domain
Use these commands to configure a protected domain.
For more information on protected domains and when they are required, see the FortiMail Administration Guide.
Syntax
This command contains many sub-commands. Each sub-command, linked below, is documented in subsequent sections.
config domain
edit <domain_name>
config cal resource ...
config customized-message ...
config domain-info ...
config domain-setting ...
config file filter ...
config config policy recipient ...
config profile antispam ...
config profile antispam-action ...
config profile antivirus ...
config profile antivirus-action ...
config profile authentication ...
config profile content ...
config profile content-action ...
config profile cousin-domain ...
config profile email-address-group ...
config profile impersonation ...
config profile notification ...
config profile resource ...
config profile user-import ...
config config user mail ...
next
end
Variable |
Description |
Default |
Type the fully qualified domain name (FQDN) of the protected domain. For example, to protect email addresses ending in “@example.com”, type |
|
cal resource
Use this sub-command to configure the calendar resource of a protected domain for calendar sharing.
Syntax
This sub-command is available from within the command domain.
config cal resource
edit <resource_name>
set description <string>
set display-name <string>
set management-users <user_email>
set type {room | equipment}
end
Variable |
Description |
Default |
<resource-name> | Enter a name for the calendar resource. This name forms the local name of the calendar resource for the current domain, for example <resource_name@<domain_name>.com. |
|
description <description_str> | Enter a description for the calendar resource entry. |
|
display-name <user_str> | Enter a display name. |
|
management-users <user_email> | Enter the management users for the calendar resource in the format <user_name>@<domain_name>.com. |
|
type {room | equipment} | Set the resource type to either room or equipment. |
room |
customized-message
Use this sub-command to configure the variables and the default email template of quarantine summary of a protected domain.
Syntax
This sub-command is available from within the command domain.
config customized-message
edit report-quarantine-summary
config variable
edit <name>
set content
set display-name
config email-template
edit default
set from <string>
set subject <string>
end
Variable |
Description |
Default |
Enter a variable name that you want to add or edit, such as |
|
|
Enter the content for the variable. |
|
|
Enter the display name for the variable. For example, the display name for |
|
|
Enter the replacement message for the |
|
|
Enter the replacement message for the email body of the quarantine summary in HTML code. |
|
|
Enter the replacement message for the |
|
|
Enter the replacement message for the email body of the quarantine summary in text format. |
|
domain-info
Use this sub-command to configure customer account information.
Syntax
This sub-command is available from within the command domain.
config domain-info
set account-limit <integer>
set comment <string>
set customer-email <string>
set customer-name <string>
end
Variable |
Description |
Default |
account-limit <integer> | Enter the user account limit (0 means no limit). |
0 |
comment <string> | Optionally, enter a description. |
|
customer-email <string> | Enter the customer email address. |
|
customer-name <string> | Enter the customer name. |
|
domain-setting
Use this sub-command to configure the basic settings of a protected domain.
Syntax
This sub-command is available from within the object domain.
