Installation manual Zivver OWA add-in

Introduction

Use the Zivver Outlook Web Access Add-in to securely send and receive messages directly from Outlook Web Access (OWA). This manual describes how to install the add-in in Exchange Online, which is part of Microsoft Office 365. The Zivver OWA add-in is available for Exchange Online only.

Info
As of OWA add-in version 6, Zivver uses a new versioning method, consistent with our other integrations. Therefore, you will see version numbers like 3.xxx.x instead of 6.x.

Technical requirements

You can install the Zivver OWA add-in in Exchange Online. To use the OWA add-in, you must meet the following requirements:

  • Use Exchange Online.
  • The users’ workstations (Windows or Mac) have the latest General Availability (GA) or Stable version of one of these modern browsers installed:
    • Microsoft Edge based on Chromium (recommended)
    • Google Chrome / Chromium (for Android/iOS) (recommended)
    • Mozilla Firefox
    • Apple Safari (for iOS)
  • Allow cookies in the browser for the exact URLs listed below. Read more about CookiesAllowedForUrls in Edge (this setting is identical in Chrome):
    • [*.]office.com
    • [*.]office365.com
    • [*.]zivver.com
      The Zivver add-in stores the active session of a user in LocalStorage. Blocking cookies for these domains will cause users to log in after every page refresh.
  • Allow pop-ups in the browser for the exact URLs listed below. Read more about PopupsAllowedForUrls in Edge (this setting is identical in Chrome):
    • [*.]office.com
    • [*.]office365.com
    • [*.]zivver.com
      The Zivver add-in uses pop-ups to log users in. Blocking pop-ups for these domains will prevent users from being able to log in to Zivver.
  • The Exchange policy that prevents downloading attachments in the user’s Outlook environment must be disabled (this is the default setting).
  • An Entra ID admin account with Global Administrator privileges.
  • A Zivver administrator account.

Installation

You can install the Zivver OWA add-in via the Microsoft 365 admin center or using PowerShell. Both methods are explained in this manual.

Deploy and configure the Zivver OWA add-in via the Microsoft 365 admin center

  1. Log in to the Microsoft 365 admin center.
  2. Click add Deploy Add-In.
  3. Click Next.
  4. Select Upload custom apps under Deploy a custom add-in.
  5. Enter https://owa-v6.zivver.com/manifest.xml as the URL of the OWA Add-in manifest file.
    Info
    Make sure to include https://, even though this is already mentioned in the user interface.
  6. Click Upload.
    The Configure add-in screen appears.
  7. Choose which users will be assigned the Zivver OWA add-in:
    • Everyone
      All users in your organization can use the add-in. Select this to roll out the add-in to your entire organization, for example when going live with Zivver.
    • Specific users / groups
      Only specific users or groups can use the add-in. Select this for a pilot or if only some users use OWA.
    • Note
      Microsoft does not support assigning add-ins to nested groups. Read more about this in their documentation.
    • Just me
      Only makes the add-in available for your own admin account. Select this option if you want to test the add-in yourself.
  8. Select how the add-in will be deployed to users:
    • Fixed (Default)
      Recommended. The add-in is enabled by default for assigned users and cannot be disabled by them.
    • Available
      Not recommended. The add-in is disabled by default, but assigned users can enable it themselves.
    • Optional
      The add-in is enabled by default, but assigned users can choose to disable it.
  9. Click Deploy.
  10. Review the Microsoft notice and click Next.
  11. Click Close.
    The Zivver OWA add-in is now installed and configured for your Microsoft 365 organization. It may take up to 24 hours for the change to take effect in Exchange Online. See Microsoft's documentation for more information.
  12. Continue with the steps to give admin consent.

The Zivver OWA add-in requires admin consent for your organization to work seamlessly with the Microsoft Graph API.

Prerequisites

  • A user mailbox with the Zivver OWA add-in deployed
    This mailbox must have a Zivver account. This mailbox does not need admin privileges.
  • Global administrator credentials must be available when following the steps below
    Either from the same user mailbox or a separate admin account.
Tip
Always select Consent on behalf of your organization.
  1. Open outlook.office.com and sign in with the user mailbox that has the Zivver OWA add-in deployed.
  2. Launch the Zivver OWA add-in by starting a new draft email and clicking the Zivver icon, or go to Apps in the top ribbon and select Zivver.
    This should start the login process, opening a flyout from login.microsoftonline.com.
  3. If you’re logged in with an administrator account, select Consent on behalf of your organization and click Accept.
    Tip
    If you’re using a user mailbox without administrator privileges, click Have an admin account? Sign in with that account. After logging in with an admin account, you can then select Consent on behalf of your organization and click Accept.
  4. Continue with the required additional settings
Warning
If you forget to select Consent on behalf of your organization, you won’t get another chance. You must repeat these steps using a different administrator account.

Create an Exchange rule for Zivver messages

This rule must be set up to prevent OWA from sending a Zivver message as unencrypted, regular email.

