添加链接
link之家
链接快照平台
  • 输入网页链接,自动生成快照
  • 标签化管理网页链接

The following topics describes the information related to configuration of SEG V2.

To implement the SEG (V2) for your email architecture, first configure the settings on the UEM console. After you configure the settings, you can download the SEG installer from the Workspace ONE resource portal.

  • In the UEM console, navigate to Email > Settings and select Configure . The ADD wizard displays.
  • In the Platform tab of the wizard:
  • Select Proxy as the Deployment Model .
  • Select the Email Type (Exchange, IBM Notes, or Google).
  • If you selected Exchange as the email type, then select the appropriate exchange version from the drop-down menu. Click Next . Example of email servers is Exchange, IBM Notes, or Google.
  • Configure the basic settings in the Deployment tab of the wizard and then select Next . Friendly Name Enter a friendly name for the SEG deployment. This name gets displayed on the MEM dashboard. External URL and Port Enter the URL and port number for the incoming mail traffic to SEG. Listener Port The SEG listens for device the communication through this port. The default port number is 443. If SSL is activated for SEG, the SSL certificate is bound to this port. Terminate SSL on SEG Activate this option if you want the SSL certificate to be sent from the SEG instead of offloading on a web application firewall. Upload a .pfx or .p12 certificate file including the root and intermediate certificates. Upload Locally Select to upload the SSL certificate locally during installation. SEG Server SSL Certificate Select Upload to add the certificate that binds to the listening port. The SSL certificate can be automatically installed instead of providing it locally. An SSL certificate in the .pfx format with a full certificate chain and private key included must be uploaded. See, the Upload the SSL Certificate after Renewal section in the Install the Secure Email Gateway (V2) topic to understand the methods to upload the SSL certificate after renewal. Email Server URL and Port Enter the email server URL and port number in the form https://email server url:email server port. The SEG uses the following URL for proxying email requests to the email server. If using Exchange Online, enter the https://outlook.office365.com URL. Ignore SSL Errors between SEG and email server Select Enable to ignore the Secure Socket Layer (SSL) certificate errors between the email server and the SEG server. Ignore SSL Errors between SEG and AirWatch server Select Enable to ignore Secure Socket Layer (SSL) certificate errors between the Workspace ONE UEM server and the SEG server.

    Establish a strong SSL trust between the Workspace ONE UEM and the SEG server using valid certificates.

    Allow email flow if no policies are present on SEG Select Enable to allow the email traffic if SEG is unable to load the device policies from the Workspace ONE UEM API. By default, the SEG blocks all email requests if no policies are locally present on the SEG. Note: A list of all the device records with the corresponding compliance status is provided. SEG does not calculate the compliance of a given device by itself, instead uses the data received from the Workspace ONE UEM console. Enable Clustering Select Enable to activate clustering of multiple SEG servers.

    When clustering is activated, policy updates are distributed to all SEGs in the cluster. The SEGs communicate with each other through the SEG clustering port.

    SEG Cluster Hosts Add the IPs or hostnames of each server in the SEG cluster. SEG Cluster Distributed Cache Port Enter the port number for SEG to communicate to the distributed cache. SEG Clustering Port Enter the port number for SEG to communicate to the other SEGs in the cluster. Activate clustering to have multiple SEG servers operating as a cluster.
  • Select Next in the Profile tab of the wizard. If necessary, assign an email profile to the MEM configuration. Select Next in the Profile tab of the wizard.
  • On the Summary tab, review the configuration that you have just created. Select Finish to save the settings.
  • Download the SEG installer from the Workspace ONE resource portal.
  • Configure any additional settings for your SEG using the Advanced option. Use Default Settings The Use Default Settings check box is activated by default. To modify the advanced settings, you must uncheck this box. Enable Real-time Compliance Sync Activate this option to send the compliance information to the SEG in real-time. Without this, individual changes to the device policies are refreshed per the delta sync interval. Required transactions The Required transactions cannot be deactivated. Optional transactions Activate or deactivate the optional transactions such as Get attachment, Search, Move Items, and so on. The following are the Exchange Active Sync (EAS) transactions that the SEG reports to the console and are displayed on the Email List View in the Last Command column. Diagnostic Set the number and frequency of transactions for a device when the test mode is activated. Sizing Set the frequency of SEG and API server interaction. Skip Attachment & Hyperlink transformations for S/MIME signed emails Activate to exempt the encryption of attachments and transformation of hyperlinks through SEG for emails that are signed with S/MIME certificates. Enable S/MIME repository lookup Activate automatic lookup of the S/MIME certificate managed in a hosted LDAP directory. Enter the following values to configure the lookup.
  • LDAP URL - Specify the URL of the LDAP server hosting the S/MIME certificates. For example, LDAP://certs.soandso.local/o=dept,c=company .
  • Authentication Type - Specify the authentication type used by the LDAP server. Anonymous and Basic authentication are supported. If Basic authentication is selected, you must enter the username and password.
  • Certificate Attribute - The public key attribute used on the LDAP server to specify the S/MIME certificate. For example, userCertificate;binary .
  • You must restart SEG service after enabling this feature.