config domain-setting
[set comment "<comment_str>"]
set addressbook {domain | none | system}
set bypass-bounce-verification {enable | disable}
set disclaimer-status {disabled | use-domain-setting | use-system-setting}
set dmarc-report-analysis-status {enable | disable | use-system-setting}
set dmarc-report-analysis-rua-address-mode {auto-discover | manual}
set dmarc-report-analysis-rua-address <recipient_email>
set dmarc-report-generation-status {enable | disable | monitor-only | use-system-setting}
set dmarc-report-generation-from-addr-localpart <localpart_str>
set email-continuity-status {enable | disable}
set fallback-host {<smtp-server_fqdn> | <smtp-server_ipv4>}
set fallback-use-smtps {enable | disable}
set global-bayesian {enable | disable}
set greeting-with-host-name {domainname | hostname | othername}
set host <host_name>
set ip-pool-direction {outgoing | incoming | both}
set is-sub-domain {enable | disable}
set ldap-asav-profile <ldap-profile_name>
set ldap-asav-status {enable | disable}
set ldap-domain-routing-port <port_int>
set ldap-domain-routing-profile <ldap-profile_name>
set ldap-domain-routing-smtps {enable |disable}
set ldap-groupowner-profile <ldap-profile_name>
set ldap-routing-profile <ldap-profile_name>
set ldap-routing-status {enable | disable}
set ldap-user-profile <profile_name>
set max-message-size <limit_int>
set other-helo-greeting <hostname_str>
set quarantine-report-schedule-status {enable | disable}
set quarantine-report-status {enable | disable}
set quarantine-report-to-alt {enable | disable}
set quarantine-report-to-alt-addr <recipient_email>
set quarantine-report-to-individual {enable | disable}
set quarantine-report-to-ldap-groupowner {enable | disable}
set recipient-retention-period <days_int>
set recipient-verification {disable | ldap | smtp}
set recipient-verification-background {disable | ldap | purge-inactive | smtp}
set recipient-verification-background-profile <ldap-profile_name>
set recipient-verification-invalid-user-action {reject | discard}
set relay-type {host | ip-pool | ldap-domain-routing | mx-lookup | mx-lookup-alt-domain}
set remove-outgoing-received-header {enable | disable}
set sender-addr-rate-ctrl-action
set sender-addr-rate-ctrl-max-msgs <messages_int>
set sender-addr-rate-ctrl-max-msgs-state {enable | disable}
set sender-addr-rate-ctrl-max-recipients
set sender-addr-rate-ctrl-max-recipients-state {enable | disable}
set sender-addr-rate-ctrl-max-size <size_int>
set sender-addr-rate-ctrl-max-size-state {enable | disable}
set sender-addr-rate-ctrl-max-spam
set sender-addr-rate-ctrl-max-spam-state {enable | disable}
set sender-addr-rate-ctrl-state {enable | disable}
set sender-addr-rate-notification-state {enable | disable}
config sender-addr-rate-ctrl-exempt
edit <id>
set sender-pattern <string>
set pattern-type {default | regexp}
end
set smtp-recipient-verification-command {rcpt | vrfy}
set smtp-recipient-verification-accept-reply-string <accept_str>
set sso-status {enable | disable}
set sso-profile <profile_name>
set tp-server-on-port <port_int>
set tp-use-domain-mta {yes | no}
set use-stmps {enable | disable}
set webmail-language <language_name>
set webmail-theme {Blue | Dark | Green | Light-Blue | Neutrino | Red | Use-system-setting}
end
Variable |
Description |
Default |
||
Select whether to add newly created email users to the system address book, domain address book, or none. This setting is available only if operation-mode {gateway | server | transparent} is |
domain |
|||
Enable to omit bounce address tag verification of email incoming to this protected domain. This bypass does not omit bounce address tagging of outgoing email. |
disable |
|||
Enter a description or comment. |
|
|||
disclaimer-status {disabled | use-domain-setting | use-system-setting} |
Select whether to use the system-wide disclaimer message (see system disclaimer-message), a disclaimer message specific to this protected domain, or to disable the disclaimer message for this protected domain. Also configure customized-message. |
use-system-setting |
||
Enter the disk quota in gigabytes (GB). If the disk quota reaches 90% threshold, a warning email is sent to the domain customer email. If the maximum disk quota of this domain is exceeded, users of this domain will no longer receive any new email. Note: This option is only available in server mode. |
|
|||
Enter the recipient email address where FortiMail will send the DMARC report. This setting applies only if dmarc-report-analysis-rua-address-mode {auto-discover | manual} is |
|
|||
dmarc-report-analysis-rua-address-mode {auto-discover | manual} |
Select either:
|
auto-discover |
||
dmarc-report-analysis-status {enable | disable | use-system-setting} |
