First Steps for Administrators

First Steps for GnuPG (VS-)Desktop Administrators and Managers

Installation and Configuration

  • Installation can be performed centrally. The download links also include an MSI installer.
  • The installation guide and available registry settings provide detailed information on setup. Additionally, the FAQ for Administrators may be helpful.
  • The Outlook add-in GpgOL is not compatible with certain other add-ins, particularly many antivirus add-ins. A list of incompatible add-ins is available here.

Setting Up Infrastructure for Larger Deployments

  • For organizations with around ten users, setting up a suitable infrastructure can be beneficial. For 25 or more users, it is recommended.
  • An LDAP server simplifies the distribution of certificates (public keys).
  • The GnuPG actium tool automates the authentication process via a directory service.
  • With WKD (Web Key Directory), certificates can be made publicly accessible via a website.
  • These services do not require additional licenses.
  • Further details can be found in the whitepaper Certificate Management with GnuPG VS-Desktop®.

Managing GnuPG VS-Desktop in Your Organization

Requirements for the VSD Version

If you handle "Classified Information – For Official Use Only" (VS-NfD), please familiarize yourself with the applicable regulations, such as:

Documents related to the approval and release of GnuPG VS-Desktop, as well as the approval manual, are linked in the Help menu of Kleopatra.

Appoint a Responsible Person for GnuPG

Designate a person responsible for GnuPG VS-Desktop. This individual should be familiar with relevant topics and serve as a point of contact for questions and communication with us.

Create an Operational Framework

Work with your data protection or classified information officer to define how GnuPG VS-Desktop will be used within your organization.

Create Documentation

Internally document how GnuPG VS-Desktop is used in your environment. This documentation is not only helpful for users but may also serve as part of the required evidence for technical and organizational measures (TOMs) under the GDPR.