Domains

Domains: You may manage individual accounts, user quota and authentication, mailing lists, and other associated settings on the Domain page.

Domain information and domain management sections are accessible on the website.

Make a New Domain

Fill out the form that appears after clicking the CREATE button to create a new domain.

The Domain Details section contains more setup options for the domain, such as how to configure authentication and accounts in the domain.

Domain Information

It is possible to fine-tune the domain’s setup under the many subsections found in Domain Details. If a provided domain does not specify a value for the majority of the parameters (such the Time Zone), those values are inherited from the primary domain supplied.

General Preferences

Most of them exist when the domain is created and have an impact on the fundamental setup of the domain. Additional choices include the ability to choose the time zone, whether to use the HTTP or HTTPS protocol (we always recommend using the latter), and the mail server that will be used to transmit spam.

Additionally, the domain may have a default COS and its status associated.

We add a property to the domain that was established in the preceding step.

The DELETE DOMAIN button at the bottom of the page enables domain deletion. A dialogue detailing all domain-defined elements (accounts, mailing lists, resources, etc.) that will be removed along with the domain will appear when the button is pressed. There are two options: remove the domain and all of its contents or close the domain, maintaining all objects but restricting access.

The World Access List

When creating an email or adding attendees to an event in the Calendar, for example, a GAL is a special account called the “GALSync Account” that holds all of the email accounts set up on the server and allows for rapid searches of email addresses. A GAL may be external (when configured on the LDAP used by Carbonio CE) or internal (when setup on Carbonio CE), or it may be both. You may switch the GALSync account’s email address from external to internal, vice versa, or both in this page. Additionally, you may modify some of its settings and add it, if it isn’t already there.

The period chosen in the Settings section of the page determines how frequently the GALSync account is updated.

Certificates & Virtual Hosts

A different name assigned to a domain that may be used to access the same domain is called a virtual host. The name must be registered on the domain’s DNS with an A record in order to use the virtual host. Then, users don’t need to use the domain to check in; they may only use their usernames.

You may link an SSL certificate to each virtual host. With just a few simple steps, Carbonio CE allows you to upload numerous SSL domain certificates from the Carbonio Admin Panel and link them to other domains.

The virtual host must be chosen before clicking LOAD AND VERIFY CERTIFICATE. You can input the three files that make up the authorisation chain (the Domain Certificate, the Certificate CA Chain, and the Private Key) in the first field of the dialogue, or you can copy the contents of the files directly into the relevant areas. Verify the certificates by clicking VERIFY; if everything is accurate, notice will appear. It will show that the certificate is valid. The certificate must be uploaded and used by clicking the I WANT TO USE THIS CERTIFICATE button. The certificates have been stored, and another message will appear. To finish the process, you must restart the node on which the proxy is installed unless you are on a single-node;

By selecting the corresponding button above the certificates themselves, you may REMOVE or DOWNLOAD the certificates.

Mailbox Limit

With the help of these options, you may provide a maximum limit (in bytes, with 0 denoting no restriction) for the amount of space that each account and the domain as a whole may consume. Another option is to define a number that, when reached, will send an email warning to a specified address. The settings set here are inherited by all newly created accounts, however they may be changed on a per-user basis.

A list of accounts and their utilised quotas may be seen at the bottom of the page, making it easier to keep track of user usage.

Control domains

Options for setting up accounts, mailing lists, and general resources are available on the Manage Domains page.

Accounts

This page includes a list of all domain accounts as well as details on their kind and status.

Using the text box above the list, you may filter the list, and the + button lets you add a new user.

When an account is clicked, a new panel with various details and settings, including the name and aliases, if any, the status (see below), and the creation date, is opened. Select a domain and a new alias in the opening dialogue box, then click + to add the alias to the user. The aliases may be simply handled by selecting the MANAGE ALIAS button.

The upper right corner of the panel has buttons that may be used to modify or delete users as well as redirect to their mailboxes.

The majority of the options available when modifying a user’s account are the same as those in the Create New Account section and are arranged in four tabs:

General

Along with additional choices, such as the ability to restrict the user from changing the password and removing the user’s password from LDAP, this page includes all the options offered during the account creation process in the Details and Create phases.

This page also displays the user’s membership in any mailing lists.

The user’s phone numbers, employer, and address are represented through this tab’s profile data. Both the user and the Administrators can control them.

Configuration

If the administrator permits these actions, the settings mentioned below allow you to designate forwarding addresses and prevent email messages from being kept locally. Values for these settings can be set using the CLI; for more details, see the section Setting Features through CLI.

Choices of the User

The settings on this page, which largely come from the COS, control how a user views or interacts with emails (receive, send, compose, add a signature).

The security of the account may be managed using the security options provided here: OTP and password and login failure rules. To enable the user to login using a QR Code, new application passwords and OTP tokens may be produced; a policy can be made to require the user to choose a safe password and the kind of characters to be used. When a user repeatedly fails to log in, the system responds in accordance with the Failed login policy.

Delegates You may specify which additional accounts or groups this account is in charge of, as well as what rights (“Rights”) are provided, under this tab. In the first setting, you can choose whether to preserve a copy of transmitted messages and where to store it—just in the delegated account’s folder or additionally in your own folder.
 
The permissions of the delegated individuals may be defined at the bottom section of the tab, which may be seen as either an Advances View or a Simplified View. The most significant difference between the two approaches, while there are minor ones, is how the permission is established.
Choose a user or group in the Simplified View, then the permission, and then click the ADD THE ACCOUNT button to add it as a delegate. The tab’s bottom will display the delegated accounts.
 
To do the same activity in the Advanced View, use the three-step approach (SELECT MODE, SET RIGHTS, and ADD). Similar to the previous guided steps in the Carbonio Admin Panel, the last step enables you to check the settings before saving them.
A list of the currently active sessions may be seen at the bottom of the panel. For instance, if a user has signed in from three separate devices and has never logged out, three sessions will be displayed. When choosing one of them, pressing the END SESSION button will end that particular session.
Make a new account
 
When you click the Add button, a dialogue box that lets you configure the new account’s fundamental settings appears.

Creating a mailing list is as easy as clicking the Add button, which launches a tabbed modal dialogue where you may customise the 

mailing list.
You may give the mailing list a name, address, and description in the first tab, and you can add members in the second by entering their email addresses in the test box.
Advanced options, such as limiting the members who are permitted to send emails to the list, the procedures for subscription and unsubscription requests, and the mailing list’s owners, may be set up under the third tab.
 
The last tab summarises the options; at this point, you may either go back to any of the earlier sections and make changes, or you can move on to creating the mailing list.
 
A mailing list may be further customised by adding aliases, which function similarly to email accounts, modifying the owners and members, and allowing certain people to send emails to the mailing list.
Replenish Account
You may restore a mailbox’s preferences and contents in exactly the same condition as when it was removed by using the Restore Account process.
 
A new account (the Destination Account) is formed when a Restore Account is initiated, and all things present in the source account at the time of deletion are restored in the destination account, together with the folder hierarchy and all user data. If Apply HSM Policy after the restoration is not checked, all recovered objects will be generated in the current main store.
Enter an email address in the text box or choose an account from the list to begin the process.
 
Next, pick the options to apply for the Restore by clicking the CONFIG tab:
  • Which time and date should the account be restored to?
  • Choosing whether to utilise the account’s most recent status
  • If necessary, restore External Data Sources
  • Choose a recipient email for the notice of the successful restore.

Leave a Reply

Your email address will not be published. Required fields are marked *