Thursday, June 1, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Networking

How to configure an SMTP server in a self-hosted instance Passbolt

Researcher by Researcher
January 5, 2023
in Networking
0
How to configure an SMTP server in a self-hosted instance Passbolt
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


With the self-hosted Passbolt password manager, you must configure an SMTP server to use the collaboration features. Learn how to do it.

A business working to adopt a password manager.
Image: Feodora/Adobe Stock

The Passbolt password manager is designed for teams. If you opt for a hosted plan, you get everything built-in and configured for you; however, if you go with the self-hosted version of Passbolt, you will have to configure some features to work properly.

For example, if you want to use the collaboration features, you must configure an SMTP server. Without an SMTP server configured, you won’t be able to share vault items with team members for collaboration, and the system will not be able to send user confirmation emails.

In other words, to get the most out of your self-hosted instance of Passbolt, you really should configure an SMTP server. I will show you how.

SEE: Manage logins for your team using these password managers (TechRepublic)

What need to configure the Passbolt SMTP server

You’ll need a running instance of the Passbolt self-hosted password manager, an admin account and an SMTP server. I’ll demonstrate this process using Gmail’s SMTP server because everyone has access to that service.

How to configure SMTP for Passbolt

First, log in to your self-hosted instance of Passbolt and then click the Administration tab at the top of the window (Figure A).

Figure A

The Passbolt UI makes it very easy to find what you're looking for.
The Passbolt UI makes it very easy to find what you’re looking for.

In the resulting window, click Email Server in the left navigation. You will be presented with the Passbolt Email Server configuration window (Figure B).

Figure B

The Passbolt Email Configuration window.
The Passbolt Email Configuration window.

From the Email provider drop-down, select Gmail. From the Authentication method, select Username & Password. Type your Gmail address as the username and paste an app password in the Password field.

If you’ve never created a Gmail app password, all you have to do is go to the Security section of your Google Account, click App Passwords and create a new password. Copy that new password and paste it into the Password section in the SMTP configuration window. You can configure a sender name and sender email address.

After completing the configuration, click Save Settings. Next, you should send a test email. To do that, click Send Test Email at the top of the window, type a recipient email address for the test and click Send.

If the test fails, go back to the SMTP settings and expand the Advanced section. In the SMTP host, change smtp-relay.gmail.com to smtp.gmail.com and click Save. Try to send another test, and it should succeed this time. If you receive the test email, you can close the Email Server settings window and start using all of the features of Passbolt.

Team collaboration with Passbolt

Although Passbolt is a great individual password manager solution, it was designed for more collaborative purposes. With the configuration of an email server complete, you’ll be able to enjoy the power of groups and vault item sharing.

Another great security resource is the Password Management Policy from TechRepublic Premium.

Subscribe to TechRepublic’s How To Make Tech Work on YouTube for all the latest tech advice for business pros from Jack Wallen.



Source link

Related articles

How to join a node to a Docker Swarm

How to join a node to a Docker Swarm

May 27, 2023
What Is IBM Hybrid Cloud Mesh?

Gartner releases 4 trends that will impact enterprises in 2023

May 27, 2023
Tags: configureinstancePassboltselfhostedServerSMTP
Share76Tweet47

Related Posts

How to join a node to a Docker Swarm

How to join a node to a Docker Swarm

May 27, 2023
0

Jack Wallen shows you the steps of joining new nodes to a Docker Swarm as a worker and manager to...

What Is IBM Hybrid Cloud Mesh?

Gartner releases 4 trends that will impact enterprises in 2023

May 27, 2023
0

Image: metamorworks/Adobe Stock Enterprise infrastructure and operations teams will have to cope with economic and geopolitical pressures as they pivot...

Addigy exposes RSR update gap in 25% of managed macOS devices

Addigy exposes RSR update gap in 25% of managed macOS devices

May 25, 2023
0

Addigy released a report that Apple RSR updates are not being deployed in about 25% of macOS devices within managed...

Dell Reveals New Edge as-a-Service Portfolio, NativeEdge

Dell Reveals New Edge as-a-Service Portfolio, NativeEdge

May 24, 2023
0

Dell also zeroed in on zero trust and introduced a modular deployment service as part of its new edge offerings....

Dell’s Project Helix Is a Wide-Reaching Generative AI Service

Dell’s Project Helix Is a Wide-Reaching Generative AI Service

May 24, 2023
0

Dell and NVIDIA joined forces to put generative AI into the hands of Dell's software-as-a-service customers. Image: Yingyaipumi/Adobe Stock Project...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup /

June 1, 2023

Recent Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved