Navigation menu

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

The End-To-End Encryption works with the epiKshare E2ee ownCloud plugin. In this combination you can not only send, but also receive end-to-end encrypted files and let the integrated ownCloud Client decrypt the files for you.

Depending on your License, you will have to decide if you want SmartCard supported decryption (Enterprise only) or software. Once you setup everything click the save button and the configuration will be available for all tools.

Software

Software Decryption uses a private key that is available in the file system.

For extra security, you can put the private key on a usb drive, make sure you insert it before you decrypt!

If you do not have a private key, simply click generate and the tool will create a new RSA Keypair and ask you where to save it. Alternatively you can simply load a private key you already saved previously.

Smart Card

This is the most secure way to handle your private key. The key is generated and stored on a smart card (PKCS#11 compatible) and cannot be exported onto the computer and thus also never be compromised unless you loose the smart card or dongle.

Make sure you have the smart card reader and card driver (incl. the PKCS#11 driver package!) installed and the smart card you want to use for decryption in the device.

Then select the correct PKCS#11 driver for your system (it might already be automatically detected):

  • Gemalto: "C:\Program Files (x86)\Gemalto\IDGo 800 PKCS#11\IDPrimePKCS11.dll"
  • OpenSC (i.e. YubiKey): "C:\Program Files\OpenSC Project\OpenSC\pkcs11\opensc-pkcs11.dll"

If the card is not detected automatically click on the "Check Card" button.

In case no key has been identified you can use the "Create Key" Button.

Autodetection works by having a certificate with the rsa 2048 key with an X509EnhancedKeyUsageExtension OID of 1.3.6.1.5.5.7.3.4 (id_kp_emailProtection)

Once you selected a key, make sure to test encryption once to see if en- and decryption work.

 

 

  • No labels