Select either:
|
disable |
||
dmarc-failure-action {use-policy-action | use-profile-action | use-profile-action-with-none | use-system-setting} |
Select either:
|
use-system |
||
dmarc-report-generation-status {enable | disable | monitor-only | use-system-setting} |
Select either:
|
use-system-setting |
||
Enter the local part of the sender email address when FortiMail sends reports about DMARC checks to that domain name. |
noreply |
|||
Enter the fully qualified domain name (FQDN) or IP address of the secondary SMTP server for this protected domain. This SMTP server will be used if the primary SMTP server is unreachable. Note: This setting is not available in server mode. |
|
|||
Enter the port number on which the failover SMTP server listens. If you enable Use SMTPS, Port automatically changes to the default port number for SMTPS, but can still be customized. The default SMTP port number is 25; the default SMTPS port number is 465. Note: This setting is not available in server mode. |
25 |
|||
Enable to use SMTPS for connections originating from or destined for this protected server. Note: This setting is not available in server mode. |
disable |
|||
Enable to use the global Bayesian database instead of the Bayesian database for this protected domain. If you do not need the Bayesian database to be specific to the protected domain, you may want to use the global Bayesian database instead in order to simplify database maintenance and training. Disable to use the per-domain Bayesian database. This option does not apply if you have enabled use of personal Bayesian databases in an incoming antispam profile, and if the personal Bayesian database is mature. Instead, the FortiMail unit will use the personal Bayesian database. |
disable |
|||
Select how the FortiMail unit will identify itself during the
|
hostname |
|||
Enter the host name or IP address and port number of the mail exchanger (MX) for this protected domain. If Note: This setting is not available in server mode. |
|
|||
You can use a pool of IP addresses as the source IP address when sending email from this domain, or as the destination IP address when receiving email destined to this domain, or as both the source and destination IP addresses. If you want to use the IP pool as the source IP address for this protected domain, according to the sender’s email address in the envelope ( If you want to use the IP pool as the destination IP address (virtual host) for this protected domain, according to the recipient’s email address in the envelope ( If you want to use the IP pool as both the destination and source IP address, select the IP pool to use and select Each email that the FortiMail unit sends will use the next IP address in the range. When the last IP address in the range is used, the next email will use the first IP address. |
|
|||
Select the direction of SMTP traffic to use an IP pool for. This setting is only available after you configure |
|
|||
Enable to indicate the protected domain you are creating is a subdomain of an existing protected domain, then also configure Main domain. Subdomains, like their parent protected domains, can be selected when configuring policies specific to that subdomain. Unlike top-level protected domains, however, subdomains will be displayed as grouped under the parent protected domain when viewing the list of protected domains. This option is available only when another protected domain exists to select as the parent domain. |
disable |
|||
Enter the name of an LDAP profile which you have enabled and configured. |
|
|||
Enable to query an LDAP server for an email user’s preferences to enable or disable antispam and/or antivirus processing for email messages destined for them. |
disable |
|||
Enter the port number on which the SMTP servers in the LDAP profile listen. If you enable The default SMTP port number is 25; the default SMTPS port number is 465. This option is valid when relay-type {host | ip-pool | ldap-domain-routing | mx-lookup | mx-lookup-alt-domain} is |
25 |
|||
Select the name of the LDAP profile that has the FQDN or IP address of the SMTP server you want to query. Also configure ldap-domain-routing-port <port_int> and ldap-domain-routing-smtps {enable |disable}. This setting is valid when relay-type {host | ip-pool | ldap-domain-routing | mx-lookup | mx-lookup-alt-domain} is |
|
|||
Enable to use SMTPS for connections originating from or destined for this protected server. This option is valid when |
disable |
|||
Select an LDAP profile to send the quarantine report to a group owner, rather than individual recipients. |
|
|||
Select an LDAP profile for mail routing. |
|
|||
