2020-10-23 20:08:35 -04:00
---
2020-12-01 13:09:42 -05:00
stage: Enablement
group: Distribution
2020-11-26 01:09:20 -05:00
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments
2020-10-23 20:08:35 -04:00
---
2021-06-02 17:10:00 -04:00
# Signing outgoing email with S/MIME **(FREE SELF)**
2019-07-10 15:40:28 -04:00
2019-09-30 23:05:57 -04:00
Notification emails sent by GitLab can be signed with S/MIME for improved
2019-07-10 15:40:28 -04:00
security.
2020-11-03 22:09:14 -05:00
Be aware that S/MIME certificates and TLS/SSL certificates are not the
2019-07-10 15:40:28 -04:00
same and are used for different purposes: TLS creates a secure channel, whereas
S/MIME signs and/or encrypts the message itself
## Enable S/MIME signing
This setting must be explicitly enabled and a single pair of key and certificate
2019-09-10 02:44:56 -04:00
files must be provided:
2019-07-10 15:40:28 -04:00
2019-09-10 02:44:56 -04:00
- Both files must be PEM-encoded.
- The key file must be unencrypted so that GitLab can read it without user
2019-07-10 15:40:28 -04:00
intervention.
2019-09-10 02:44:56 -04:00
- Only RSA keys are supported.
2019-07-10 15:40:28 -04:00
2020-04-21 11:21:10 -04:00
Optionally, you can also provide a bundle of CA certs (PEM-encoded) to be
included on each signature. This will typically be an intermediate CA.
2020-12-04 16:09:29 -05:00
WARNING:
2020-07-16 02:09:33 -04:00
Be mindful of the access levels for your private keys and visibility to
2019-07-10 15:40:28 -04:00
third parties.
2019-09-10 02:44:56 -04:00
**For Omnibus installations:**
1. Edit `/etc/gitlab/gitlab.rb` and adapt the file paths:
```ruby
gitlab_rails['gitlab_email_smime_enabled'] = true
gitlab_rails['gitlab_email_smime_key_file'] = '/etc/gitlab/ssl/gitlab_smime.key'
gitlab_rails['gitlab_email_smime_cert_file'] = '/etc/gitlab/ssl/gitlab_smime.crt'
2020-04-21 11:21:10 -04:00
# Optional
gitlab_rails['gitlab_email_smime_ca_certs_file'] = '/etc/gitlab/ssl/gitlab_smime_cas.crt'
2019-09-10 02:44:56 -04:00
```
1. Save the file and [reconfigure GitLab ](restart_gitlab.md#omnibus-gitlab-reconfigure ) for the changes to take effect.
2020-07-16 02:09:33 -04:00
The key needs to be readable by the GitLab system user (`git` by default).
2019-09-10 02:44:56 -04:00
**For installations from source:**
1. Edit `config/gitlab.yml` :
```yaml
email_smime:
# Uncomment and set to true if you need to enable email S/MIME signing (default: false)
enabled: true
# S/MIME private key file in PEM format, unencrypted
# Default is '.gitlab_smime_key' relative to Rails.root (i.e. root of the GitLab app).
key_file: /etc/pki/smime/private/gitlab.key
# S/MIME public certificate key in PEM format, will be attached to signed messages
# Default is '.gitlab_smime_cert' relative to Rails.root (i.e. root of the GitLab app).
cert_file: /etc/pki/smime/certs/gitlab.crt
2020-04-21 11:21:10 -04:00
# S/MIME extra CA public certificates in PEM format, will be attached to signed messages
# Optional
ca_certs_file: /etc/pki/smime/certs/gitlab_cas.crt
2019-09-10 02:44:56 -04:00
```
1. Save the file and [restart GitLab ](restart_gitlab.md#installations-from-source ) for the changes to take effect.
2020-07-16 02:09:33 -04:00
The key needs to be readable by the GitLab system user (`git` by default).
2019-09-10 02:44:56 -04:00
2019-07-10 15:40:28 -04:00
### How to convert S/MIME PKCS#12 / PFX format to PEM encoding
Typically S/MIME certificates are handled in binary PKCS#12 format (`.pfx` or `.p12`
extensions), which contain the following in a single encrypted file:
2019-09-10 02:44:56 -04:00
- Public certificate
2019-07-10 15:40:28 -04:00
- Intermediate certificates (if any)
- Private key
2020-09-30 17:10:09 -04:00
To export the required files in PEM encoding from the PKCS#12 file, the
`openssl` command can be used:
2019-07-10 15:40:28 -04:00
2020-01-30 10:09:15 -05:00
```shell
2019-07-10 15:40:28 -04:00
#-- Extract private key in PEM encoding (no password, unencrypted)
$ openssl pkcs12 -in gitlab.p12 -nocerts -nodes -out gitlab.key
#-- Extract certificates in PEM encoding (full certs chain including CA)
$ openssl pkcs12 -in gitlab.p12 -nokeys -out gitlab.crt
```