Confidencial Documentation
HomepageLog In
  • Getting Started
    • Sending secure PDFs with Confidencial
    • Viewing secure PDFs with Confidencial
    • Sending secure Word docs with Confidencial
    • Viewing secure Word docs with Confidencial
    • Sending secure Excel workbooks with Confidencial
    • Viewing secure Excel workbooks with Confidencial
    • Sending secure images with Confidencial
    • Viewing secure images with Confidencial
    • Sending secure messages with Confidencial
    • Viewing secure messages with Confidencial
    • Protecting content with Confidencial
    • Re-encrypting and changing who can see protected content
  • General
    • How Confidencial Works
      • What is End-to-End Protection
      • In-doc encryption
      • The Confidencial Public Key Registry
      • The Confidencial Private Key Server
      • The Confidencial Log Server
    • Account types
      • Individual
      • Organization
      • Organization administrator
    • File types
    • Key types
      • Cloud-stored keys
      • Device-stored keys
      • Temporary keys
      • Enterprise keys
      • Recovery keys
    • Logging in to the desktop or web app
    • Logging in to Confidencial
    • Encryption policies
    • Selecting encryption recipients
    • Inviting other users to Confidencial
    • Accepting an invite to Confidencial
    • Creating a Confidencial individual account
    • Re-encrypting and changing who can see protected content
    • Confidencial organizations
  • Web App
    • Encrypting a message
    • Decrypting a message
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
    • Re-encrypting a Confidencial-protected file or file bundle and changing who can see them
  • Desktop App
    • Installing the desktop app
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
  • Microsoft Office Add-ins
    • Installing the Microsoft Office add-ins
    • Opening the task pane
    • Logging in from an Office application
    • Encrypting an entire Word document
    • Encrypting parts of a Word document
    • Decrypting a Word document
    • Re-encrypting a Word document and changing who can see protected content
    • Installing Microsoft Add-ins via the Admin Center
  • Advanced Features
    • Storing keys on your device
    • Loading a key from your device
    • Creating a machine token
    • Obtaining public-private key pairs for use with the Confidencial SDK
  • How to Use Secure Document Request (SDR)
  • Secure Document Send
    • Sending Documents with Secure Document Send
    • Viewing Historical Document Sends
    • Creating a Persistent Share Link
    • Receiving a Persistent Share Link
  • Cloud Protector
    • Connecting AWS S3
    • Connecting Box
    • Connecting Dropbox
    • Connecting Google Cloud
    • Connecting Google Drive
    • Connecting Microsoft Azure Blob
    • Connecting Microsoft OneDrive
    • Connecting Microsoft SharePoint
    • Connecting Server Message Block
    • Connecting Wasabi
    • Connecting On-Premises Storage
  • Enterprise Deployment
    • Connecting your identity provider to Confidencial
    • Creating an S3 bucket for document requests
    • Creating a Cognito user pool to enable S3 bucket access via IDP credentials
    • Deploying the Confidencial Key Server in your environment
      • Configuring an AWS Elastic Container Service (ESC) instance
    • Running a database migration
    • Pushing a container image to your AWS container registry
    • Connecting your identity provider to the Confidencial Key Server
    • Deploying the Confidencial Desktop App to your enterprise users
    • Deploying the Confidencial Office Add-ins to your enterprise users
    • Setting up Microsoft Entra to use an Exchange account to send email notifications
  • Organization Administration
    • Adding members to an organization
    • Pre-loading members into your organization
    • Designating a member as an administrator
    • Creating a recovery key for an organization
    • Monitoring Confidencial usage within an organization
    • Organization-level policies
    • Administrator permissions
  • Command-Line Interface (CLI)
  • Software Development Kit (SDK)
  • Contact Us
  • System Requirements
  • Legal/Licensing
  • How to Access Confidencial Documents for First Time Recipients
Powered by GitBook
On this page
  • Inviting users via the Invites page in the web or desktop app
  • Inviting users via the recipient box in the web app, desktop app, or Office add-ins
Export as PDF
  1. General

Inviting other users to Confidencial

PreviousSelecting encryption recipientsNextAccepting an invite to Confidencial

Last updated 1 month ago

ℹ️ These instructions show you how to invite others to use Confidencial with an . If you are part of a Confidencial and want to , contact your

⚠️ When you invite another user to join Confidencial with an individual account, a is generated for their account so you can immediately encrypt content for them. This temporary key is stored in Confidencial’s secure key server. Once the invited user registers their account, they will generate a more secure . All subsequent encryptions for them will use the split key.

There are two ways to invite users to join Confidencial with an individual account:

Once you have sent invites, you can .

Inviting users via the Invites page in the web or desktop app

  1. Once to the web or desktop app, click Invite in the sidebar menu

  2. Click Invite People to Confidencial

  3. Enter the email addresses of the people you want to invite (up to 5 at a time) and click Send Invites

âś… The users you invited will now receive invitation emails. You may now encrypt content for them.

Inviting users via the recipient box in the web app, desktop app, or Office add-ins

  1. From the Encryption page of the web or desktop app, or the task pane of an Office add-in, enter the email address or the person you want to invite in the recipient box

  2. Click Send Invite to…

âś… The user you invited will now receive an invitation email. You may now encrypt content for them.

đź’ˇ You can track the status of all your invites by clicking Invite in the web or desktop app. You can resend invite emails to users by clicking Send Again. When a user accepts your invitation, their status will change from pending to accepted.

individual account
organization
invite others to your organization
administrator
temporary key pair
split key
track their status
logged in
Inviting users via the Invites page in the web or desktop app
Inviting users via the recipient box in the web app, desktop app, or Office add-ins
If the users doesn’t already have a Confidencial account, an invitation button will appear
Your menu options may vary depending on your .
account type