Enable or disable mail routing according to query results from the LDAP profile. |
disable |
|||
Select the name of an LDAP profile in which you have configured, enabling you to authenticate email users and expand alias email addresses or replace one email address with another by using an LDAP query to retrieve alias members. |
|
|||
Enable then type the limit in kilobytes (KB) of the message size. Email messages over the threshold size are rejected. Note: If both this setting and its equivalent setting in the session profile are enabled, then email size will be limited to whichever size is smaller. |
204800 |
|||
After you set greeting-with-host-name {domainname | hostname | othername} to Note: This setting is not available in server mode. |
|
|||
Enter the SMTP port number of the mail server. Note: This setting is not available in server mode. |
25 |
|||
Enable or disable domain-level quarantine report schedule setting. The quarantine report settings for a protected domain are a subset of the system-wide quarantine report settings. For example, if the system settings for schedule include only Monday and Thursday, when you are setting the schedule for the quarantine reports of the protected domain, you will only be able to select either Monday or Thursday. |
disable |
|||
Enable or disable domain-level quarantine report. |
disable |
|||
Enable or disable sending domain-level quarantine report to a recipient other than the individual recipients or group owner. For example, you might delegate quarantine reports by sending them to an administrator whose email address is not locally deliverable to the protected domain, such as |
disable |
|||
Enter the email address that will receive the quarantine report. |
|
|||
Enable to send quarantine reports to the same email address as the original email's recipient. |
enable |
|||
Enable to send quarantine reports to the LDAP group owner, as determined by query results from the specified LDAP profile. |
disable |
|||
Enter the retention period in days for inactive user accounts. Valid values are 15-180. If an account has been inactive for more than the designated period, the account is purged. |
60 |
|||
Select a method of confirming that the recipient email address in the message envelope (
Note: This option can cause a performance impact that may be noticeable during peak traffic times. For a lesser performance impact, you can alternatively periodically automatically remove quarantined email messages for invalid email user accounts, rather than actively preventing them during each email message. Note: Spam often contains invalid recipient addresses. If you have enabled spam quarantining, but have not prevented or scheduled the periodic removal of quarantined email messages for invalid email accounts, the FortiMail hard disk may be rapidly consumed during peak traffic times, resulting in refused SMTP connections when the hard disk becomes full. To prevent this, enable either this option or the periodic removal of invalid quarantine accounts. |
disable |
|||
recipient-verification-background {disable | ldap | purge-inactive | smtp} |
Select a method by which to periodically remove quarantined spam for which an email user account does not actually exist on the protected email server.
Note: If you have also enabled Note: Spam often contains invalid recipient addresses. If you have enabled spam quarantining, but have not prevented or scheduled the periodic removal of quarantined email messages for invalid email accounts, the FortiMail hard disk may be rapidly consumed during peak traffic times, resulting in refused SMTP connections when the hard disk becomes full. To prevent this, enable either this option or verification of recipient addresses. |
|
||
recipient-verification-background-profile <ldap-profile_name> |
Enter the LDAP profile used to query the LDAP server to verify that the recipient address is an email user account that actually exists. Note: This setting is not available for server mode. |
|
||
recipient-verification-invalid-user-action {reject | discard} |
Select which action to take if the recipient is not valid. Note: This setting is not available for server mode. |
reject |
||
relay-type {host | ip-pool | ldap-domain-routing | mx-lookup | mx-lookup-alt-domain} |
Select from one of the following methods of defining which SMTP server will receive email from the FortiMail unit that is destined for the protected domain:
Note: If an MX option is used, you may also be required to configure the FortiMail unit to use a private DNS server whose MX and/or A records differ from that of a public DNS server. Requirements vary by the topology of your network and by the operating mode of the FortiMail unit.
