Configuring End-To-End Encryption in Xeams


End-to-end encryption ensures no one but the intended recipient can view sensitive emails. Watch a short video below demonstrating how to configure this feature in Xeams.

Types of Encryption

Xeams offers two methods for end-to-end encryption:

  1. PDF - Converting an outbound email to a password-protected PDF file. The recipient will need a password to view the contents.
  2. Web-based - The recipient will connect to your Xeams server with their password to view messages.

Assigning Passwords

The recipient will need a password in order to view an encrypted emails. There are multiple ways to do that:

  • Let the recipient create their own password. Click here for details.
  • The administrator or the end-user can create passwords for the recipient. Click here for details.
  • A password is specified along with the trigger word when composing email. This option only works when using the PDF as described above.

How is end-to-end encryption different from TLS/SSL

Emails typically go through multiple servers before reaching its final destination. TLS (Transport-layer security) offers encryption when messages are transported from one server to another. However, once an email reaches an intermediate or final server, it resides on that machine without encryption and, therefore, can be viewed by any administrator with access to that machine.

End-to-end encryption ensures the message gets encrypted right at the source and stays encrypted all the way to the recipient's machine. No one, including administrators, can view these messages.