Configuring the Email Quarantine Connect FlexResponse plug-in, it need to modify the properties file with email-gateway-server-host.
What should I type in this file?
- Enforce (actually FlexResponse) calls an SMG Web API to perform a release from quarantine action. We need keys to encrypt & authenticate the connection.
- A public/private key pair is used to authenticate Enforce as a valid client to SMG.
- A key pair is generated on the Enforce machine and the certificate containing the public key is imported to SMG. This process uses the command line keytool.exe, which should be installed as part of DLP.
1. Create a keystore in the .\protect\plugins\EmailQuarantineConnect \ certstore.jks.
2. Remember the password. We will use the same password for an Enforce credential to be used by FlexResponse.
3. Generate a public/private key pair. Export the client certificate.
4. Import the client certificate via the SMG console.
- The connection is encrypted using a public key certificate exported from the SMG console.
- Export the SMG public certificate from SMG.
- Import the certificate into the keystore we just created.
- Final step: Add a credential to Enforce to allow access to the keystore.
- Enforce menu: System | Settings | Credentials.
- Name the credential “email-quarantine-certificates”.
- Access username will be the name of the certificate store: certstore.jks.
- Access password is the certificate store password.
The full process of generating a client certificate for Enforce, followed by an export of the certificate and import of that cert to SMG, is described in the below legacy PDF Email Quarantine Connect FlexResponse Implementation Guide:
Symantec™ Data Loss Prevention Email Quarantine Connect FlexResponse Implementation Guide