The aim to perform S/MIME, Signed Data and Enveloped Data is to ensure that the Message (Data) is not changed and / or transferred confidential. The following security profiles are available: - Signing the MAIL-Body Verification of the applied signature - Encrypt the MAIL-Body Decrypt the MAIL-Body - Signing the MAIL-Body then encrypt the SOAP-Body Decrypt the MAIL-Body then verify the applied signature Configuration Check if the keys and the certificates required for applying the above mentioned security profiles are available. You can check for the same in the "Key storage" service present in the visual admin. Check the expiry date for the keys and certificates. If the required keys and certificates are not available do import the same. Assign Security Roles Use the J2EE Visual Administrator to assign security roles as follows: a. Select the service Security Provider on the corresponding server. b. Under Policy Configuration select the component sap.com/tc~sec~wssec~app*wssprocess.jar c. Assign the security role WSSecurityProcessing to the user you specified in the above maintained RFC destination for logging on to the Integration Server If the private key and public root certificate of any keystore view are not contained in the TrustedCAs or DEFAULT view, assign the security role KeystoreAdministrator of this keystore view component to the user you specified in the above maintained RFC destination for logging on to the Integration Server Please ensure the Sender and Receiver Agreements have the correct configurations of the Keystores a. Receiver Agreement Configuration b. Sender Agreement Configuration Import of Certificates to the Operating System . ( While accessing Microsoft Outlook, these keys are referenced. ) 1) Open the Internet Explorer Browser . 2)Go to the Menu Option Tools -> Internet Options . Select the content tab and select the Certificates button and import all the certificates and private keys which are present on your local system. As mentioned in the screenshot. Now after running through the scenario you will find a cryptographic mail in the outlook. Check the audit log for the sender and the receiver channel to check if SMIME is applied successfully. Receiver channel Sender channel