]> git.proxmox.com Git - pmg-docs.git/blame - pmgconfig.adoc
mention DKIM Signing in the introduction
[pmg-docs.git] / pmgconfig.adoc
CommitLineData
e62ceaf0
DM
1[[chapter_pmgconfig]]
2ifdef::manvolnum[]
3pmgconfig(1)
4============
5:pmg-toplevel:
6
7NAME
8----
9
10pmgconfig - Proxmox Mail Gateway Configuration Management Toolkit
11
12
13SYNOPSIS
14--------
15
16include::pmgconfig.1-synopsis.adoc[]
17
18
19DESCRIPTION
20-----------
21endif::manvolnum[]
22ifndef::manvolnum[]
66e9c719
DM
23Configuration Management
24========================
e62ceaf0
DM
25:pmg-toplevel:
26endif::manvolnum[]
27
685576c2
DM
28{pmg} is usually configured using the web-based Graphical User
29Interface (GUI), but it is also possible to directly edit the
30configuration files, use the REST API over 'https'
66e9c719 31or the command line tool `pmgsh`.
685576c2 32
66e9c719 33The command line tool `pmgconfig` is used to simplify some common
685576c2
DM
34configuration tasks, i.e. to generate cerificates and to rewrite
35service configuration files.
36
66e9c719
DM
37NOTE: We use a Postgres database to store mail filter rules and
38statistic data. See chapter xref:chapter_pmgdb[Database Management]
39for more information.
40
41
42Configuration files overview
43----------------------------
44
45`/etc/network/interfaces`::
46
47Network setup. We never modify this files directly. Instead, we write
48changes to `/etc/network/interfaces.new`. When you reboot, we rename
49the file to `/etc/network/interfaces`, so any changes gets activated
50on the next reboot.
51
9bfe27f3
DM
52`/etc/resolv.conf`::
53
54DNS search domain and nameserver setup.
55
56`/etc/hostname`::
57
58The system's host name.
59
60`/etc/hosts`::
61
62Static table lookup for hostnames.
63
66e9c719
DM
64`/etc/pmg/pmg.conf`::
65
66Stores common administration options, i.e. the spam and mail proxy setup.
67
68`/etc/pmg/cluster.conf`::
69
70The cluster setup.
71
72`/etc/pmg/domains`::
73
74The list of relay domains.
75
5053eecc
SI
76`/etc/pmg/dkim/domains`::
77
78The list of domains for outbound DKIM signing.
79
66e9c719
DM
80`/etc/pmg/fetchmailrc`::
81
82Fetchmail configuration (POP3 and IMAP setup).
83
84`/etc/pmg/ldap.conf`::
85
86LDAP configuration.
87
88`/etc/pmg/mynetworks`::
89
90List of local (trusted) networks.
91
92`/etc/pmg/subscription`::
93
94Stores your subscription key and status.
95
37b2b051
SI
96`/etc/pmg/tls_policy`::
97
98TLS policy for outbound connections.
99
66e9c719
DM
100`/etc/pmg/transports`::
101
102Message delivery transport setup.
103
104`/etc/pmg/user.conf`::
105
106GUI user configuration.
107
797db11d
DM
108`/etc/mail/spamassassin/custom.cf`::
109
110Custom {spamassassin} setup.
111
8b4756e5
SI
112`/etc/mail/spamassassin/pmg-scores.cf`::
113
114Custom {spamassassin} rule scores.
66e9c719
DM
115
116Keys and Certificates
117---------------------
118
119`/etc/pmg/pmg-api.pem`::
120
121Key and certificate (combined) used be the HTTPs server (API).
122
123`/etc/pmg/pmg-authkey.key`::
124
125Privat key use to generate authentication tickets.
126
127`/etc/pmg/pmg-authkey.pub`::
128
129Public key use to verify authentication tickets.
130
131`/etc/pmg/pmg-csrf.key`::
132
133Internally used to generate CSRF tokens.
134
135`/etc/pmg/pmg-tls.pem`::
136
137Key and certificate (combined) to encrypt mail traffic (TLS).
138
5053eecc
SI
139`/etc/pmg/dkim/<selector>.private`::
140
141Key for DKIM signing mails with selector '<selector>'.
142
66e9c719
DM
143
144Service Configuration Templates
145-------------------------------
146
9c85cc80
DM
147{pmg} uses various services to implement mail filtering, for example
148the {postfix} Mail Transport Agent (MTA), the {clamav} antivirus
149engine and the Apache {spamassassin} project. Those services use
150separate configuration files, so we need to rewrite those files when
151configuration is changed.
