Customers currently using the Connect Application are advised to complete their onboarding setup as soon as possible, as the Connect Application is scheduled to be discontinued on the 31st of January, 2024.
This article contains information on configuring recipient validation methods for email systems, including synchronization with network directories, Azure Active Directory, and importing users via spreadsheets, to ensure secure and authorized email communication.For us to accept your inbound email, recipient validation must be configured. This enables us to only accept messages from the email addresses you have authorized. To do this, we must have a complete list of all internal users.
Recipient validation can be completed by one of the following methods:
| Method | Applicable To | Advantages | Disadvantages |
|---|---|---|---|
| Synchronization with your Network Directory (e.g. LDAP)
This is the recommended method. |
|
|
|
| Mimecast Synchronization Engine: Active Directory |
|
|
|
| Enabling Azure Active Directory Synchronization for Microsoft 365 |
|
|
|
| Automatically by email flow as users send emails through Mimecast |
|
|
|
| Importing Users via a Spreadsheet |
|
|
|
| Creating / Editing Mimecast Users |
|
|
|
Microsoft 365
Microsoft 365 does not support Active Directory integration. User management is controlled manually through:
-
-
- Your internal domains. See the Configuring Internal Domain / Subdomains page for full details.
- Using a spreadsheet. See the Importing Users via a Spreadsheet. page for full details.
-
For environments that use a separate domain controller, Active Directory synchronization can be configured.
On Premises / Hosted Exchange (HEX)
To enable directory synchronization:
- Open the LDAP port on your firewall to the Mimecast Data Center IP ranges. By default, this will be:
-
-
- Port 389 for LDAP.
- Port 636 for LDAPS.
-
- Ensure the correct routing has been setup from the firewall through to the selected domain controller.
- Create a user account in the directory for Mimecast to use for authentication purposes. This enables the extraction of all valid email addresses, group structures, and any attributes that have been setup in Mimecast to be synchronized.
See the User Account Requirements section below for further details.
- Review and complete the configuration steps outlined in the Directory Connections article for each connector.
See the Enabling LDAP Directory Synchronization for Active Directory page for further details.
Ensure the domain controller has a publicly routable IP address configured that Mimecast can access. If LDAPS is used, ensure that the certificate is registered to the Fully Qualified Domain Name (FQDN) of the server. This means that LDAPS will not work unless the certificate name is based on the FQDN of the server.
User Account Requirements
The user account created in point 3 above requires:
-
-
- Permissions to read Active Directory users and attributes. By default, a member of the Domain Users group has these permissions.
- A password that does not need to be changed at first logon and does not expire.
-
The user account created in point 3 above does not require:
-
-
- Special permissions.
- A local mailbox.
-
Google Workspace
In order for your users to send and receive emails, they must be added to your Mimecast account. This can best be achieved by Recipient Validation which ensures a Mimecast user record is created when an outbound message is sent.
You can also:
-
-
- Import users via a spreadsheet. This is recommended when importing users in bulk. See Importing Users via a Spreadsheet for further details.
- Add users manually. See Creating / Editing Mimecast Users for further details.
Include a cloud password for the above two methods if you want to allow users access to Mimecast end-user applications.
-
Comments
Please sign in to leave a comment.