Sensitive policy actions are applied on the server backend, while S/MIME signing and/or encryption is done in the Outlook on the web client. Because of this architectural constraint, S/MIME is disabled in Outlook on the web in messages where there are sensitivity labels with protection actions.
Mobile devices (for example, Outlook for iOS and Android, Exchange ActiveSync apps or native email apps).
As an Exchange Online admin, you can enable S/MIME-based security for the mailboxes in your organization. The high-level steps are described in the following list and are expanded upon in this article:
Set up and publish S/MIME certificates.
Set up a virtual certificate collection in Exchange Online.
Sync user certificates for S/MIME into Microsoft 365.
Configure policies to install S/MIME extensions in web browsers for Outlook on the web.
Each user in your organization requires their own certificate that's issued for the purposes of signing and encryption. You publish these certificates to your on-premises Active Directory for distribution. Your Active Directory must be located on computers at a physical location that you control and not at a remote facility or cloud-based service on the internet.
Install a Windows-based Certification Authority (CA) and set up a public key infrastructure to issue S/MIME certificates. Certificates issued by third-party certificate providers are also supported. For details, see Active Directory Certificate Services Overview.
Notes:
Certificates issued by a third-party CA have the advantage of being automatically trusted by all clients and devices. Certificates that are issued by an internal, private CA aren't automatically trusted by clients and devices, and not all devices (for example, phones) can be configured to trust private certificates.
Consider using an intermediate certificate instead of the root certificate to issue certificates to users. That way, if you ever need to revoke and reissue certificates, the root certificate is still intact.
The certificate must have a private key and the X509 extension "Subject Key Identifier" must be populated.
Publish the user's certificate in their on-premises Active Directory account in the UserSMIMECertificate and/or UserCertificate attributes.
Step 2: Set up a virtual certificate collection in Exchange Online
The virtual certificate collection is responsible for validating S/MIME certificates. Set up the virtual certificate collection by using the following steps:
Export the root and intermediate certificates that are required to validate user S/MIME certificates from a trusted machine to a serialized certificate store (SST) file in Windows PowerShell. For example:
For detailed syntax and parameter information, see Set-SmimeConfig.
Step 3: Sync user certificates for S/MIME into Microsoft 365
Before anyone can send S/MIME-protected messages in Exchange Online, you need to set up and configure the appropriate certificates for each user and publish their public X.509 certificates to Microsoft 365. The sender's email client uses the recipient's public certificate to encrypt the message.
Along with synchronizing other directory data, Microsoft Entra Connect synchronizes the userCertificate and userSMIMECertificate attributes for each user object for S/MIME signing and encryption of email messages. For more information about Microsoft Entra Connect, see What is Microsoft Entra Connect?.
Step 4: Configure policies to install the S/MIME extensions in web browsers
Note
This step is required only for Outlook on the web clients.
S/MIME in Outlook on the web in the Chromium-based Microsoft Edge or in Google Chrome requires specific policy settings that are configured by an admin.
Specifically, you need to set and configure the policy named ExtensionInstallForcelist to install the S/MIME extension in the browser. The policy value is maafgiompdekodanheihhgilkjchcakm;https://outlook.office.com/owa/SmimeCrxUpdate.ashx. Applying this policy requires domain-joined or Microsoft Entra joined devices, so using S/MIME in Edge or Chrome effectively requires domain-joined or Microsoft Entra joined devices.
For details about the policies, see the following topics:
The policy is a prerequisite for using S/MIME in Outlook on the web. It does not replace the S/MIME control that's installed by users. Users are prompted to download and install the S/MIME control in Outlook on the web during their first use of S/MIME. Or, users can proactively go to S/MIME in their Outlook on the web settings to get the download link for the control.
Step 5: Configure email clients to use S/MIME
If an email client supports S/MIME, the next consideration is access to the user's S/MIME certificate by that email client. The S/MIME certificate needs to be installed on the user's computer or device. You can distribute S/MIME certificates automatically (for example, using Microsoft Endpoint Manager) or manually (for example, the user can export the certificate from their computer and import it on their mobile device). After the certificate is available locally, you can enable and configure S/MIME in the settings of the email client.
For more information about S/MIME in email clients, see the following topics:
Plan and execute an endpoint deployment strategy, using essential elements of modern management, co-management approaches, and Microsoft Intune integration.