152
153We use a template based approach to generate those files. The {tts} is
154a well known, fast and flexible template processing system. You can
155find the default templates in `/var/lib/pmg/templates/`. Please do not
156modify them directly, because your modification would get lost on the
9dd45bd7
SI
157next update. Instead, copy the template you wish to change to
158`/etc/pmg/templates/`, then apply your changes there.
9c85cc80
DM
159
160Templates can access any configuration setting, and you can use the
161`pmgconfig dump` command to get a list of all variable names:
162
163----
164# pmgconfig dump
165...
166dns.domain = yourdomain.tld
167dns.hostname = pmg
168ipconfig.int_ip = 192.168.2.127
169pmg.admin.advfilter = 1
170...
171----
172
173The same tool is used to force regeneration of all template based
174configuration files. You need to run that after modifying a template,
175or when you directly edit configuration files
176
177----
178# pmgconfig sync --restart 1
179----
180
9dd45bd7 181The above command also restarts services if the underlying configuration
9c85cc80
DM
182files are changed. Please note that this is automatically done when
183you change the configuration using the GUI or API.
184
185NOTE: Modified templates from `/etc/pmg/templates/` are automatically
186synced from the master node to all cluster members.
66e9c719
DM
187
188
4a08dffe 189[[pmgconfig_systemconfig]]
685576c2
DM
190System Configuration
191--------------------
192
193Network and Time
194~~~~~~~~~~~~~~~~
195
196ifndef::manvolnum[]
197image::images/screenshot/pmg-gui-network-config.png[]
198endif::manvolnum[]
199
45de5bf5 200Normally the network and time is already configured when you visit the
c6e27848 201GUI. The installer asks for those settings and sets up the correct
45de5bf5
DM
202values.
203
204The default setup uses a single Ethernet adapter and static IP
205assignment. The configuration is stored at '/etc/network/interfaces',
206and the actual network setup is done the standard Debian way using
207package 'ifupdown'.
208
209.Example network setup '/etc/network/interfaces'
210----
211source /etc/network/interfaces.d/*
212
213auto lo
214iface lo inet loopback
215
216auto ens18
217iface ens18 inet static
218 address 192.168.2.127
219 netmask 255.255.240.0
220 gateway 192.168.2.1
221----
222
223.DNS recommendations
224
225Many tests to detect SPAM mails use DNS queries, so it is important to
226have a fast and reliable DNS server. We also query some public
227available DNS Blacklists. Most of them apply rate limits for clients,
228so they simply will not work if you use a public DNS server (because
229they are usually blocked). We recommend to use your own DNS server,
230which need to be configured in 'recursive' mode.
685576c2
DM
231
232
233Options
234~~~~~~~
235
236ifndef::manvolnum[]
237image::images/screenshot/pmg-gui-system-options.png[]
238endif::manvolnum[]
239
e09057ab
DM
240
241Those settings are saved to subsection 'admin' in `/etc/pmg/pmg.conf`,
242using the following configuration keys:
243
685576c2
DM
244include::pmg.admin-conf-opts.adoc[]
245
c331641e
DM
246
247Mail Proxy Configuration
248------------------------
249
4a08dffe 250[[pmgconfig_mailproxy_relaying]]
c331641e
DM
251Relaying
252~~~~~~~~
253
c331641e
DM
254ifndef::manvolnum[]
255image::images/screenshot/pmg-gui-mailproxy-relaying.png[]
256endif::manvolnum[]
257
e09057ab
DM
258Those settings are saved to subsection 'mail' in `/etc/pmg/pmg.conf`,
259using the following configuration keys:
260
261include::pmg.mail-relaying-conf-opts.adoc[]
c331641e 262
4a08dffe 263[[pmgconfig_mailproxy_relay_domains]]
c331641e
DM
264Relay Domains
265~~~~~~~~~~~~~
266
c331641e
DM
267ifndef::manvolnum[]
268image::images/screenshot/pmg-gui-mailproxy-relaydomains.png[]
269endif::manvolnum[]
270
6822b369
DM
271List of relayed mail domains, i.e. what destination domains this
272system will relay mail to. The system will reject incoming mails to
273other domains.