    Custom Gateway Settings The SEG custom gateway settings are available as a key-value pair on the Workspace ONE UEM console. The commonly used properties are seeded on the Workspace ONE UEM console. For more information on the SEG supported key value pairs. Block Attachments Used to control the default action when SEG is unable to communicate with the Workspace ONE UEM or when the local policy set is empty. Default Message for Blocked Attachments Configure the message that is displayed to end users when SEG blocks attachments.

    Configuring for High Availability and Disaster Recovery

    SEG can be configured in high availability and disaster recovery environments with both clustering and non-clustering server configurations. The high availability and disaster recovery setups are independent of the cluster configuration.

    Use a load balancer to achieve the desired high availability and disaster recovery configuration. The same public host name must be used for the SEG servers across the data centers to ensure that the users need not reauthenticate when a SEG server failover occurs.

    The following are the benefits of using SEG in a clustering and non-clustering server environments:

  • Non-clustered server configuration:
  • Each SEG is updated independently.
  • Failover can be performed at the load balancer.
  • Clustered server configuration:

  • Each data center must have its own MEM configuration and an external URL to update the MEM configuration's cluster. Note: The external URL need not match the URL used by devices to access email, instead the UEM console uses the external URL to send policy updates to the appropriate cluster configuration.
  • Internal IP addresses or hostnames are applicable for clustering rather than public IP addresses only.
  • Device EAS profiles must use a third URL that can be failed-over between data centers.
  • SEG Custom Gateway Settings

    The SEG v2 configurations are controlled at an individual node level. The custom gateway setting feature centralizes the configuration on the Workspace ONE UEM Console as part of the MEM configuration itself.

    Prerequisites

    The following table lists the requirements for the SEG custom settings feature:

    Configure SEG Custom Gateway Settings

    The SEG custom settings are available as key-value pairs on the Workspace ONE UEM console. The commonly used properties are seeded on the Workspace ONE UEM Console. To configure the custom settings, perform the following steps:

  • Log in to the Workspace ONE UEM console.
  • Navigate to the Email > Email Settings .
  • Configure the Email Settings for SEG.
  • Configure the additional settings for SEG using the Advanced option.
  • Navigate to the Custom Gateway Settings , click ADD ROW , and enter the supported configuration as the key-value pair:
  • Key : Enter the property or setting name.
  • Type : Enter the type of value such as string, integer, and so on.
  • Value : Enter the property or custom value.
  • Click Save .
  • Apply the Custom Gateway Settings on the SEG Service

    During an installation or upgrade, if the custom settings are provided on the Workspace ONE UEM console, then the SEG service starts with the applied custom settings

    If the custom settings are added or updated on the Workspace ONE UEM console when the SEG service is running, then a refreshSettings notification is triggered for SEG. The SEG fetches the latest custom gateway settings. A few of the custom settings are applied immediately, whereas the other custom settings might require you to restart the SEG service.

    Supported Configuration for the Custom Gateway Settings

    The following section lists all the supported SEG properties or settings for the custom settings feature.

    Note:

    The properties or settings are grouped based on feature or functionality. The custom settings can be added on the Workspace ONE UEM console in any order.

    JVM Arguments or System Settings

    The JVM arguments or system settings property keys start with -D . If the property value is modified, SEG updates the custom system settings in the segServiceWrapper.conf (for Windows) or seg-jvm-args.conf (for UAG). If the system setting is updated when the SEG service is running, then the SEG triggers a service restart.

    You can configure the seg.custom.settings.service.restart.code=0 property in the application-override.properties file to deactivate the automatic restart of the SEG service.

    -Djdk.tls.disabledAlgorithms

    Comma-separated list of TLS algorithms, ciphers, and versions to be deactivated.

    String

    MD5, RC4, TLSv1, TLSv1.1, SSLv2Hello, SSLv3, DSA, DESede, DES, 3DES, DES40_CBC, RC4_40, MD5withRSA, DH, 3DES_EDE_CBC, DHE, DH keySize < 1024, EC keySize < 224, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384

    If the modified value is detected, restart automatically.

    -Djdk.tls.ephemeralDHKeySize

    Customize the strength of the ephemeral DH key size used internally during the TLS or DTLS handshake. The system property does not impact the DH key sizes in the ServerKeyExchange messages for exportable cipher suites.

    The following DH key sizes are impacted, the DHE_RSA, DHE_DSS, and DH_anon-based cipher suites in the JSSE Oracle provider. For more information, see Customizing Size of Ephemeral Diffie-Hellman Keys.

    Integer

    If the modified value is detected, restart automatically.

    -Dsyslog.enabled

    Flag to activate the syslog configuration for SEG.

    Boolean

    TRUE - For the UAG deployment

    FALSE - For the Windows deployment

    If the modified value is detected, restart automatically.

    -Dsyslog.host

    Host address of the syslog server.

    The host address value can be configured with any remote syslog server hostname or IP address that listens over UDP.

    If syslog to the remote server is configured with the TCP or TLS, then point to a local host syslog listener that can retransmit using the required protocol over the wire.

    The in-built UAG syslog configuration can function as the local retransmitter.

    String

    localhost

    If the modified value is detected, restart automatically.

    -Dkerberos.process.recycle.time

    Specify the Kerberos process recycle time, when activated.

    Process recycling can be activated using the property -Denable.kerberos.process.recycle .

    Time in the hh24:mm:ss format

    23:59:59

    If the modified value is detected, restart automatically.

    Maximum java heap memory for the service in Mebibytes (MiB).

    For example, 8 GiB of RAM can be configured as 8192.

    If the system property is not configured, dynamically identified during the SEG service installation based on the system configuration.

    If the modified value is detected, restart automatically.

    -Dsyslog.facility

    Syslog facility as defined by the Syslog server.

    String

    If the modified value is detected, restart automatically.

    -Dsyslog.port

    Syslog listener port that the SEG points to.

    Integer

    If the modified value is detected, restart automatically.

    -Denable.kerberos.process.recycle

    SEG can be configured to recycle the native Kerberos client processes when the Kerberos based authentication is activated.

    Boolean

    FALSE

    If the modified value is detected, restart automatically.

    enable.boxer.ens.ews.proxy

    Flag to activate SEG to listen for the EWS traffic and proxy the same to the configured Exchange EWS endpoint.

    By default, SEG proxies the EWS requests to the email server host configured as part of the MEM configuration. However, a different host can be configured using the ews.email.server.host.and.port property.

    Boolean

    FALSE

    Restart the SEG service.

    ews.email.server.host.and.port

    If the email server hostname for the EWS is different than the EAS, then use this property to configure the EWS email server hostname.

    When the host name for the EWS connection is used from the ews.email.server.host.and.port property, all the other HTTP connection parameters remain the same, similar to the EAS parameters.

    If the host is using a self-signed certificate, corresponding trusted certificate must be added to SEG separately.

    EWS proxy can be activated using flag enable.boxer.ens.ews.proxy .

    No user action required.

    No user action required.

    http.response.status.code.for.connection.terminated.with.ews

    HTTP response code for the EWS request when a connection error occurs between the SEG and the Exchange.

    Integer

    No user action required.

    proxy.email.request.on.kerberos.error

    Flag to activate the proxy request to the email server, in case, an error occurs when generating the KCD token.

    Boolean

    No user action required.

    response.status.code.on.kerberos.error.for.non.ping

    HTTP response code for commands, other than PING and OPTIONS, when the Kerberos token generation results fail.

    Integer

    No user action required.

    response.status.code.on.kerberos.error.for.ping

    If the proxy.email.request.on.kerberos.error property is set to false, then the response.status.code.on.kerberos.error.for.ping is the HTTP status code returned during a Kerberos error for the PING command request.

    Integer

    No user action required.

    response.status.code.on.kerberos.error.for.options.method

    HTTP response code for the OPTIONS command when the Kerberos token generation results fail.

    Integer

    No user action required.

    response.status.code.on.certificate.validation.fail

    HTTP response code when the certificate authentication is activated and if SEG the client certificate validation fails.

    If the flag force.client.cert.for.ssl.handshake is activated, the request with the missing or invalid certificate might be rejected during the SSL handshake.

    Integer

    No user action required.

    enable.upn.lookup.from.subject.cn

    Flag to activate the UPN (used for Kerberos authentication) lookup from Subject , and Common Name when the UPN is not present in the SAN type extension of the client certificate.

    Boolean

    FALSE

    No user action required.

    generate.krb5.config.at.service.restart

    Flag to generate the KRB configuration file (krb5.ini in Windows or krb5.conf in UAG) when restarting the SEG service.

    Boolean

    Restart the SEG service.

    kerberos.service.max.processes.size

    Number of KCD client processes that SEG spawns.

