Knowledge base

1000 FAQs, 500 tutorials and instructional videos. Here, there are only solutions!

Manage users & email passwords

This guide presents the security model that allows you to assign users to an email address or dedicate a password for each device or software that needs to access it.

 

Preamble

  • This model enhances security by isolating access to an email address per user and per device.
  • You can create multiple passwords for the same email address without interrupting existing connections.
  • Each password can be revoked individually, without affecting other users or devices linked to this address.
  • A password is never displayed again after its creation; modify it or create a new one if necessary.

 

Gain freedom and security with personalized access

Forget the days when a single, fragile password protected your mailbox. Previously, changing your code was a hassle: you had to update it on all your devices at the risk of locking yourself out.

Now, you have distinct digital keys for each use. It's simpler and much safer:

  • Device independence: if you change your phone, you only modify the access of that mobile; your other installations remain connected without interruption.
  • Targeted security: in case of loss of a device, you only revoke its specific password without affecting others.
  • Total control: you keep control over who accesses what, without having to reveal your main password.

To do this:

  1. When creating an email address, no password is defined (as using the address on Infomaniak Mail apps does not require a password other than the one that already allows you to access your Infomaniak account).
  2. From the Mail Service, you then simply create specific passwords for each device (Outlook, iPhone, CRM, etc.) as needed.
  3. From the Mail Service, you add the address to your Infomaniak Mail apps or decide which external user should access the email address.
  4. When access is no longer needed, always from your Mail Service, revoke the concerned password or remove the user's access: other accesses to the email address remain active.

Has this FAQ been helpful?