c331641e 274
d9c56b22 275
4a08dffe 276[[pmgconfig_mailproxy_ports]]
c331641e
DM
277Ports
278~~~~~
279
c331641e
DM
280ifndef::manvolnum[]
281image::images/screenshot/pmg-gui-mailproxy-ports.png[]
282endif::manvolnum[]
283
d9c56b22
DM
284Those settings are saved to subsection 'mail' in `/etc/pmg/pmg.conf`,
285using the following configuration keys:
286
287include::pmg.mail-ports-conf-opts.adoc[]
288
c331641e 289
4a08dffe 290[[pmgconfig_mailproxy_options]]
c331641e
DM
291Options
292~~~~~~~
293
c331641e
DM
294ifndef::manvolnum[]
295image::images/screenshot/pmg-gui-mailproxy-options.png[]
296endif::manvolnum[]
297
e3d778e0
DM
298Those settings are saved to subsection 'mail' in `/etc/pmg/pmg.conf`,
299using the following configuration keys:
300
301include::pmg.mail-options-conf-opts.adoc[]
c331641e
DM
302
303
4a08dffe 304[[pmgconfig_mailproxy_transports]]
c331641e
DM
305Transports
306~~~~~~~~~~
307
308ifndef::manvolnum[]
309image::images/screenshot/pmg-gui-mailproxy-transports.png[]
310endif::manvolnum[]
311
b335e06b
DM
312You can use {pmg} to send e-mails to different internal
313e-mail servers. For example you can send e-mails addressed to
314domain.com to your first e-mail server, and e-mails addressed to
315subdomain.domain.com to a second one.
316
317You can add the IP addresses, hostname and SMTP ports and mail domains (or
318just single email addresses) of your additional e-mail servers.
c331641e
DM
319
320
4a08dffe 321[[pmgconfig_mailproxy_networks]]
c331641e
DM
322Networks
323~~~~~~~~
324
325ifndef::manvolnum[]
326image::images/screenshot/pmg-gui-mailproxy-networks.png[]
327endif::manvolnum[]
328
20e879ad
DM
329You can add additional internal (trusted) IP networks or hosts.
330All hosts in this list are allowed to relay.
331
332NOTE: Hosts in the same subnet with Proxmox can relay by default and
333it’s not needed to add them in this list.
c331641e
DM
334
335
4a08dffe 336[[pmgconfig_mailproxy_tls]]
c331641e
DM
337TLS
338~~~
339
340ifndef::manvolnum[]
341image::images/screenshot/pmg-gui-mailproxy-tls.png[]
342endif::manvolnum[]
343
20e879ad
DM
344Transport Layer Security (TLS) provides certificate-based
345authentication and encrypted sessions. An encrypted session protects
346the information that is transmitted with SMTP mail. When you activate
347TLS, {pmg} automatically generates a new self signed
348certificate for you (`/etc/pmg/pmg-tls.pem`).
349
37b2b051 350{pmg} uses opportunistic TLS encryption by default. The SMTP transaction is
20e879ad 351encrypted if the 'STARTTLS' ESMTP feature is supported by the remote
37b2b051
SI
352server. Otherwise, messages are sent in the clear.
353You can set a different TLS policy per desitination domain, should you for
354example need to prevent e-mail delivery without encryption, or to work around
355a broken 'STARTTLS' ESMTP implementation. See {postfix_tls_readme} for details
356on the supported policies.
20e879ad
DM
357
358Enable TLS logging::
359
360To get additional information about SMTP TLS activity you can enable
361TLS logging. That way information about TLS sessions and used
362certificate’s is logged via syslog.
363
364Add TLS received header::
365
366Set this option to include information about the protocol and cipher
367used as well as the client and issuer CommonName into the "Received:"
368message header.
369
a649b38f
DM
370Those settings are saved to subsection 'mail' in `/etc/pmg/pmg.conf`,
371using the following configuration keys:
372
373include::pmg.mail-tls-conf-opts.adoc[]
374
c331641e 375
20522d96
SI
376[[pmgconfig_mailproxy_dkim]]
377DKIM Signing
378~~~~~~~~~~~~
379
380DomainKeys Identified Mail (DKIM) Signatures (see {dkim_rfc}) is a method to
381cryptographically authenticate a mail as originating from a particular domain.
382Before sending the mail a hash over certain header fields and the body is
383computed, signed with a private key and added in the `DKIM-Signature` header of
384the mail. The 'selector' (a short identifier chosen by you, used to identify
385which system and private key were used for signing) is also included in the
386`DKIM-Signature` header.
387
388The verification is done by the receiver: The public key is fetched
389via DNS TXT lookup for `yourselector._domainkey.yourdomain.example` and used
390for verifying the hash. You can publish multiple selectors for your domain,
391each use by a system which sends e-mail from your domain, without the need to
392share the private key.