    Integer

    Restart the SEG service.

    kerberos.thread.pool.size.per.service

    Number of threads used per KCD client process.

    Integer

    Restart the SEG service.

    kerberos.service.health.check.frequency.in.seconds

    Frequency of polling by SEG for each KCD client process.

    Integer

    Restart the SEG service.

    kerberos.enable.performance.metrics.logging

    Flag to activate time statistics for the Kerberos token handling.

    Boolean

    Restart the SEG service.

    kerberos.process.kill.max.wait.time.in.seconds

    The maximum wait time for a process to shut down, when you attempt to stop the native process.

    Integer

    Restart the SEG service.

    kerberos.process.max.time.to.recover.in.seconds

    Maximum time in seconds permitted for a process to be in any status (NOT_STARTED, STARTING, FAILED_TO_START, or BUSY) other than AVAILABLE. To recover processes in an unexpected situation and ensure a safer run.

    Integer

    Restart the SEG service.

    kerberos.backpressure.queue.max.size

    Maximum size of the backpressure queue to obtain the Kerberos token. If the backpressure queue is full, further requests are ignored.

    Integer

    Restart the SEG service.

    kerberos.backpressure.queue.max.wait.in.seconds

    Duration in seconds for which a request waits in a backpressure queue for the Kerberos token generation before being stopped.

    Integer

    Restart the SEG service.

    enable.cert.revocation.validation

    Flag to activate the certificate revocation check using the CRL. The flag is used only when the CBA is activated.

    Boolean

    FALSE

    Restart the SEG service.

    fail.hard.on.crl.download.failure.during.server.startup

    Flag to prevent SEG from starting if SEG is unable to fetch the CRLs at start.

    The option is applicable only when any CRL distribution URL is configured using the remote.crl.distribution.http.uris key.

    Boolean

    Restart the SEG service.

    remote.crl.fetch.interval.in.minutes

    Interval in minutes for a periodic timer that attempts to update SEG with the latest CRL data.

    Long (the value type is integer)

    1440 (24 hours)

    Restart the SEG service.

    remote.crl.distribution.http.uris

    List of HTTP URLs of CRL Distribution Points (CDP). Use the value when SEG is configured to accept the client certificates, either by enabling the Require Client Certificate flag or the Kerberos based authentication.

    Applicable only if enable.cert.revocation.validation value is set to true.

    String

    No user action required.

    kerberos.linux.named.pipe.connect.delay.millis

    Delay in milliseconds before the SEG Java process attempts to listen to the named pipes that are started by the Kerberos client native processes. This delay is to ensure smooth recovery of crashed Kerberos client processes. This property is applicable only for SEG on UAG.

    Since: UAG 21.03

    Restart the SEG service.

    cert.mapping.ldap.enabled

    The flag indicates if the certificate-mapping feature is activated for SEG.

    If the KCD authentication is deactivated in the email configuration, ignore the setting and consider as false.

    Boolean

    FALSE

    Restart the SEG service.

    cert.mapping.ldap.host

    The remote LDAP host information in a proper URL format.

    String

    Restart the SEG service.

    cert.mapping.ldap.authType

    The authentication type used with the LDAP server for the certificate-mapping feature.

    Integer

    0 (simple authentication)

    Restart the SEG service.

    cert.mapping.ldap.user

    The LDAP user for authenticating the LDAP query.

    SEG uses the same service account credentials configured as part of the Kerberos authentication settings.

    However for the LDAP query, the user name must be provided in the Distinguished Name (DN) format.

    String

    Restart the SEG service.

    cert.mapping.ldap.attrs

    List of LDAP lookup attributes used for certificate-mapping feature.

    String

    Restart the SEG service.

    cert.mapping.ldap.server.base

    Distinguished name of the base domain configured for running the LDAP query. The query fetches the matching results from the domain.

    By default, the query refers to the rootDSE of the LDAP setup. The field can be empty for the userCertificate and userPrincipalName attributes indexed and replicated to the global catalog.

    String

    Restart the SEG service.

    cert.mapping.ignore.ldap.ssl.errors

    Flag to ignore any SSL errors when contacting LDAP server for the certificate-mapping lookup.

    Boolean

    FALSE

    Restart the SEG service.

    cert.mapping.max.query.executor.pools

    Maximum number of LDAP services created to allow the maximum concurrent LDAP queries.

    Integer

    Restart the SEG service.

    cert.mapping.ldap.connect.timeout.millis

    LDAP connect timeout in milliseconds for certificate-mapping.

    Integer

    Restart the SEG service.

    cert.mapping.ldap.read.timeout.millis

    LDAP read timeout in milliseconds for certificate-mapping.

