Domains: You may manage individual accounts, user quota and authentication, mailing lists, and other associated settings on the Domain page.
Domain information and domain management sections are accessible on the website.
Make a New Domain
Fill out the form that appears after clicking the CREATE button to create a new domain.
The Domain Details section contains more setup options for the domain, such as how to configure authentication and accounts in the domain.
Domain Information
It is possible to fine-tune the domain’s setup under the many subsections found in Domain Details. If a provided domain does not specify a value for the majority of the parameters (such the Time Zone), those values are inherited from the primary domain supplied.
General Preferences
Most of them exist when the domain is created and have an impact on the fundamental setup of the domain. Additional choices include the ability to choose the time zone, whether to use the HTTP or HTTPS protocol (we always recommend using the latter), and the mail server that will be used to transmit spam.
Additionally, the domain may have a default COS and its status associated.
We add a property to the domain that was established in the preceding step.
The DELETE DOMAIN button at the bottom of the page enables domain deletion. A dialogue detailing all domain-defined elements (accounts, mailing lists, resources, etc.) that will be removed along with the domain will appear when the button is pressed. There are two options: remove the domain and all of its contents or close the domain, maintaining all objects but restricting access.
The World Access List
When creating an email or adding attendees to an event in the Calendar, for example, a GAL is a special account called the “GALSync Account” that holds all of the email accounts set up on the server and allows for rapid searches of email addresses. A GAL may be external (when configured on the LDAP used by Carbonio CE) or internal (when setup on Carbonio CE), or it may be both. You may switch the GALSync account’s email address from external to internal, vice versa, or both in this page. Additionally, you may modify some of its settings and add it, if it isn’t already there.
The period chosen in the Settings section of the page determines how frequently the GALSync account is updated.
Certificates & Virtual Hosts
A different name assigned to a domain that may be used to access the same domain is called a virtual host. The name must be registered on the domain’s DNS with an A record in order to use the virtual host. Then, users don’t need to use the domain to check in; they may only use their usernames.
You may link an SSL certificate to each virtual host. With just a few simple steps, Carbonio CE allows you to upload numerous SSL domain certificates from the Carbonio Admin Panel and link them to other domains.
The virtual host must be chosen before clicking LOAD AND VERIFY CERTIFICATE. You can input the three files that make up the authorisation chain (the Domain Certificate, the Certificate CA Chain, and the Private Key) in the first field of the dialogue, or you can copy the contents of the files directly into the relevant areas. Verify the certificates by clicking VERIFY; if everything is accurate, notice will appear. It will show that the certificate is valid. The certificate must be uploaded and used by clicking the I WANT TO USE THIS CERTIFICATE button. The certificates have been stored, and another message will appear. To finish the process, you must restart the node on which the proxy is installed unless you are on a single-node;
By selecting the corresponding button above the certificates themselves, you may REMOVE or DOWNLOAD the certificates.
Mailbox Limit
With the help of these options, you may provide a maximum limit (in bytes, with 0 denoting no restriction) for the amount of space that each account and the domain as a whole may consume. Another option is to define a number that, when reached, will send an email warning to a specified address. The settings set here are inherited by all newly created accounts, however they may be changed on a per-user basis.
A list of accounts and their utilised quotas may be seen at the bottom of the page, making it easier to keep track of user usage.
Control domains
Options for setting up accounts, mailing lists, and general resources are available on the Manage Domains page.
Accounts
This page includes a list of all domain accounts as well as details on their kind and status.
Using the text box above the list, you may filter the list, and the + button lets you add a new user.
When an account is clicked, a new panel with various details and settings, including the name and aliases, if any, the status (see below), and the creation date, is opened. Select a domain and a new alias in the opening dialogue box, then click + to add the alias to the user. The aliases may be simply handled by selecting the MANAGE ALIAS button.
The upper right corner of the panel has buttons that may be used to modify or delete users as well as redirect to their mailboxes.
The majority of the options available when modifying a user’s account are the same as those in the Create New Account section and are arranged in four tabs:
General
Along with additional choices, such as the ability to restrict the user from changing the password and removing the user’s password from LDAP, this page includes all the options offered during the account creation process in the Details and Create phases.
This page also displays the user’s membership in any mailing lists.
The user’s phone numbers, employer, and address are represented through this tab’s profile data. Both the user and the Administrators can control them.
Configuration
If the administrator permits these actions, the settings mentioned below allow you to designate forwarding addresses and prevent email messages from being kept locally. Values for these settings can be set using the CLI; for more details, see the section Setting Features through CLI.
Choices of the User
The settings on this page, which largely come from the COS, control how a user views or interacts with emails (receive, send, compose, add a signature).
The security of the account may be managed using the security options provided here: OTP and password and login failure rules. To enable the user to login using a QR Code, new application passwords and OTP tokens may be produced; a policy can be made to require the user to choose a safe password and the kind of characters to be used. When a user repeatedly fails to log in, the system responds in accordance with the Failed login policy.
Creating a mailing list is as easy as clicking the Add button, which launches a tabbed modal dialogue where you may customise the
mailing list.
Replenish Account
- Which time and date should the account be restored to?
- Choosing whether to utilise the account’s most recent status
- If necessary, restore External Data Sources
- Choose a recipient email for the notice of the successful restore.