393
394{pmg} verifies DKIM Signatures for inbound mail in the Spam Filter by default.
395
396Additionally it supports conditionally signing outbound mail if configured.
397It uses one private key and selector per PMG deployment (all nodes in a cluster
398use the same key). The key has a minimal size of 1024 bits and rsa-sha256 is
399used as signing algorithm.
400
401The headers included in the signature are taken from the list of
402`Mail::DKIM::Signer`. Additionally `Content-Type` (if present), `From`, `To`,
403`CC`, `Reply-To` and `Subject` get oversigned.
404
405You can either sign all mails received on the internal port using the domain of
406the envelope sender address or create a list of domains, for which e-mails
407should be signed, defaulting to the list of relay domains.
408
409
410Enable DKIM Signing::
411
412Controls whether outbound mail should get DKIM signed.
413
414Selector::
415
416The selector used for signing the mail. The private key used for signing is
3fe91910 417saved under `/etc/pmg/dkim/yourselector.private`. You can display the DNS TXT
20522d96
SI
418record which you need to add to all domains signed by {pmg} by clicking on the
419'View DNS Record' Button.
420
421Sign all Outgoing Mail::
422
423Controls whether all outbound mail should get signed or only mails from domains
424listed in `/etc/pmg/dkim/domains` if it exists and `/etc/pmg/domains` otherwise.
425
426Those settings are saved to subsection 'admin' in `/etc/pmg/pmg.conf`,
427using the following configuration keys:
428
429include::pmg.admin-dkim-conf-opts.adoc[]
430
431
c331641e
DM
432Whitelist
433~~~~~~~~~
434
435ifndef::manvolnum[]
436image::images/screenshot/pmg-gui-mailproxy-whitelist.png[]
437endif::manvolnum[]
438
6822b369
DM
439All SMTP checks are disabled for those entries (e. g. Greylisting,
440SPF, RBL, ...)
441
442NOTE: If you use a backup MX server (e.g. your ISP offers this service
443for you) you should always add those servers here.
c331641e
DM
444
445
4a08dffe 446[[pmgconfig_spamdetector]]
c331641e
DM
447Spam Detector Configuration
448---------------------------
449
2d672352
DM
450Options
451~~~~~~~
452
74bfe8ba
DM
453ifndef::manvolnum[]
454image::images/screenshot/pmg-gui-spam-options.png[]
455endif::manvolnum[]
456
3371c521
DM
457{pmg} uses a wide variety of local and network tests to identify spam
458signatures. This makes it harder for spammers to identify one aspect
459which they can craft their messages to work around the spam filter.
460
461Every single e-mail will be analyzed and gets a spam score
462assigned. The system attempts to optimize the efficiency of the rules
463that are run in terms of minimizing the number of false positives and
464false negatives.
465
466include::pmg.spam-conf-opts.adoc[]
467
468
4a08dffe 469[[pmgconfig_spamdetector_quarantine]]
2d672352
DM
470Quarantine
471~~~~~~~~~~
3371c521 472
74bfe8ba
DM
473ifndef::manvolnum[]
474image::images/screenshot/pmg-gui-spamquar-options.png[]
475endif::manvolnum[]
476
3371c521
DM
477Proxmox analyses all incoming e-mail messages and decides for each
478e-mail if its ham or spam (or virus). Good e-mails are delivered to
479the inbox and spam messages can be moved into the spam quarantine.
480
481The system can be configured to send daily reports to inform users
482about the personal spam messages received the last day. That report is
483only sent if there are new messages in the quarantine.
484
ee34edb0
DC
485Some options are only available in the config file `/etc/pmg/pmg.conf`,
486and not in the webinterface.
487
3371c521 488include::pmg.spamquar-conf-opts.adoc[]
c331641e
DM
489
490
4a08dffe 491[[pmgconfig_clamav]]
c331641e
DM
492Virus Detector Configuration
493----------------------------
494
4a08dffe 495[[pmgconfig_clamav_options]]
2d672352
DM
496Options
497~~~~~~~
498
e7c18c7c
DM
499ifndef::manvolnum[]
500image::images/screenshot/pmg-gui-virus-options.png[]
501endif::manvolnum[]
502
0bfbbf88
DM
503All mails are automatically passed to the included virus detector
504({clamav}). The default setting are considered safe, so it is usually
505not required to change them.