    Integer

    Restart the SEG service.

    cert.mapping.ldap.service.pool.size

    LDAP (executor) service thread pool size.

    Integer

    Restart the SEG service.

    cert.mapping.backpressure.queue.size

    Maximum size of requests that are allowed in back pressure queue, waiting for the LDAP service for certificate-mapping lookup.

    Integer

    Restart the SEG service.

    cert.mapping.backpressure.max.ttl.in.seconds

    Maximum time a request can stay in back pressure queue waiting for the LDAP service to be available.

    Integer

    Restart the SEG service.

    cert.mapping.wait.delay.for.concurrent.query.millis

    Fixed delay waiting for a request when another request for the same UPN is in progress for getting certificate mapping.

    Integer

    No user action required.

    bulk.update.completion.threshold.in.seconds

    The timeout value in seconds to complete bulk policy update flow. If the bulk policy update does not complete within this duration, the bulk policy update is marked as failure.

    Since: SEG 2.20.0, UAG 21.06

    Integer

    No user action required.

    policy.data.not.ready.response.code

    HTTP response code to be returned to the device if SEG is yet to receive all the policy data just after start, and the configuration prohibits email communication until policy data is ready.

    Integer

    No user action required.

    ignore.duplicate.records.during.policy.update

    Flag to ignore duplicate records returned from an API, and compare the size of a policy in the SEG cache with the size for only Unique IDs.

    Boolean

    No user action required.

    policy.update.eventbus.timeout.buffer.millis

    Event bus timeout used during a policy update.

    30000

    No user action required.

    disable.api.policy.count.match.during.policy.update

    Maximum time in seconds that SEG waits for the cache to be asynchronously updated with the new policy records during a bulk policy update.

    Boolean

    FALSE

    No user action required.

    policy.async.cache.update.completion.threshold.seconds

    Maximum time in seconds that SEG waits for the cache to be asynchronously updated with new policy records during a bulk policy update.

    Integer

    Restart the SEG service.

    cache.index.validation.eventbus.timeout.millis

    Timeout duration in milliseconds for validating the cache index on all the nodes after a bulk policy update.

    If failed, SEG retries before finally reverting the changes.

    Integer

    30000

    No user action required.

    cache.index.swap.wait.time.in.millis

    Wait delay in milliseconds before swapping active and passive cache indexes after the latest policy from API is updated on the passive cache.

    60000

    No user action required.

    cache.index.validation.max.retry.count

    Number of retry attempts to validate that the cache indexes are updated in all the nodes, when clustering is activated.

    Integer

    No user action required.

    wait.time.in.millis.before.passive.cache.cleanup.start

    In case the policy update fails and the SEG is running in a clustered mode, the cache indexes in all the nodes must be updated to be in sync. The wait.time.in.millis.before.passive.cache.cleanup.start , is the time in milliseconds for which the SEG waits before cleaning the passive cache, so that all the nodes have sufficient time to swap the passive and active indexes, if necessary.

    30000

    No user action required.

    cache.async.update.status.check.timer.interval.millis

    Interval in milliseconds for a periodic timer that validates async policy data update in cache.

    10000

    No user action required.

    full.bulk.update.interval.in.minutes (only when the delta is activated)

    Integer

    1440 (24 hours)

    Restart the SEG service.

    validate.resource.uri.in.jwt.auth

    Interval in minutes for a periodic full bulk policy update, when the delta sync is activated.

    Boolean

    No user action required.

    jwt.allowed-clock-skew-in-seconds

    Flag to activate validation of resource URL in the JWT token.

    Integer

    No user action required.

    tcpip.discovery.timeout-seconds

    Maximum allowed skew in JWT timestamp for the token to be successfully authenticated.

    Integer

    Restart the SEG service.

    hazelcast.operation.call.timeout.millis

    Timeout for Hazel cast cache read or write operation.

    60000

    disable.transformation.on.inline.unknown.attachment.bytes

    Flag to deactivate the attachment transformation if the MIME type cannot be identified.

    Boolean

    No user action required.

    disable.transformation.on.inline.unknown.attachment.tag

    Flag to ignore the transformation on the inline attachment tags that do not have a file extension or MIME type to be processed correctly.

    Boolean

    No user action required.

    enable.request.transformation.by.default

    Flag to activate the content transformation on the request flow.

    If any of the transformation types are activated and the value is FALSE, the request transformation occurs. When the value is TRUE, request transformation always occurs.

    Activate the flag when the content the transformation is activated and the attachments are encrypted or hyperlinks are transformed. The content transformation is deactivated, but the outgoing emails are decrypted attachments and original hyperlinks.