Note: This setting is not available in server mode. |
host |
||
Enable to remove all
Alternatively, you can remove this header from any matching email using session profiles. See remove-received-headers {enable | disable}. |
disable |
|||
Enter the maximum number of messages per sender address per half an hour. |
30 |
|||
Enable the option of maximum number of messages per sender address per half an hour. |
disable |
|||
Enter the maximum number of megabytes per sender per half an hour. |
100 |
|||
Enable the option of maximum number of megabytes (MB) per sender per half an hour. |
disable |
|||
Enable sender address rate control per sender email address. |
disable |
|||
Specify the command that the FortiMail unit uses to query the SMTP server to verify that the recipient address is an email user account that actually exists. The default command that the FortiMail unit uses is This option is only available after you set recipient-verification {disable | ldap | smtp} to |
rcpt |
|||
smtp-recipient-verification-accept-reply-string <accept_str> |
When FortiMail queries the SMTP server for recipient verification: If the reply code of the If the reply code is not 2xx, then FortiMail will try to match the accept string you specified with the reply string. If the strings match, the recipient exists. Otherwise, the recipient is unknown. For example, if the recipient is a group or mailing list, FortiMail will receive a 550 error code and a reply string. Depending on what reply string you get, you can specify a string to match the reply string. For example, if the recipient is marketing@example.com, the reply string might say something like “marketing@example.com is a group”. In this case, if you specify “is a group” as the accept string and thus this string matches the string or part of the string in the reply string, FortiMail will deem the query successful and pass the email. This command is available only when you set Note: This setting is not available in server mode. |
|
||
Enable for users in the protected domain to be able to log in via the authentication server defined in a single sign-on (SSO) profile.
|
disable |
|||
Enter the name of an SSO profile to use. |
|
|||
Enable to preserve the IP address or domain name of the SMTP client for incoming email messages in the:
This masks the existence of the FortiMail unit to the protected SMTP server. Disable to replace the SMTP client’s IP address or domain name with that of the FortiMail unit. For example, an external SMTP client might have the IP address 172.168.1.1, and the FortiMail unit might have the domain name fortimail.example.com. If the option is enabled, the message header would contain (difference highlighted in bold): Received: from 192.168.1.1 (EHLO 172.16.1.1) (192.168.1.1) by smtp.external.example.com with SMTP; Fri, 24 Jul 2008 07:12:40 -0800 Received: from smtpa ([172.16.1.2]) by [172.16.1.1] with SMTP id kAOFESEN001901 for <user1@external.example.com>; Fri, 24 Jul 2008 15:14:28 GMT But if the option is disabled, the message headers would contain: Received: from 192.168.1.1 (EHLO fortimail.example.com) (192.168.1.1) by smtp.external.example.com with SMTP; Fri, 24 Jul 2008 07:17:45 -0800 Received: from smtpa ([172.16.1.2]) by fortimail.example.com with SMTP id kAOFJl4j002011 for <user1@external.example.com>; Fri, 24 Jul 2008 15:19:47 GMT Note: This option does not apply to email messages sent from protected domains to protected domains, meaning that the FortiMail unit will not be hidden even if this option is enabled. Note: This setting is only available in transparent mode. |
no |
|||
Select the network interface (physical port) to which the protected SMTP server is connected. Note: Selecting the wrong network interface will result in the FortiMail sending email traffic to the wrong network interface. Note: This setting is only available in transparent mode. |
0 |
|||
Enable to proxy SMTP clients’ incoming connections when sending outgoing email messages via the protected SMTP server. Note: This option is only available in transparent mode. For example, if the protected domain example.com has the SMTP server 192.168.1.1, and an SMTP client for user1@example.com connects to it to send email to user2@external.example.net, enabling this option would cause the FortiMail unit to proxy the connection through to the protected SMTP server. Disable to relay email using the built-in MTA to either the defined SMTP relay, if any, or directly to the MTA that is the mail exchanger (MX) for the recipient email address’s ( This option does not affect incoming connections containing incoming email messages, which will always be handled by the built-in MTA. Note: This setting will be ignored for email that matches an antispam or content profile where you have enabled alternate-host {<relay_fqdn> | <relay_ipv4>}. |
no |
|||
Enable to use SMTPS to relay email to the mail server. Note: This setting is not available in server mode. |
disable |
|||
Select the language that the FortiMail unit will to display webmail and quarantine folder in the GUI for users. By default, the FortiMail unit uses the same language as the GUI for administrators. |
|
|||
webmail-theme {Blue | Dark | Green | Light-Blue | Neutrino | Red | Use-system-setting} |
Select a default color theme for the webmail and quarantine GUI after users log in. Alternatively, you can set this default for all protected domains (webmail-theme {Blue | Dark | Green | Light-Blue | Neutrino | Red}). If webmail-theme-status {enable | disable} is |
Use-system-setting |
config policy recipient
Use this sub-command to configure a recipient-based policy for a protected domain. To configure system-wide policies, see policy recipient instead.