506
507{clamav} related settings are saved to subsection 'clamav' in `/etc/pmg/pmg.conf`,
508using the following configuration keys:
509
510include::pmg.clamav-conf-opts.adoc[]
511
e7c18c7c
DM
512ifndef::manvolnum[]
513image::images/screenshot/pmg-gui-clamav-database.png[]
514endif::manvolnum[]
515
516Please note that the virus signature database it automatically
517updated. But you can see the database status on the GUI, and you can
518trigger manual updates there.
519
0bfbbf88 520
4a08dffe 521[[pmgconfig_clamav_quarantine]]
2d672352
DM
522Quarantine
523~~~~~~~~~~
0bfbbf88 524
e7c18c7c
DM
525ifndef::manvolnum[]
526image::images/screenshot/pmg-gui-virusquar-options.png[]
527endif::manvolnum[]
528
0bfbbf88
DM
529Indentified virus mails are automatically moved to the virus
530quarantine. The administartor can view those mails using the GUI, or
531deliver them in case of false positives. {pmg} does not notify
532individual users about received virus mails.
533
534Virus quarantine related settings are saved to subsection 'virusquar'
535in `/etc/pmg/pmg.conf`, using the following configuration keys:
536
537include::pmg.virusquar-conf-opts.adoc[]
c331641e
DM
538
539
7eff8815
DM
540Custom SpamAssassin configuration
541---------------------------------
542
833e1edc
SI
543This is only for advanced users. {spamassassin}'s rules and their associated
544scores get updated regularly and are trained on a huge corpus, which gets
545classified by experts. In most cases adding a rule for matching a particular
546keyword is the wrong approach, leading to many false positives. Usually bad
547detection rates are better addressed by properly setting up DNS than by adding
548a custom rule - watch out for matches to 'URIBL_BLOCKED' in the logs or
549spam-headers - see the {spamassassin_dnsbl}.
550
551To add or change the Proxmox {spamassassin} configuration please login to the
d2f49775
TL
552console via SSH. Change to the `/etc/mail/spamassassin/` directory. In this
553directory there are several files (`init.pre`, `local.cf`, ...) - do not change
554them, as they will be overwritten by any {spamassassin} rule update.
833e1edc
SI
555
556To add your special configuration, you have to create a new file and name it
d2f49775
TL
557`custom.cf` (in this directory), then add your configuration there. Make sure
558to use the correct {spamassassin} syntax, and test with
7eff8815
DM
559
560----
561# spamassassin -D --lint
562----
563
564If you run a cluster, the `custom.cf` file is synchronized from the
d2f49775 565master node to all cluster members automatically.
7eff8815
DM
566
567
ed7970d8
SI
568[[pmgconfig_custom_check]]
569Custom Check Interface
570----------------------
571
572For use cases which are not handled by the {pmg} Virus Detector and
573{spamassassin} configuration, advanced users can create a custom check
574executable which, if enabled will be called before the Virus Detector and before
575passing an e-mail through the Rule System. The custom check API is kept as
576simple as possible, while still providing a great deal of control over the
577treatment of an e-mail. Its input is passed via two CLI arguments:
578
579* the 'api-version' (currently `v1`) - for potential future change of the
580 invocation
581
582* the 'queue-file-name' - a filename, which contains the complete e-mail as
583 rfc822/eml file
584
585The expected output need to be printed on STDOUT and consists of two lines:
586
587* the 'api-version' (currently 'v1') - see above
588
589* one of the following 3 results:
590** 'OK' - e-mail is ok
591** 'VIRUS: <virusdescription>' - e-mail is treated as if it contained a virus
592 (the virusdescription is logged and added to the e-mail's headers)
593** 'SCORE: <number>' - <number> is added (negative numbers are also possible)
594 to the e-mail's spamscore
595
596The check is run with a 5 minute timeout - if it is exceeded the check
597executable is killed and the e-mail is treated as OK.
598
599All output written to STDERR by the check is written with priority 'err' to the
600journal/mail.log.
