With our "Personal Strict", "Personal Multipurpose" and "Organization Multipurpose" authentication certificates, you have the option of bundling several e-mail addresses in one certificate. This means that you only need one certificate for several e-mail addresses.
Which variant you choose, i.e. Strict or Multipurpose, makes no difference. Both certificate types are suitable for signing and encrypting e-mail messages. The only difference between the two certificate types is that the Strict variant can only be used for signing and encrypting e-mails. With the multipurpose variant, you also have the option of signing documents, such as .PDF files, or using the certificate for client authentication (login, etc.).
Please note that our S/MIME certificates generally cannot be used to create EU-compliant signatures for PDF documents. To do so, please request a document signing certificate from our customer service team.
Go to our product page and choose between the 3 different variants:
Now select the desired term (max. 2 years) and enter the CSR and the e-mail addresses to be included in the certificate (one e-mail address per line).
To generate a CSR, you are welcome to use our CSR generator, which you can find on our website. Simply enter the primary e-mail address in the Domain name field.
If you opt for the "EuropeanSSL S/MIME Organization Multipurpose" variant, additional information such as company identifier (VAT ID, commercial register number, LEI number, etc.), organization name, etc. is required. This data is included in the certificate.
We recommend using a neutral address as the primary e-mail address, as this will be displayed as the main address in the certificate.
Once you have entered all the details, click on Proceed to checkout to confirm your order.
Review the order again before you complete the purchase. By clicking on Order now you confirm that all details are correct and that you wish to place the order.
If you need to change anything, click on Edit to return to the shopping cart.
Encrypted communication is not only highly relevant in a digital world, it is absolutely necessary to protect yourself and your data from third parties. In this article, we explain what it means, show benefits, and provide tips on how to protect sensitive information.
Unlock the secrets of email security! Dive into our comprehensive guide on the crucial roles of email encryption and authentication, their mechanisms, benefits, and best practices.
Cloud services offer notable advantages such as scalability, cost-efficiency and accessibility, but also raise significant security concerns that cannot be overlooked. As organizations migrate their operations to the cloud, ensuring the security of sensitive data and resources becomes a priority. While the cloud offers unmatched convenience and flexibility, it also brings new challenges that organizations must address comprehensively.
In this article, we look at the basic actions needed to build a resilient and strong IT network to help you build a cybersecurity strategy.
In this article, we tackle the critical issue of regular security audits and discuss why these audits are essential, their benefits, and how they work.
This article looks at the impact of the GDPR on IT security and explains its role in strengthening data protection safeguards, reshaping cybersecurity strategies and promoting a culture of data protection.
From smart thermostats and wearable fitness trackers to industrial sensors and autonomous vehicles, IoT devices have permeated every aspect of our lives. This connectivity offers unprecedented convenience and efficiency, but also opens the door to a multitude of security vulnerabilities.
Discover how homomorphic encryption allows secure computations on encrypted data without decryption, revolutionizing data privacy and security across various industries. Explore its benefits, applications, and challenges in our detailed article.