    Boolean

    FALSE

    No user action required.

    email.server.request.timeout.millis

    HTTP request timeout from SEG to the email server in milliseconds for the email traffic.

    Since: SEG 2.20.0, UAG 21.06

    Integer 1200000

    No user action required.

    keep.http.client.connection.alive

    Flag to keep a socket connection to the email server and the API server alive to reuse the same connection for any subsequent request.

    Since: SEG 2.20.0, UAG 21.06

    Boolean

    No user action required.

    keep.email.server.client.connection.alive

    Flag to keep a socket connection to the email server alive, to reuse the same connection for any subsequent request. Note: This key is supported until SEG version 2.19.0 and UAG version 21.03.1. For SEG version 2.20.0 and UAG version 21.06, use key keep.http.client.connection.alive . Boolean

    No user action required.

    api.server.connect.timeout.millis

    HTTP connection timeout from SEG to the API server in milliseconds.

    Integer

    15000

    No user action required.

    email.server.connect.timeout.millis

    HTTP connection timeout from SEG to the email server in milliseconds.

    15000

    No user action required.

    force.client.cert.for.ssl.handshake

    In the MEM configuration, when the Require Client Certificate is activated in the Advanced Settings option, setting the flag to TRUE forces the SSL handshake to fail. Due to the absence of a client certificate and the request not reaching the application layer, the SSL handshake fails. If the flag is set to FALSE, the request reaches the application layer before failing due to the lack of the client certificate.

    Boolean

    FALSE

    No user action required.

    http.client.max.idle.timeout.seconds

    Maximum idle timeout in seconds after which any connection is closed to release the system resources.

    Integer

    No user action required.

    http.response.status.code.for.non.ping.on.connection.closed.failure

    HTTP response code for the requests other than the PING command when the connection between the SEG and the email server closes unexpectedly.

    You can use this option only if the flag return.http.response.status.for.non.ping.on.connection.closed.failure is activated.

    Integer

    No user action required.

    http.response.status.code.for.ping.on.connection.closed.failure

    HTTP response code for the PING command requests when the connection between the SEG and email server closes unexpectedly.

    Integer

    No user action required.

    http.server.max.idle.timeout.seconds

    Idle time in seconds after which an inbound connection to the SEG server is closed.

    Integer

    No user action required.

    max.http.buffer.chunk.size

    Maximum HTTP chunk size.

    Integer

    8192 (that is, 8 KB)

    No user action required.

    max.initial.line.length

    Maximum length of the initial line of the HTTP requests ending or originating at SEG.

    Integer

    4096 (that is, 4 KB)

    No user action required.

    return.http.response.status.for.non.ping.on.connection.closed.failure

    Flag to decide if the SEG responds to the device in case a connection error occurs between SEG and the email server when serving a non-PING command.

    When activated, the http.response.status.code.for.non.ping.on.connection.closed.failure property determines the response code.

    Few email clients might show some error when the connection to SEG is abruptly closed.

    Integer

    No user action required.

    smime.lookup.ldap.connect.timeout.millis

    LDAP connection timeout in milliseconds for the SMIME certificate lookup.

    Integer

    No user action required.

    smime.lookup.ldap.read.timeout.millis

    LDAP read timeout in milliseconds for the SMIME certificate lookup.

    Integer

    No user action required.

    smime.lookup.ldap.server.base

    Base path of the LDAP server that the SEG uses for the SMIME lookup.

    String

    No user action required.

    smime.lookup.ignore.ldap.ssl.errors

    Flag to ignore any SSL errors when contacting the LDAP server for the SMIME lookup.

    Boolean

    FALSE

    No user action required.

    resp-header.Strict-Transport-Security

    The STS header with the preconfigured default value is overridden and a new SEG value is used.

    String

    Max-age=31536000;includeSubDomains

    No user action required.

    resp-header.X-Custom-Header

    New header with a specified value is included for subsequent responses.

    String

    No user action required.

    kerb-conf.log_level

    System log level for the kcdclient pipe processes that the SEG spawns.

    0 - Off

    1 - Error

    2 - Warning

    3 - Info

    4 - Debug

    Integer

    No user action required.

    kerb-conf.log_file_append

    Flag to indicate if a process restart must append logs or discard old logs and truncate a file.

    0 - Do not append

    1 - Append

    Integer

    No user action required.

    kerb-conf.log_file_backup_count

    Maximum number of backup log files to be created when the maximum file size is reached.

    Integer

    No user action required.

    kerb-conf.log_file_size

    Maximum file size of a Kerberos process log file in MB.

    Integer

    No user action required.

    kerb-conf.refresh_config_interval

    Time taken in seconds to refresh the settings and to load any updated configuration from a file.