601
602A simple sample script following the API (and yielding a random result) for
603reference:
604
605----
606#!/bin/sh
607
608echo "called with $*" 1>&2
609
610if [ "$#" -ne 2 ]; then
611 echo "usage: $0 APIVERSION QUEUEFILENAME" 1>&2
612 exit 1
613fi
614
615apiver="$1"
616shift
617
618if [ "$apiver" != "v1" ]; then
619 echo "wrong APIVERSION: $apiver" 1>&2
620 exit 2
621fi
622
623queue_file="$1"
624
625echo "v1"
626
627choice=$(shuf -i 0-3 -n1)
628
629case "$choice" in
630 0)
631 echo OK
632 ;;
633 1)
634 echo SCORE: 4
635 ;;
636 2)
637 echo VIRUS: Random Virus
638 ;;
639 3) #timeout-test
640 for i in $(seq 1 7); do
641 echo "custom checking mail: $queue_file - minute $i" 1>&2
642 sleep 60
643 done
644 ;;
645esac
646
647exit 0
648----
649
650The custom check needs to be enabled in the admin section of `/etc/pmg/pmg.conf`
651
652----
653section: admin
654 custom_check 1
655----
656
657The location of the custom check executable can also be set there with the key
658`custom_check_path` and defaults to `/usr/local/bin/pmg-custom-check`.
659
660
c331641e
DM
661User Management
662---------------
663
05336835
DC
664User management in {pmg} consists of three types of users/accounts:
665
666
4a08dffe 667[[pmgconfig_localuser]]
05336835
DC
668Local Users
669~~~~~~~~~~~
670
f02d2b90
DM
671image::images/screenshot/pmg-gui-local-user-config.png[]
672
05336835
DC
673Local users are used to manage and audit {pmg}. Those users can login on the
674management web interface.
675
676There are three roles:
677
678* Administrator
679+
680Is allowed to manage settings of {pmg}, except some tasks like
681network configuration and upgrading.
682
683* Quarantine manager
684+
685Is allowed to manage quarantines, blacklists and whitelists, but not other
686settings. Has no right to view any other data.
687
688* Auditor
689+
690With this role, the user is only allowed to view data and configuration, but
691not to edit it.
692
693In addition there is always the 'root' user, which is used to perform special
694system administrator tasks, such as updgrading a host or changing the
695network configuration.
696
697NOTE: Only pam users are able to login via the webconsole and ssh, which the
698users created with the web interface are not. Those users are created for
699{pmg} administration only.
700
701Local user related settings are saved in `/etc/pmg/user.conf`.
702
703For details of the fields see xref:pmg_user_configuration_file[user.conf]
704
4a08dffe 705[[pmgconfig_ldap]]
05336835
DC
706LDAP/Active Directory
707~~~~~~~~~~~~~~~~~~~~~
708
f02d2b90
DM
709image::images/screenshot/pmg-gui-ldap-user-config.png[]
710
05336835
DC
711You can specify multiple LDAP/Active Directory profiles, so that you can
712create rules matching those users and groups.
713
714Creating a profile requires (at least) the following:
715
716* profile name
717* protocol (LDAP or LDAPS; LDAPS is recommended)
718* at least one server
719* a user and password (if your server does not support anonymous binds)
720
721All other fields should work with the defaults for most setups, but can be
722used to customize the queries.
723
724The settings are saved to `/etc/pmg/ldap.conf`. Details for the options
725can be found here: xref:pmg_ldap_configuration_file[ldap.conf]
726
727Bind user
728^^^^^^^^^
729
730It is highly recommended that the user which you use for connecting to the
731LDAP server only has the permission to query the server. For LDAP servers
732(for example OpenLDAP or FreeIPA), the username has to be of a format like
733'uid=username,cn=users,cn=accounts,dc=domain' , where the specific fields are
734depending on your setup. For Active Directory servers, the format should be
735like 'username@domain' or 'domain\username'.
736
737Sync
738^^^^
739
740{pmg} synchronizes the relevant user and group info periodically, so that
741that information is available in a fast manner, even when the LDAP/AD server
742is temporarily not accessible.
743
744After a successfull sync, the groups and users should be visible on the web
745interface. After that, you can create rules targeting LDAP users and groups.
c331641e
DM
746
747
4a08dffe 748[[pmgconfig_fetchmail]]
8538d9a2 749Fetchmail
05336835
DC
750~~~~~~~~~
751
f02d2b90
DM
752image::images/screenshot/pmg-gui-fetchmail-config.png[]
753
05336835
DC
754Fetchmail is utility for polling and forwarding e-mails. You can define
755e-mail accounts, which will then be fetched and forwarded to the e-mail
756address you defined.
757
758You have to add an entry for each account/target combination you want to
759fetch and forward. Those will then be regularly polled and forwarded,
760according to your configuration.
761
762The API and web interface offer following configuration options:
8538d9a2
DM
763
764include::fetchmail.conf.5-opts.adoc[]
765
766
e62ceaf0
DM
767ifdef::manvolnum[]
768include::pmg-copyright.adoc[]
769endif::manvolnum[]
770