Setup S/MIME with Outlook Web App

Setting up S/MIME with OWA involves the following key steps:

  1. Configure S/MIME settings in Exchange Server for Outlook Web App

  2. Set up a virtual certificate collection in Exchange Server to validate S/MIME

As message security becomes more important, admins need to understand the principles and concepts of secure messaging. This understanding is especially important because of the growing variety of protection-related technologies (including S/MIME) that are available. To understand more about S/MIME and how it works in context of email, see Understanding S/MIME. A variety of encryption technologies work together to provide protection for messages at rest and in-transit. S/MIME can work simultaneously with the following technologies but is not dependent on them:

  • Transport Layer Security (TLS) encrypts the tunnel or the route between email servers in order to help prevent snooping and eavesdropping.

  • Secure Sockets Layer (SSL) encrypts the connection between email clients and Microsoft 365 or Office 365 servers.

  • BitLocker encrypts the data on a hard drive in a datacenter so that if someone gets unauthorized access, they can't read it.

S/MIME compared with Message Encryption

S/MIME requires a certificate and publishing infrastructure that is often used in business-to-business and business-to-consumer situations. The user controls the cryptographic keys in S/MIME and can choose whether to use them for each message they send. Email programs such as Outlook search a trusted root certificate authority location to perform digital signing and verification of the signature. Message Encryption is a policy-based encryption service that can be configured by an administrator, and not an individual user, to encrypt mail sent to anyone inside or outside of the organization. It's an online service that's built on Azure Rights Management (RMS) and does not rely on a public key infrastructure. Message Encryption also provides additional capabilities, such as the capability to customize the mail with organization's brand. For more information about Message Encryption, see Encryption.

More information

Outlook Web App

Secure Mail (2000)