Confidencial Documentation
HomepageLog In
  • Getting Started
    • Sending secure PDFs with Confidencial
    • Viewing secure PDFs with Confidencial
    • Sending secure Word docs with Confidencial
    • Viewing secure Word docs with Confidencial
    • Sending secure Excel workbooks with Confidencial
    • Viewing secure Excel workbooks with Confidencial
    • Sending secure images with Confidencial
    • Viewing secure images with Confidencial
    • Sending secure messages with Confidencial
    • Viewing secure messages with Confidencial
    • Protecting content with Confidencial
    • Re-encrypting and changing who can see protected content
  • General
    • How Confidencial Works
      • What is End-to-End Protection
      • In-doc encryption
      • The Confidencial Public Key Registry
      • The Confidencial Private Key Server
      • The Confidencial Log Server
    • Account types
      • Individual
      • Organization
      • Organization administrator
    • File types
    • Key types
      • Cloud-stored keys
      • Device-stored keys
      • Temporary keys
      • Enterprise keys
      • Recovery keys
    • Logging in to the desktop or web app
    • Logging in to Confidencial
    • Encryption policies
    • Selecting encryption recipients
    • Inviting other users to Confidencial
    • Accepting an invite to Confidencial
    • Creating a Confidencial individual account
    • Re-encrypting and changing who can see protected content
    • Confidencial organizations
  • Web App
    • Encrypting a message
    • Decrypting a message
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
    • Re-encrypting a Confidencial-protected file or file bundle and changing who can see them
  • Desktop App
    • Installing the desktop app
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
  • Microsoft Office Add-ins
    • Installing the Microsoft Office add-ins
    • Opening the task pane
    • Logging in from an Office application
    • Encrypting an entire Word document
    • Encrypting parts of a Word document
    • Decrypting a Word document
    • Re-encrypting a Word document and changing who can see protected content
    • Installing Microsoft Add-ins via the Admin Center
  • Advanced Features
    • Storing keys on your device
    • Loading a key from your device
    • Creating a machine token
    • Obtaining public-private key pairs for use with the Confidencial SDK
  • How to Use Secure Document Request (SDR)
  • Secure Document Send
    • Sending Documents with Secure Document Send
    • Viewing Historical Document Sends
    • Creating a Persistent Share Link
    • Receiving a Persistent Share Link
  • Cloud Protector
    • Connecting AWS S3
    • Connecting Box
    • Connecting Dropbox
    • Connecting Google Cloud
    • Connecting Google Drive
    • Connecting Microsoft Azure Blob
    • Connecting Microsoft OneDrive
    • Connecting Microsoft SharePoint
    • Connecting Server Message Block
    • Connecting Wasabi
    • Connecting On-Premises Storage
  • Enterprise Deployment
    • Connecting your identity provider to Confidencial
    • Creating an S3 bucket for document requests
    • Creating a Cognito user pool to enable S3 bucket access via IDP credentials
    • Deploying the Confidencial Key Server in your environment
      • Configuring an AWS Elastic Container Service (ESC) instance
    • Running a database migration
    • Pushing a container image to your AWS container registry
    • Connecting your identity provider to the Confidencial Key Server
    • Deploying the Confidencial Desktop App to your enterprise users
    • Deploying the Confidencial Office Add-ins to your enterprise users
    • Setting up Microsoft Entra to use an Exchange account to send email notifications
  • Organization Administration
    • Adding members to an organization
    • Pre-loading members into your organization
    • Designating a member as an administrator
    • Creating a recovery key for an organization
    • Monitoring Confidencial usage within an organization
    • Organization-level policies
    • Administrator permissions
  • Command-Line Interface (CLI)
  • Software Development Kit (SDK)
  • Contact Us
  • System Requirements
  • Legal/Licensing
  • How to Access Confidencial Documents for First Time Recipients
Powered by GitBook
On this page
Export as PDF
  1. Getting Started

Sending secure PDFs with Confidencial

PreviousGetting StartedNextViewing secure PDFs with Confidencial

Last updated 1 month ago

ℹ️ Let’s say you’re George Jetson and you work at Example Company. You just finished a proposal and want to send the final product to your two subcontractors, Spacely Sprockets and Cogswell Cogs. However, there’s a problem - you can’t let them see what the other is doing in your proposal (they’re both very secretive about the work they do and the prices they charge).

In the old days, you’d have to create a separate PDF file for each subcontractor and redact the information they aren’t allowed to see. In this example, that’d mean creating three different versions of your proposal and sending a separate email for each person to get their copy. Make sure you send the right copy to the right person!

Fortunately, you don’t have to do this anymore. With Confidencial, you can do all this with a single PDF file and a single message. You don’t have multiple, unprotected copies of your proposal floating around and you don’t have to worry about getting multiple emails set up with the right attachment and sent off to the right people. Let’s see the modern way to securely share a PDF file…

  1. Open the Confidencial or go to and if you haven’t done so already

  2. Click PDF Protector

  3. Click Open PDF File

  4. Select your PDF file (our proposal in this example)

  5. You can now see your proposal (PDF) in Confidencial’s PDF Protector

  6. Select a part of the proposal that you only want Cosmo Spacely to be able to see

  7. in the right taskpane. You can do so by entering his email address, or, if you’ve sent to him before, click in the input box to show a list of your recent recipients.

  8. You and Cosmo are now in the recipients list

  9. To encrypt the content you selected for Cosmo, click the “gear” button and choose Encrypt Selection from the menu, then click the blue Encrypt Selection button.

  10. The selected content is now protected. Only you and Cosmo will be able to view it.

  11. Repeat Steps 6-9 for the other parts of the proposal that you want to protect

    💡 Pro tip: You can remove someone from your recipients list by clicking the X next to their name.

  12. With all parts protected, click the download button in the toolbar to save your PDF

    💡 Pro tip: When you download (save) the PDF file, you can overwrite the original version of the PDF. Doing so will replace the original, unprotected PDF with a protected, Confidencial PDF.

  13. Now that you’ve saved your Confidencial PDF file, send it to Cosmo and Mr. Cogswell (we use Slack in this example). Remember, since access control is built directly into this PDF, you send the same version to everyone. No more sending multiple versions to multiple people with multiple messages!

✅ Your subcontractors are now ready to view the proposal.

desktop app
my.confidencial.io
log in
Add Cosmo to your recipient list
Notice that Slack is still able to show your recipients a preview of the PDF. This is because Confidencial PDFs are viewable in any PDF viewer. You only need to use the Confidencial PDF Protector when you want to view protected content within Confidencial PDFs.