Warning
If you do not configure this rule, every recipient will receive both the encrypted Zivver message and a secondary placeholder message with a link to the message on https://app.zivver.com. This happens because the ‘zivver-action: discard’ mail flow rule disposes of the secondary placeholder message in Exchange Online.
  1. Log in to the Exchange admin center.
  2. Click Mail flow in the left pane.
  3. Select the Rules tab.
  4. Click add Add a rule > Create a new rule.
  5. Name the rule zivver-action: discard.
  6. Under Apply this rule if, select The message headers ... and the sub-option matches these text patterns.
  7. Click Enter text.
    specify header name opens.
  8. Enter zivver-action, then click Save.
  9. Click Enter words.
    specify words or phrases opens.
  10. Enter discard.
  11. Click Add.
  12. Click Save.
  13. Under Do the following, select Block the message, and the sub-option delete the message without notifying anyone.
  14. Click Next.
    Set rule settings opens.
  15. Set Rule mode to Enforce.
  16. Set Severity to Low.
  17. Select Stop processing more rules.
  18. Set Match sender address in message to Header.
  19. Click Next, then click Finish.
  20. Wait a few seconds, then click Done.
    You can now set the priority.
  21. Select the new rule.
  22. Enable the rule.
  23. Click Edit.
    Zivver-action: discard opens.
  24. Click Settings.
  25. Set the priority of the zivver-action: discard rule to 0.
    A mail flow rule has now been created to prevent Zivver messages from being sent as unencrypted, regular email.
  26. Click Save, then click Done.

Required additional settings

Enable Inbound Direct Delivery

Inbound Direct Delivery (IDD) allows your users to read inbound Zivver messages directly from the reading pane instead of having to open the Zivver side pane. To enable this feature, follow the procedure described in the Inbound Direct Delivery manual.

Allow cookies in Edge/Chrome

Allow cookies in the browser for the exact URLs listed below. Read more about CookiesAllowedForUrls in Edge (this setting is identical in Chrome).

Tip
See Allow cookies in Edge/Chrome with Intune for instructions on how to allow cookies with Intune.
  • [*.]office.com
  • [*.]office365.com
  • [*.]zivver.com
    The Zivver add-in stores the active session of a user in LocalStorage. Blocking cookies for these domains will cause users to log in after every page refresh.

Allow pop-ups in Edge/Chrome

Allow pop-ups in the browser for the exact URLs listed below. Read more about PopupsAllowedForUrls in Edge (this setting is identical in Chrome).

Tip
See Allow pop-ups in Edge/Chrome with Intune for instructions on how to allow pop-ups with Intune.
  • [*.]office.com
  • [*.]office365.com
  • [*.]zivver.com
    The Zivver add-in uses pop-ups to log users in. Blocking pop-ups for these domains will prevent users from being able to log in to Zivver.

Configure Exempt Domains

Configure Exempt domains from scanning during sending to exempt internal domains from Smart Classification.

Add-in behavior

Configure Automatically use Zivver when a business rule recommends it to be set to On, Mandatory on the Add-in Settings page. Read more about Outlook Web Access Add-in integration settings.

Trusted websites in Internet Options

For Windows users only.

Add the following locations to the Trusted sites zone of Internet Options. This prevents a white screen during login to the OWA add-in.

Tip
See Configure trusted websites with Intune for instructions on how to configure trusted websites with Intune.
  1. Open the Control panel.
  2. Click Network and Internet.
  3. Click Internet Options.
  4. Click the Security tab.
  5. Click Trusted websites.
  6. Click the Websites button.
  7. Add these URLs as trusted websites:
    • Zivver OWA add-in: https://owa-v6.zivver.com
    • Zivver web app: https://app.zivver.com
    • OWA: https://outlook.office.com
  8. Click Close.
  9. Click OK.

macOS Safari privacy settings

For macOS users only.

  1. At Settings > Privacy, make sure “Prevent cross-site tracking” is unchecked.
  2. At Settings > Privacy, make sure “Block all cookies” is unchecked.
  3. At Websites > Pop-up windows, make sure “outlook.office.com” is allowed.

Verify the installation was successful

Tip
It may take up to 24 hours for the above changes to be implemented in Exchange Online. If you can’t verify the installation within 24 hours after installation, please try again the next day.
  1. Click New to create a new message.
  2. Set up a message with a recipient, subject, and body as usual.
  3. Click the three dots in the Outlook toolbar at the top of your screen.
  4. Click the Zivver link in the menu.
    The Zivver side panel opens on the right side.
  5. Log in to Zivver if you’re not logged in automatically.
  6. Turn on Secure mail.
  7. Click Recipient verification.
    A new screen listing all recipients opens.
  8. Complete the recipient verification where necessary.
    Learn more about Recipient verification
  9. Click Apply.
  10. Click Send to send the message.
    A Zivver pop-up may appear to check the email and attachments for sensitive information.
  11. Verify in the recipients’ inbox that a Zivver message has been received and no unencrypted, regular email has been received.
    You have now verified the installation was successful.
Note
Also, send an unencrypted, regular email to verify that the regular email flow works as intended.

Remove the Zivver OWA Add-in from Microsoft 365 admin center

If you want to remove the Zivver add-in, follow these steps to uninstall it from the Microsoft 365 admin center:

  1. Log in to the Microsoft 365 admin center.
  2. Select Zivver.
    The Zivver Add-in screen appears in the right-side pane.
  3. Scroll down on the Zivver side pane and click Delete add-in at the bottom of the side pane.
  4. Confirm by clicking Delete.
    The Zivver OWA add-in has now been removed.

Remove the Zivver Exchange rule

To remove the Zivver Exchange rule, follow these steps in the Exchange admin center:

  1. Log in to the Exchange admin center.
  2. Click Mail flow in the left-side pane.
  3. Select the Rules tab.
  4. Select the mail flow rule zivver-action:discard.
  5. Delete the rule by clicking the delete icon.