Syntax
This sub-command is available from within the command domain.
config policy recipient
edit <policy_index>
set auth-access-options {pop3 smtp‑auth smtp‑diff-identity web}
set certificate-required {yes | no}
set comment
set direction
set pkiauth {enable | disable}
set profile-antispam <antispam_name>
set profile-antivirus <antivirus_name>
set profile-auth-type {imap | local | ldap | pop3 | smtp | radius}
set profile-content <profile_name>
set profile-dlp
set profile-resource <profile_name>
set profile-ldap <profile_name>
set recipient-type {ldap-group | local-group | user}
set sender-domain <domain_name>
set sender-name <local-part_str>
set sender-type {ldap‑group | local-group | user}
set smtp-diff-identity-ldap-profile
next
end
Variable |
Description |
Default |
Type the index number of the policy. To view a list of existing entries, enter a question mark ( |
|
|
Type one or more of the following:
|
|
|
certificate-required {yes | no} (transparent and gateway mode only) |
If the email user’s web browser does not provide a valid personal certificate, the FortiMail unit will fall back to standard user name and password-style authentication. To require valid certificates only and disallow password-style fallback, enable this option. |
no |
Enter a comment for the recipient policy |
|
|
Enter whether the direction of mail traffic is incoming or outgoing. |
|
|
(transparent and gateway mode only) |
Enable if you want to allow email users to log in to their per-recipient spam quarantine by presenting a certificate rather than a user name and password. |
disable |
(transparent and gateway mode only) |
Enter the name of the PKI user entry, or select a user you defined before. This is not required to be the same as the administrator or email user’s account name, although you may find it helpful to do so. For example, you might have an administrator account named |
|
Select a antispam profile that you want to apply to the policy. |
|
|
Select an antivirus profile that you want to apply to the policy. |
|
|
profile-auth-type {imap | local | ldap | pop3 | smtp | radius} |
If you want email users to be able to authenticate using an external authentication server, first specify the profile type (SMTP, POP3, IMAP,RADIUS, or LDAP), then specify which profile to use. For example:
|
|
profile-auth-imap <imap_name> |
Type the name of an IMAP authentication profile. This command is applicable only if you have enabled use of an IMAP authentication profile using profile-auth-type {imap | local | ldap | pop3 | smtp | radius}. |
|
profile-auth-ldap <ldap_name> |
Type the name of an LDAP authentication profile. This command is applicable only if you have enabled use of an LDAP authentication profile using profile-auth-type {imap | local | ldap | pop3 | smtp | radius}. |
|
profile-auth-pop3 <pop3_name> |
Type the name of a POP3 authentication profile. This command is applicable only if you have enabled use of a POP3 authentication profile using profile-auth-type {imap | local | ldap | pop3 | smtp | radius}. |
|
profile-auth-smtp <smtp_name> |
Type the name of an SMTP authentication profile. This command is applicable only if you have enabled use of an SMTP authentication profile using profile-auth-type {imap | local | ldap | pop3 | smtp | radius}. |
|
profile-auth-radius <radius_name> |
Type the name of a RADIUS authentication profile. This command is applicable only if you have enabled use of a RADIUS authentication profile using profile-auth-type {imap | local | ldap | pop3 | smtp | radius}. |
|
Select which content profile you want to apply to the policy. |
|
|
Enter the DLP profile for the policy. |
|
|
Select which resource profile you want to apply to the policy. This option is only available in server mode. |
|
|
If you set the recipient type as “ldap-group", you can select an LDAP profile. |
|
|
Enter the domain part of the recipient email address. |
|
|
Enter the local part of the recipient email address or a pattern with wild cards. |
|
|
Select one of the following ways to define recipient ( user: Select this option and then use the above command to enter the local part of the recipient email address. local-group: Select this option and then specify the local group under this domain. ldap-group: Select this option and then select an LDAP profile. |
user |
|
Enter the domain part of the sender email address. For example, example.com. |
|
|
Enter the local part of the sender email address. For example, user1. |
|
|
Select one of the following ways to define which sender user: Select this option and then use the above command to enter the local part of the sender email address. local-group: Select this option and then specify the local group under this domain. ldap-group: Select this option and then select an LDAP profile. Note: This setting applies to the outgoing policies only. |
user |
|
Rejects different smtp sender identity. |
|
|
smtp-diff-identity-ldap |
Verify smtp sender identity with LDAP for authenticated email. |
|
LDAP profile for SMTP sender identity verification. |
|
|
Enable or disable the policy. |
enable |
profile user-import
Use this command to configure account synchronization settings for remote users from LDAP and Microsoft 365 servers.
