Solved

How can I enable mail signatures on Zimbra?

Posted on 2010-11-16
4
1,256 Views
Last Modified: 2012-06-27
I have to enable mail signatures on Zimbra Open Source 6.0 for the users can choice their own signature. But I don't need system wide signatures. I've already typed this command with zimbra user and didn't work:

 zmprov mc default zimbraFeatureSignaturesEnabled TRUE

Thanks
0
Comment
Question by:rcainfo
  • 2
  • 2
4 Comments
 
LVL 7

Expert Comment

by:Hatrix76
ID: 34153209
Check if the COS allows user signatures. If you only want it for a subset of your users/domains, you can create a new COS, allow it there, and assign this COS to the users/domains you want.

best
Ray
0
 

Author Comment

by:rcainfo
ID: 34153708
I checked the default COS, I found only maximum signature size setting at preferences tab, in sending e-mail section. I didn't see any other related signature option.

I'm newbie in Zimbra. Could you write step-by-step instructions?

Thanks,
Rafa

0
 
LVL 7

Accepted Solution

by:
Hatrix76 earned 350 total points
ID: 34153865
Wait, you are talking about normal signatures, e.g. like mine at the end of an email:

-
RunSolutions
     Open Source It Consulting
-
Email: rs@runsolutions.com

Parc Bit - Centro Empresarial Son Espanyol
Edificio Estel - Local 3D
07121 -  Palma de Mallorca
Baleares


If I go in my zimbra web mailer to "Preferences" I have in the left pane the "Mail"Option, and under the "Mail" Option is a "Signatures" option.

Do you see this in the preferences of your costumers?


0
 

Author Closing Comment

by:rcainfo
ID: 34154448
Yes I'm talking about normal signatures. And found how to set it up! I didn't know that users "Preferences"  has diferent contexts. I've already done Zimbra authenticates against the Active Directory over ssl and I lose this easy "signature" match. :-)

Thanks,
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

In this tutorial I will explain how to make squid prevent malwares in five easy steps: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-…
Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now