    Integer

    No user action required.

    krb5-conf.<property_name>

    The properties are updated in the krb5-base.conf file.

    No user action required.

    custom.response.text.for.root.and.health.api

    Custom text to be sent as a response when the root path of the SEG V2 is accessed.

    If hide.seg.info.on.health.monitor.response is set to true , the text is also used in the response body of the health monitoring endpoints (/health and /lb-health).

    Since: SEG 2.20.0, UAG 21.06

    String

    No user action required.

    log.device.delta.sync.payload.in.debug.mode

    Flag to activate the delta sync payload.

    Boolean

    FALSE

    No user action required.

    api.server.connectivity.diagnostic.timeout.millis

    When SEG verifies the connectivity to the API server to capture the diagnostic information, specify the HTTP connection timeout in milliseconds.

    Integer

    No user action required.

    email.server.connectivity.diagnostic.timeout.millis

    When SEG verifies the connectivity to the Email server to capture diagnostic information, specify the HTTP connection timeout in milliseconds.

    Integer

    No user action required.

    high.cpu.monitoring.enabled

    Flag to activate the CPU usage monitoring and to generate thread dumps beyond a threshold limit. Configure the threshold limit using the cpu.monitor.trigger.threshold.percentage property.

    Boolean

    FALSE

    No user action required.

    log.http.server.network.activity

    Flag to activate the SEG HTTP server network activity.

    Boolean

    FALSE

    No user action required.

    enable.seg.metrics.collection

    Flag to activate the SEG metrics collection. When the flag is activated with the UEIP flag on the Workspace ONE UEM console, SEG reports the diagnostic information to the VMware Analytics Cloud (VAC).

    Boolean

    No user action required.

    log.active.sync.payload.in.debug.mode Flag to activate logging active synchronization payload in active-sync-payload-reporting.log

    Since: SEG 2.18.0, UAG 20.12

    . String

    FALSE

    No user action required.

    hide.seg.info.on.health.monitor.response

    Flag to deactivate the SEG version and build information in the health monitoring endpoints (/health and /lb-health).

    Since: SEG 2.19.0, UAG 21.03

    Boolean False

    No user action required.

    logger.app

    The SEG application logs are applicable for the app.log and the ews-proxy.log files.

    Since: SEG 2.18.0, UAG 20.12

    String Error

    No user action required.

    logger.transactional

    The transaction summary logs are applicable for the http-transaction.log, kerberos-transaction.log and the ews-transaction.log transaction log files. The default log level is Debug and you need not change unless you want to deactivate the transactional logging.

    Since: SEG 2.18.0, UAG 20.12

    String Debug

    No user action required.

    logger.policy.cache

    The policy update and SEG cache logs are applicable for the policy-update.log and cache.log files.

    Since: SEG 2.18.0, UAG 20.12

    String

    No user action required.

    logger.kerberos.service.manager

    The Kerberos service manager log is applicable for the kerberos-service-manager.log file.

    Since: SEG 2.18.0, UAG 20.12

    String Error

    No user action required.

    logger.cert.auth

    The certificate-based authentication log is applicable for the cert-auth.log file.

    Since: SEG 2.18.0, UAG 20.12

    String Error

    No user action required.

    logger.compliance

    Transaction for blocked devices due to non-compliance. This is applicable for the non-compliant-devices.log log file.

    Since: SEG 2.18.0, UAG 20.12

    String Error

    No user action required.

    logger.content.transformation

    Email content transformation such as hyperlink and attachment transform. This is applicable for the content-transform.log file.

    Since: SEG 2.18.0, UAG 20.12

    String Error

    No user action required.

    SEG Targeted Content Logging

    SEG targeted content logging is activated to troubleshoot content transformation related issues. When you activate content logging, SEG starts writing email content (before and after transformation) in the <SEG_Install_Dir>/tmp/content-logs folder.

    Note: Activate content logging only for troubleshooting and remove the property keys from custom settings after troubleshooting. You must consent the customer before you activate content logging.

    content.logging.target.all

    Activate content logging for all users and devices.

    Since: SEG 2.18.0, UAG 20.12

    Boolean False

    No user action required.

    content.logging.target.users

    Activate content logging for targeted users.

    Comma separated list. For example, user1, user2, and so on.

    Since: SEG 2.18.0, UAG 20.12

    String

    No user action required.

    content.logging.target.easdeviceids

    Activate content logging for targeted EAS device IDs.

    Comma separated list. For example device1, device2. and so on.

    Since: SEG 2.18.0, UAG 20.12

    String

    No user action required.

    Supported Configuration for the Custom Gateway Settings from SEG 2.18.0 Version

    The following section lists all the supported SEG properties or settings for the custom gateway feature that are introduced in the SEG 2.18.0 version.