Syntax
This sub-command is available from within the command domain.
config profile user-import
edit <profile_name>
set base-dn <string>
set bind-dn <string>
set group-display-name <string>
set group-primary-address <string>
set group-secondary-address <string>
set ldap-secure {enable | disable}
set ldap-version {ver2 | ver3}
set ms365-application-id <string>
set ms365-application-secret <password>
set ms365-tenant-id <password>
set recurrence {daily | monthly | none | weekly}
set referrals-chase {enable | disable}
set user-display-name <string>
set user-primary-address <string>
set user-secondary-address <string>
next
end
Variable |
Description |
Default |
Enter the distinguished name (DN) of the part of the LDAP directory tree within which the FortiMail unit will search for user objects, such as User objects should be child nodes of this location. |
|
|
Enter the bind DN, such as |
|
|
Enter the password of |
|
|
Enter a description. |
|
|
Enter the LDAP group/mailing list display name attribute. |
|
|
Enter the LDAP group/mailing list primary email address attribute. |
|
|
Enter the LDAP group/mailinglistquery string. |
|
|
Enter the LDAP group/mailing list secondary email address attribute. |
|
|
Enter the TCP port number of the LDAP server. The standard port number for LDAP is 389. The standard port number for SSL-secured LDAP is 636. |
389 |
|
Enable or disable (by default) a secure encrypted connection to the LDAP server. |
disable |
|
Enter the fully qualified domain name (FQDN) or IP address of the LDAP server. |
|
|
Enter the LDAP server protocol version. |
ver3 |
|
Enter the Microsoft 365 application ID. |
|
|
Enter the Microsoft 365 application secret. |
|
|
Enter the Microsoft 365 tenant ID. |
|
|
Define the recurrence/schedule of the remote server synchronization. |
none |
|
Enable or disable (by default) chasing of referrals. |
disable |
|
Enter the hour of the day at which synchronization will occur. Set the value between 0-23. |
1 |
|
Define the search scope of the LDAP server; either base, one level, or subtree (by default). |
sub |
|
Enter the query timeout limit in seconds. Valid range is from 60 to 600. |
60 |
|
Enter the remote server profile type. |
ldap |
|
Enter the LDAP user's display name attribute. |
|
|
Enter the LDAP user's primary email address attribute. |
|
|
Enter the LDAP query string to get all users. |
|
|
Enter the LDAP user's secondary email address attribute. |
config user mail
Use this sub-command to configure email user accounts.
Syntax
This sub-command is available from within the command domain.
config user mail
rename <old-user_name> to <new-user_name>
edit <user_name>
next
end
Variable |
Description |
Default |
The existing user account that you want to rename. |
|
|
The new name for the user account. |
|
|
Enter the user name of an email user, such as |
|
|
Select whether to authenticate the user via a remote authentication server, or user accounts defined locally on FortiMail. |
ldap |
|
Enter the display name of the local email user, such as |
|
|
Enter the password of the local email user. This setting is used only if type {ldap | ms365} is |
|
|
Enter the name of an LDAP profile in which authentication queries are enabled. This setting is used only if type {ldap | ms365} is |
|
If you rename an existing user account to a new user account name, all the user’s preferences and mail data will be ported to the new user. However, due to the account name change, the new user will not be able to decrypt and read the encrypted email that is sent to the old user name before. |