Confidencial Documentation
HomepageLog In
  • Getting Started
    • Sending secure PDFs with Confidencial
    • Viewing secure PDFs with Confidencial
    • Sending secure Word docs with Confidencial
    • Viewing secure Word docs with Confidencial
    • Sending secure Excel workbooks with Confidencial
    • Viewing secure Excel workbooks with Confidencial
    • Sending secure images with Confidencial
    • Viewing secure images with Confidencial
    • Sending secure messages with Confidencial
    • Viewing secure messages with Confidencial
    • Protecting content with Confidencial
    • Re-encrypting and changing who can see protected content
  • General
    • How Confidencial Works
      • What is End-to-End Protection
      • In-doc encryption
      • The Confidencial Public Key Registry
      • The Confidencial Private Key Server
      • The Confidencial Log Server
    • Account types
      • Individual
      • Organization
      • Organization administrator
    • File types
    • Key types
      • Cloud-stored keys
      • Device-stored keys
      • Temporary keys
      • Enterprise keys
      • Recovery keys
    • Logging in to the desktop or web app
    • Logging in to Confidencial
    • Encryption policies
    • Selecting encryption recipients
    • Inviting other users to Confidencial
    • Accepting an invite to Confidencial
    • Creating a Confidencial individual account
    • Re-encrypting and changing who can see protected content
    • Confidencial organizations
  • Web App
    • Encrypting a message
    • Decrypting a message
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
    • Re-encrypting a Confidencial-protected file or file bundle and changing who can see them
  • Desktop App
    • Installing the desktop app
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
  • Microsoft Office Add-ins
    • Installing the Microsoft Office add-ins
    • Opening the task pane
    • Logging in from an Office application
    • Encrypting an entire Word document
    • Encrypting parts of a Word document
    • Decrypting a Word document
    • Re-encrypting a Word document and changing who can see protected content
    • Installing Microsoft Add-ins via the Admin Center
  • Advanced Features
    • Storing keys on your device
    • Loading a key from your device
    • Creating a machine token
    • Obtaining public-private key pairs for use with the Confidencial SDK
  • How to Use Secure Document Request (SDR)
  • Secure Document Send
    • Sending Documents with Secure Document Send
    • Viewing Historical Document Sends
    • Creating a Persistent Share Link
    • Receiving a Persistent Share Link
  • Cloud Protector
    • Connecting AWS S3
    • Connecting Box
    • Connecting Dropbox
    • Connecting Google Cloud
    • Connecting Google Drive
    • Connecting Microsoft Azure Blob
    • Connecting Microsoft OneDrive
    • Connecting Microsoft SharePoint
    • Connecting Server Message Block
    • Connecting Wasabi
    • Connecting On-Premises Storage
  • Enterprise Deployment
    • Connecting your identity provider to Confidencial
    • Creating an S3 bucket for document requests
    • Creating a Cognito user pool to enable S3 bucket access via IDP credentials
    • Deploying the Confidencial Key Server in your environment
      • Configuring an AWS Elastic Container Service (ESC) instance
    • Running a database migration
    • Pushing a container image to your AWS container registry
    • Connecting your identity provider to the Confidencial Key Server
    • Deploying the Confidencial Desktop App to your enterprise users
    • Deploying the Confidencial Office Add-ins to your enterprise users
    • Setting up Microsoft Entra to use an Exchange account to send email notifications
  • Organization Administration
    • Adding members to an organization
    • Pre-loading members into your organization
    • Designating a member as an administrator
    • Creating a recovery key for an organization
    • Monitoring Confidencial usage within an organization
    • Organization-level policies
    • Administrator permissions
  • Command-Line Interface (CLI)
  • Software Development Kit (SDK)
  • Contact Us
  • System Requirements
  • Legal/Licensing
  • How to Access Confidencial Documents for First Time Recipients
Powered by GitBook
On this page
Export as PDF
  1. Getting Started

Viewing secure images with Confidencial

PreviousSending secure images with ConfidencialNextSending secure messages with Confidencial

Last updated 1 month ago

ℹ️ You’ve received an image that’s been protected with Confidencial…now what? This tutorial walks you through what to do. We’re going to pretend you are Bob who works at The Example Hotel, you’ve never used Confidencial before, and one of your international guests, Happy Traveler, has sent you a photo of her passport.

💡 For the steps Happy took to send this image, see

  1. If you open the image that you received from Happy in your default image viewer, you will see an image like that above. You will be able to see all the parts of the image that Happy chose not to protect. To see the protected parts, continue to the steps below.

    ℹ️ Since Confidencial’s keeps documents in their original file format, they can be opened with your default application (Microsoft Photos in the example above).

  2. Since we’re assuming in this example that you’ve never used Confidencial before and that your guest has sent you an invite to Confidencial, the next step is to to create a login. Go to your inbox and click the link in the invitation email. From there, you will create a password and generate your encryption keys.

    💡 If you already have a Confidencial account, you can skip this step. If you don’t have a Confidencial account and haven’t been invited, you can .

  3. Now that you have a , you can by or by going to and clicking Individual Log In

    ⚠️ If you are a member of a , you will log in using the Organization Log In button 💡 If you just registered your Confidencial account in Step 2 above, you will probably be able to skip this step, as you will already be logged in

  4. Once you are logged in, drag the protected Confidencial image file on to the encryption box of the Encryption Tools page

  5. The protected image is now displayed in the Confidencial Image Protector

  6. Click View Encrypted Content in the right taskpane

✅ You can now see the content that Happy protected for you.

Sending secure images with Confidencial
in-doc encryption
accept this invite
sign up here
Confidencial account
log in
installing and running the Confidencial desktop app
my.confidencial.io
Confidencial organization