Confidencial Documentation
HomepageLog In
  • Getting Started
    • Sending secure PDFs with Confidencial
    • Viewing secure PDFs with Confidencial
    • Sending secure Word docs with Confidencial
    • Viewing secure Word docs with Confidencial
    • Sending secure Excel workbooks with Confidencial
    • Viewing secure Excel workbooks with Confidencial
    • Sending secure images with Confidencial
    • Viewing secure images with Confidencial
    • Sending secure messages with Confidencial
    • Viewing secure messages with Confidencial
    • Protecting content with Confidencial
    • Re-encrypting and changing who can see protected content
  • General
    • How Confidencial Works
      • What is End-to-End Protection
      • In-doc encryption
      • The Confidencial Public Key Registry
      • The Confidencial Private Key Server
      • The Confidencial Log Server
    • Account types
      • Individual
      • Organization
      • Organization administrator
    • File types
    • Key types
      • Cloud-stored keys
      • Device-stored keys
      • Temporary keys
      • Enterprise keys
      • Recovery keys
    • Logging in to the desktop or web app
    • Logging in to Confidencial
    • Encryption policies
    • Selecting encryption recipients
    • Inviting other users to Confidencial
    • Accepting an invite to Confidencial
    • Creating a Confidencial individual account
    • Re-encrypting and changing who can see protected content
    • Confidencial organizations
  • Web App
    • Encrypting a message
    • Decrypting a message
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
    • Re-encrypting a Confidencial-protected file or file bundle and changing who can see them
  • Desktop App
    • Installing the desktop app
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
  • Microsoft Office Add-ins
    • Installing the Microsoft Office add-ins
    • Opening the task pane
    • Logging in from an Office application
    • Encrypting an entire Word document
    • Encrypting parts of a Word document
    • Decrypting a Word document
    • Re-encrypting a Word document and changing who can see protected content
    • Installing Microsoft Add-ins via the Admin Center
  • Advanced Features
    • Storing keys on your device
    • Loading a key from your device
    • Creating a machine token
    • Obtaining public-private key pairs for use with the Confidencial SDK
  • How to Use Secure Document Request (SDR)
  • Secure Document Send
    • Sending Documents with Secure Document Send
    • Viewing Historical Document Sends
    • Creating a Persistent Share Link
    • Receiving a Persistent Share Link
  • Cloud Protector
    • Connecting AWS S3
    • Connecting Box
    • Connecting Dropbox
    • Connecting Google Cloud
    • Connecting Google Drive
    • Connecting Microsoft Azure Blob
    • Connecting Microsoft OneDrive
    • Connecting Microsoft SharePoint
    • Connecting Server Message Block
    • Connecting Wasabi
    • Connecting On-Premises Storage
  • Enterprise Deployment
    • Connecting your identity provider to Confidencial
    • Creating an S3 bucket for document requests
    • Creating a Cognito user pool to enable S3 bucket access via IDP credentials
    • Deploying the Confidencial Key Server in your environment
      • Configuring an AWS Elastic Container Service (ESC) instance
    • Running a database migration
    • Pushing a container image to your AWS container registry
    • Connecting your identity provider to the Confidencial Key Server
    • Deploying the Confidencial Desktop App to your enterprise users
    • Deploying the Confidencial Office Add-ins to your enterprise users
    • Setting up Microsoft Entra to use an Exchange account to send email notifications
  • Organization Administration
    • Adding members to an organization
    • Pre-loading members into your organization
    • Designating a member as an administrator
    • Creating a recovery key for an organization
    • Monitoring Confidencial usage within an organization
    • Organization-level policies
    • Administrator permissions
  • Command-Line Interface (CLI)
  • Software Development Kit (SDK)
  • Contact Us
  • System Requirements
  • Legal/Licensing
  • How to Access Confidencial Documents for First Time Recipients
Powered by GitBook
On this page
  • Accepting an invitation to create a Confidencial individual account
  • Creating a Confidencial individual account without an invitation
Export as PDF
  1. General

Creating a Confidencial individual account

PreviousAccepting an invite to ConfidencialNextRe-encrypting and changing who can see protected content

Last updated 1 month ago

ℹ️ These instructions show you how to create an with Confidencial. Individual accounts should be used by individuals for personal use and small teams that do not have a . Employees at companies with Confidencial organizations should use . Organization accounts are typically created and administered by an IT administrator within the company.

There are two primary ways to create an individual account with Confidencial. You can register an account by accepting an invitation from another Confidencial user or you can create an account without an invitation.

Accepting an invitation to create a Confidencial individual account

  1. If you have received an invitation to join Confidencial with an individual account, you will receive an email with a link to start the registration process. Click Click here to get started to start account registration.

  2. After you click the registration link, enter a password and click Continue to create a dedicated Confidencial account or click Continue with Google or Continue with Microsoft to create an account based on an existing Google or Microsoft account, respectively

  3. If prompted, provide consent to Confidencial to access certain information from your Google or Microsoft account. Confidencial requires information such as your email address and name to allow other users to find you and encrypt information for you.

Creating a Confidencial individual account without an invitation

  1. Go to my.confidencial.io

  2. Click Sign Up

  3. Enter your email address and create a password and click Continue to create a dedicated Confidencial account or click Continue with Google or Continue with Microsoft to create an account based on an existing Google or Microsoft account, respectively

  4. Depending on how you chose to create an account, you may be asked to verify your email. If you are asked to verify your email, you will receive a verification email. Follow the instructions in that email to continue creating your account.

✅ This completes creation of a new individual account with Confidencial. You will now be taken to . If creating an account using Google or Microsoft, you may first be required to .

➡️ After your first login, you will be asked to to be used for encryption

✅ Once your email address has been verified, you will be able to to

➡️ After your first login, you will be asked to to be used for encryption

Confidencial’s web app
log in
generate keys
log in
Confidencial’s web app
generate keys
individual account
Confidencial organization
organization accounts
Accepting an invitation to create a Confidencial individual account
Creating a Confidencial individual account without an invitation
Note: Depending on how you chose to create an account, your verification process may differ. For example, you may be sent a numeric verification code that you will be asked to enter before finalizing your account.
An example email verification message. Note this message may instead contain a numeric verification code that you will need to enter, depending on how you chose to create your account.