Skip table of contents LILT’s SMTP email integration enables customers to set up email integrations for core workflows like user sign up, job creation, job assignment, and job state changes. The following email integrations are available:Documentation Index
Fetch the complete documentation index at: https://support.lilt.com/llms.txt
Use this file to discover all available pages before exploring further.
- Account creation email, that invites new users to log into LILT for the first time.
- Password reset email, so users can safely and securely reset their password.
- Job creation email, so users know when a job has been successfully submitted.
-
New project assignment email, so linguists and users can accept or reject the project assignment.
- There are three distinct emails: translator assignment email, reviewer assignment email, and Instant + Review assignment email.
- Project rejection email, so users can effectively manage projects.
- Project completion email, so users can track and understand progress.
- Revision report email, for linguists to learn from errors and quality feedback.
PII-Safe Email Mode
For organizations with strict data privacy requirements (such as healthcare or financial services), LILT supports a PII-safe email mode that anonymizes document titles in assignment notification emails. When enabled:- Document names and job names are not included in email notifications
- Assignment emails direct users to log into the LILT platform to view project details
- The installation/customer name is displayed instead of specific job information
- Applies to translator, reviewer, and secondary reviewer assignment emails
Configuration instructions
In order to configure LILT’s SMTP Notifications feature, the following configurations must be set in$install_dir/lilt/environments/lilt/values.yaml
The comments next to each value describe the information needed for each setting.
Notes:
-
white-list-email-domainsis an optional value. Leaving empty indicates any domain is allowed to be sent to. -
The bottom
option1is purposefully set to the empty string in order to overwrite the existing value.
SMTP Transport Security Options
By default, the notification service performs an opportunistic STARTTLS upgrade on every connection. For most SMTP relays this is the right behavior, but some self-managed deployments run against internal mail relays that:- listen on plain port 25 and do not advertise STARTTLS, or
- advertise STARTTLS but present a certificate that the default JVM trust store does not accept, or
- require implicit TLS (SMTPS) on a non-standard port such as 465.
These transport-security variables are available starting in LILT 6.0 and beyond. Earlier releases (including LILT 5.3.x) force opportunistic STARTTLS and have no equivalent configuration.
| Variable | Default | Purpose |
|---|---|---|
SMTP_STARTTLS_ENABLE | "true" | Opportunistic STARTTLS upgrade on the SMTP connection. Set to "false" to permit unencrypted SMTP (for example, port 25 with no encryption). |
SMTP_STARTTLS_REQUIRED | "false" | Require STARTTLS — the send fails if the server does not advertise it. |
SMTP_SSL_ENABLE | "false" | Use SMTPS (implicit TLS) instead of plain SMTP. Typically paired with port 465. |
SMTP_SSL_TRUST | "" | Hosts to trust when verifying SMTP TLS certificates. Use "*" to trust all hosts (useful with internal CAs or self-signed certs). |
SMTP_AUTH | "" (derived) | Explicit override for SMTP AUTH. When unset, auth is enabled if and only if smtp-password is non-empty. |
notification.onpremValues.env in the same values.yaml shown above. They apply only to the notification service — the front pod uses a separate transport (see the front.onpremValues.env block above).
Example: unencrypted SMTP on port 25
If your relay accepts plaintext SMTP on port 25 with no auth and you want the notification pod to behave the same way thefront pod already does:
Example: SMTPS (implicit TLS) on port 465
Example: STARTTLS against an internal CA
If your relay advertises STARTTLS but uses a certificate from an internal CA that the JVM does not trust, add the host toSMTP_SSL_TRUST:
SMTP_SSL_TRUST: "*" to trust any host — convenient for testing, but skip cert validation only when you understand the risk.
Below is an example configuration:

