Confidencial Documentation
HomepageLog In
  • Getting Started
    • Sending secure PDFs with Confidencial
    • Viewing secure PDFs with Confidencial
    • Sending secure Word docs with Confidencial
    • Viewing secure Word docs with Confidencial
    • Sending secure Excel workbooks with Confidencial
    • Viewing secure Excel workbooks with Confidencial
    • Sending secure images with Confidencial
    • Viewing secure images with Confidencial
    • Sending secure messages with Confidencial
    • Viewing secure messages with Confidencial
    • Protecting content with Confidencial
    • Re-encrypting and changing who can see protected content
  • General
    • How Confidencial Works
      • What is End-to-End Protection
      • In-doc encryption
      • The Confidencial Public Key Registry
      • The Confidencial Private Key Server
      • The Confidencial Log Server
    • Account types
      • Individual
      • Organization
      • Organization administrator
    • File types
    • Key types
      • Cloud-stored keys
      • Device-stored keys
      • Temporary keys
      • Enterprise keys
      • Recovery keys
    • Logging in to the desktop or web app
    • Logging in to Confidencial
    • Encryption policies
    • Selecting encryption recipients
    • Inviting other users to Confidencial
    • Accepting an invite to Confidencial
    • Creating a Confidencial individual account
    • Re-encrypting and changing who can see protected content
    • Confidencial organizations
  • Web App
    • Encrypting a message
    • Decrypting a message
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
    • Re-encrypting a Confidencial-protected file or file bundle and changing who can see them
  • Desktop App
    • Installing the desktop app
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
  • Microsoft Office Add-ins
    • Installing the Microsoft Office add-ins
    • Opening the task pane
    • Logging in from an Office application
    • Encrypting an entire Word document
    • Encrypting parts of a Word document
    • Decrypting a Word document
    • Re-encrypting a Word document and changing who can see protected content
    • Installing Microsoft Add-ins via the Admin Center
  • Advanced Features
    • Storing keys on your device
    • Loading a key from your device
    • Creating a machine token
    • Obtaining public-private key pairs for use with the Confidencial SDK
  • How to Use Secure Document Request (SDR)
  • Secure Document Send
    • Sending Documents with Secure Document Send
    • Viewing Historical Document Sends
    • Creating a Persistent Share Link
    • Receiving a Persistent Share Link
  • Cloud Protector
    • Connecting AWS S3
    • Connecting Box
    • Connecting Dropbox
    • Connecting Google Cloud
    • Connecting Google Drive
    • Connecting Microsoft Azure Blob
    • Connecting Microsoft OneDrive
    • Connecting Microsoft SharePoint
    • Connecting Server Message Block
    • Connecting Wasabi
    • Connecting On-Premises Storage
  • Enterprise Deployment
    • Connecting your identity provider to Confidencial
    • Creating an S3 bucket for document requests
    • Creating a Cognito user pool to enable S3 bucket access via IDP credentials
    • Deploying the Confidencial Key Server in your environment
      • Configuring an AWS Elastic Container Service (ESC) instance
    • Running a database migration
    • Pushing a container image to your AWS container registry
    • Connecting your identity provider to the Confidencial Key Server
    • Deploying the Confidencial Desktop App to your enterprise users
    • Deploying the Confidencial Office Add-ins to your enterprise users
    • Setting up Microsoft Entra to use an Exchange account to send email notifications
  • Organization Administration
    • Adding members to an organization
    • Pre-loading members into your organization
    • Designating a member as an administrator
    • Creating a recovery key for an organization
    • Monitoring Confidencial usage within an organization
    • Organization-level policies
    • Administrator permissions
  • Command-Line Interface (CLI)
  • Software Development Kit (SDK)
  • Contact Us
  • System Requirements
  • Legal/Licensing
  • How to Access Confidencial Documents for First Time Recipients
Powered by GitBook
On this page
  • Natively-protected files
  • Microsoft Word and Excel
  • PDF files
  • Images (JPEG and PNG)
  • .C11-protected files and file bundles
Export as PDF
  1. General

File types

PreviousOrganization administratorNextKey types

Last updated 2 months ago

Confidencial supports multiple types of files. Files are protected either (using add-ins or the Confidencial desktop and web app) or through Confidencial’s “.c11” format.

Natively-protected files

Confidencial supports several types of files natively. That is, Confidencial encrypts content within these types of files while preserving the native format of the file. These file types include Word docs (.docx), Excel workbooks (.xlsx), and portable document format files (.pdf).

Microsoft Word and Excel

When protected with Confidencial’s , files encrypted in Word and Excel maintain their original format, meaning that the files remain valid Word (Excel) files and can be opened in Word (Excel), regardless of whether the Confidencial add-in is installed or not. However, only authenticated users with the Confidencial add-in installed can see content that is encrypted for them.

ℹ️ See , , and for more information

PDF files

Confidencial supports native (format-preserving) protection of PDF files through its and apps using the PDF Protector. Users are able to and protect the entire document or parts of the document for a . Since Confidencial-protected PDF documents are valid PDF files, they can be opened in any PDF viewer. However, only authenticated users with the Confidencial desktop or web app can view (decrypt) protected parts of a Confidencial-protected PDF file.

ℹ️ See and for more information

Images (JPEG and PNG)

Just like for PDF files, Confidencial also supports native (format-preserving) protection of JPEG and PNG images in its desktop and web apps. Confidencial users can load an image in Image Protector to protect all or parts of an image. Again, like PDF files, protected images remain in their native format, so they can continue to be viewed in standard (default) images viewers with unprotected parts continuing to be visible. However, one must use the Confidencial desktop or web app (and be authorized) to view protected portions of images.

.C11-protected files and file bundles

All files types that aren’t natively supported by Confidencial’s apps and add-ins can nonetheless still be protected by encrypting them with Confidencial’s .c11 file format. Like natively-supported file types, users encrypt other file types for a specific set of recipients. Users may protect either a single file or a bundle of files in this manner. Encryption and decryption can be performed in either the desktop or web app.

ℹ️ See and for more information

ℹ️ See and for more information

Sending secure images with Confidencial
Viewing secure images with Confidencial
Encrypting files and folders
Decrypting a .c11 file or .c11.zip file bundle
in-app
Microsoft Office add-ins
Encrypting an entire Word document
Encrypting parts of a Word document
Decrypting a Word document
desktop
web
open existing PDF documents
specific set of recipients
Sending secure PDFs with Confidencial
Viewing secure PDFs with Confidencial
Natively-protected files
Microsoft Word and Excel
PDF files
Images (JPEG and PNG)
.C11-protected files and file bundles