How to receive emails

How to receive emails

Emails that are sent via idgard are loaded into the selected idgard Box.

Recipients receive an email with a link to the Box which contains the email contents. If the idgard email is protected with a pass code, recipients receive this pass code via a separate communication channel. When opening the link to the idgard Box, recipients must enter this pass code.

If the idgard email was loaded into a Data Room, recipients receive an email with a link to the folder that contains the email contents. In order to be able to access these, the share link recipients must be members of the Data Room and must have read permission.

 

Access to idgard

The following screenshot shows you the idgard login page that is displayed in the browser when the link is opened:





Recipients have the following options to access idgard:

●    Recipients have an idgard user account and use their login details to log in via the Access with your own idgard account dialog.

●    Recipients do not have an idgard license, are granted read permission, and log in via the Access without idgard account dialog.

 

Emails that are in a Data Room can only be accessed by recipients as follows:

●    Recipients have a full idgard license and the Access with your own idgard account dialog is displayed. Recipients must be members of the Data Room in order to be able to access email contents.

●    Recipients do not have an idgard license and the Enable One Time Access function is activated for the Data Room. Login takes place via the Access without idgard account dialog.

 

Please note:

When emails are sent via a Box that can be accessed by multiple users, all users can view the email contents.

Therefore, we recommend to use a separate Box for each communication circle or to manage different communication circles via a Data Room with extended rights management.

    • Recent Articles

    • How can I launch the idgard add-in in my organization?

      If access to the Microsoft App Store is restricted in your organization, you may have to ask your IT admin to approve the app. If you are using Exchange Server without Microsoft 365, you can launch the add-in in your organization. Microsoft offers ...
    • Enterprise settings

      Specifications for the layout of the idgard add-in or the creation of idgard emails can be defined in the enterprise settings of the idgard web application. These settings are made by the administrator and apply to all idgard users within the ...
    • Reporting illegal content

      The Digital Services Act (DSA) is an important tool for reporting problematic or harmful content in the digital space. It allows users to report potential violations of the DSA, helping to create a safer and more responsible online environment. Here ...
    • Data room archive

      In some professions it is necessary to archive documents. For this purpose, you can create a data room archive with idgard. This data room is available forever after conversion into an archive and thus secures all documents in this data room. This is ...
    • Delete multiple users at the same time

      In the user administration, you can delete multiple user accounts at the same time using batch actions. Which users you can delete depends on your own permissions and on the permissions of the users whose user accounts you would like to delete. To ...
    • Related Articles

    • How to send emails via idgard

      Function The idgard add-in for Outlook allows you to use idgard technology to send emails and attachments. The email contents sent via idgard are loaded into an idgard Box. The recipient receives an email with a link that provides access to this Box. ...
    • Target group

      These Brief instructions are designed for users who use both Microsoft Outlook and idgard and would like to use the idgard add-in to send emails.
    • What is idgard for MS Outlook?

      The idgard app enables secure collaboration with external parties. The idgard add-in for Microsoft Outlook allows you to: ● send emails via idgard ● send attachments that exceed the attachment limit in Microsoft Outlook via idgard With the idgard ...
    • Enterprise settings

      Specifications for the layout of the idgard add-in or the creation of idgard emails can be defined in the enterprise settings of the idgard web application. These settings are made by the administrator and apply to all idgard users within the ...
    • How to log out of the idgard add-in

      You can send multiple emails via idgard in the same session without having to log in again. If you no longer need the idgard add-in, you can log out of it. To log out of the idgard add-in proceed as follows: 1. In the idgard window on the right-hand ...
    • Popular Articles

    • Folder upload - behaviors and limitations

      Unsupported characters in file names will be replaced by an underscore during the upload process, this applies to these characters: *, /, \, ?, :, <, >, ^, ", &, | Example: M&A_Overview.xlsx will be renamed to: M_A_Overview.xlsx File names that ...
    • Uploading files

      Uploading files You can upload one or more files up to a size of 5 GB. For a fee, we can increase the size limit of 5 GB for you. You can only upload files with the "Write" permission. There are two methods with which you can upload files to a box. ...
    • View box activities in the journal

      In data rooms and depending on the setting, certain activities can be registered in a journal. You can view the data room journal if you have the permission to do so. To view box activities in the journal: 1. Open the data room the journal of which ...
    • Welcome to the idgard® online help

      Welcome to the idgard® online help This online help is the main source of information for learning and working with idgard®. Click on one of the following links to obtain further information about idgard®. To use the online help: Search article Enter ...
    • Isn't encryption on the device the best bet for a safe cloud?

      Isn't encryption on the device the best bet for a safe cloud? The term „cloud computing“ encompasses two aspects: Data storage in a cloud for one’s self, excluding multiple or third-party access. Data processing or storage of information in a cloud, ...