    Note: In SEG 2.18.0 version, few SEG properties are enhanced to provide a better user experience.

    SEG Troubleshooting

    The functionality of the following SEG properties is improved in the SEG 2.18.0 version. For SEG versions before 2.18.0, activating these properties required the user to manually update the log level for the respective logger in the logback.xml file. In SEG 2.18 version, the log level for the respective logger in the logback.xml file is automatically updated.

    log.active.sync.payload.in.debug.mode

    Flag to activate logging device payload for activesync reporting. Payload is written in the active-sync-payload-reporting.log file.

    Since: SEG 2.18.0, UAG 20.12

    String False

    No user action required.

    log.http.server.network.activity Flag to activate the SEG HTTP server network activity.

    Since: SEG 2.18.0, UAG 20.12

    String False Restart SEG service

    logger.app

    The SEG application logs are applicable for the app.log and the ews-proxy.log files.

    Since: SEG 2.18.0, UAG 20.12

    String Error

    No user action required.

    logger.transactional

    The transaction summary logs are applicable for the http-transaction.log, kerberos-transaction.log and the ews-transaction.log transaction log files. The default log level is Debug and you need not change unless you want to deactivate the transactional logging.

    Since: SEG 2.18.0, UAG 20.12

    String Debug

    No user action required.

    logger.policy.cache

    The policy update and SEG cache logs are applicable for the policy-update.log and cache.log files.

    Since: SEG 2.18.0, UAG 20.12

    String

    No user action required.

    logger.kerberos.service.manager

    The Kerberos service manager log is applicable for the kerberos-service-manager.log file.

    Since: SEG 2.18.0, UAG 20.12

    String Error

    No user action required.

    logger.cert.auth

    The certificate-based authentication log is applicable for the cert-auth.log file.

    Since: SEG 2.18.0, UAG 20.12

    String Error

    No user action required.

    logger.compliance

    Transaction for blocked devices due to non-compliance. This is applicable for the non-compliant-devices.log log file.

    Since: SEG 2.18.0, UAG 20.12

    String Error

    No user action required.

    logger.content.transformation

    Email content transformation such as hyperlink and attachment transform. This is applicable for the content-transform.log file.

    Since: SEG 2.18.0, UAG 20.12

    String Error

    No user action required.

    SEG Content Logging

    SEG content logging is activated to troubleshoot content transformation related issues. When you activate content logging, SEG starts writing email content (before and after transformation) in the SEG install directory, following the path pattern {}.

    Note: Activate content logging only for troubleshooting and remove the property keys from custom settings after troubleshooting. You must consent the customer before you activate content logging.

    content.logging.target.all

    Activate content logging for all users and devices.

    Since: SEG 2.18.0, UAG 20.12

    Boolean False

    No user action required.

    content.logging.target.users

    Activate content logging for targeted users.

    Comma separated list. For example, user1, user2, and so on.

    Since: SEG 2.18.0, UAG 20.12

    String

    No user action required.

    content.logging.target.easdeviceids

    Activate content logging for targeted EAS device IDs.

    Comma separated list. For example, device1, device2. and so on.

    Since: SEG 2.18.0, UAG 20.12

    String

    No user action required.

    Supported Configuration for the Custom Gateway Settings from SEG 2.23.0 Version

    The following section lists all the supported SEG properties or settings for the custom gateway feature that are introduced in the SEG 2.23.0 version.

    HTTP Request or Response

    http.compression.support

    Activate or deactivate HTTP compression for SEG server. This flag is set to indicate if the server must support gzip or deflate compression (serving compressed responses to clients advertising support for them with Accept-Encoding header)

    Since: SEG 2.23.0, UAG 22.07

    Boolean

    Restart SEG service

    console.api.server.connection.pool.size

    Default configuration is retrieved from the SEG gateway settings in the ConsoleAPIConfig .

    Since: SEG 2.23.0, UAG 22.07

    Integer

    No user action required.

    console.api.server.timeout.in.millis

    Default configuration is retrieved from the SEG gateway settings in the ConsoleAPIConfig .

    Since: SEG 2.23.0, UAG 22.07

    Integer

    40000

    No user action required.

    seg.config.retry.interval.in.minutes

    Default configuration is retrieved from the SEG gateway settings in the PolicyUpdateConfig .

    Since: SEG 2.23.0, UAG 22.07

    Integer

    No user action required.

    policy.update.error.retry.count

    Default configuration is retrieved from the SEG gateway settings in the PolicyUpdateConfig .

    Since: SEG 2.23.0, UAG 22.07

    Integer

    No user action required.