Confidencial Documentation
HomepageLog In
  • Getting Started
    • Sending secure PDFs with Confidencial
    • Viewing secure PDFs with Confidencial
    • Sending secure Word docs with Confidencial
    • Viewing secure Word docs with Confidencial
    • Sending secure Excel workbooks with Confidencial
    • Viewing secure Excel workbooks with Confidencial
    • Sending secure images with Confidencial
    • Viewing secure images with Confidencial
    • Sending secure messages with Confidencial
    • Viewing secure messages with Confidencial
    • Protecting content with Confidencial
    • Re-encrypting and changing who can see protected content
  • General
    • How Confidencial Works
      • What is End-to-End Protection
      • In-doc encryption
      • The Confidencial Public Key Registry
      • The Confidencial Private Key Server
      • The Confidencial Log Server
    • Account types
      • Individual
      • Organization
      • Organization administrator
    • File types
    • Key types
      • Cloud-stored keys
      • Device-stored keys
      • Temporary keys
      • Enterprise keys
      • Recovery keys
    • Logging in to the desktop or web app
    • Logging in to Confidencial
    • Encryption policies
    • Selecting encryption recipients
    • Inviting other users to Confidencial
    • Accepting an invite to Confidencial
    • Creating a Confidencial individual account
    • Re-encrypting and changing who can see protected content
    • Confidencial organizations
  • Web App
    • Encrypting a message
    • Decrypting a message
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
    • Re-encrypting a Confidencial-protected file or file bundle and changing who can see them
  • Desktop App
    • Installing the desktop app
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
  • Microsoft Office Add-ins
    • Installing the Microsoft Office add-ins
    • Opening the task pane
    • Logging in from an Office application
    • Encrypting an entire Word document
    • Encrypting parts of a Word document
    • Decrypting a Word document
    • Re-encrypting a Word document and changing who can see protected content
    • Installing Microsoft Add-ins via the Admin Center
  • Advanced Features
    • Storing keys on your device
    • Loading a key from your device
    • Creating a machine token
    • Obtaining public-private key pairs for use with the Confidencial SDK
  • How to Use Secure Document Request (SDR)
  • Secure Document Send
    • Sending Documents with Secure Document Send
    • Viewing Historical Document Sends
    • Creating a Persistent Share Link
    • Receiving a Persistent Share Link
  • Cloud Protector
    • Connecting AWS S3
    • Connecting Box
    • Connecting Dropbox
    • Connecting Google Cloud
    • Connecting Google Drive
    • Connecting Microsoft Azure Blob
    • Connecting Microsoft OneDrive
    • Connecting Microsoft SharePoint
    • Connecting Server Message Block
    • Connecting Wasabi
    • Connecting On-Premises Storage
  • Enterprise Deployment
    • Connecting your identity provider to Confidencial
    • Creating an S3 bucket for document requests
    • Creating a Cognito user pool to enable S3 bucket access via IDP credentials
    • Deploying the Confidencial Key Server in your environment
      • Configuring an AWS Elastic Container Service (ESC) instance
    • Running a database migration
    • Pushing a container image to your AWS container registry
    • Connecting your identity provider to the Confidencial Key Server
    • Deploying the Confidencial Desktop App to your enterprise users
    • Deploying the Confidencial Office Add-ins to your enterprise users
    • Setting up Microsoft Entra to use an Exchange account to send email notifications
  • Organization Administration
    • Adding members to an organization
    • Pre-loading members into your organization
    • Designating a member as an administrator
    • Creating a recovery key for an organization
    • Monitoring Confidencial usage within an organization
    • Organization-level policies
    • Administrator permissions
  • Command-Line Interface (CLI)
  • Software Development Kit (SDK)
  • Contact Us
  • System Requirements
  • Legal/Licensing
  • How to Access Confidencial Documents for First Time Recipients
Powered by GitBook
On this page
Export as PDF
  1. Getting Started

Viewing secure PDFs with Confidencial

PreviousSending secure PDFs with ConfidencialNextSending secure Word docs with Confidencial

Last updated 1 month ago

ℹ️ You’ve received a PDF that’s been protected with Confidencial…now what? This tutorial walks you through what to do.

Let’s say you’re Cosmo Spacely, an employee at Spacely Sprockets. A collaborator of yours at another company, George Jetson at Example Company, has sent you a Confidencial PDF in Slack (but it just as easily could have been Teams, Outlook, Google Drive, or any other way you two exchange files). As you can see below, there are some parts of the document that are encrypted. Let’s walk through how to view those encrypted parts…

💡 For the steps George took to send this PDF, see .

  1. Click PDF Protector in the sidebar menu

  2. Click Open PDF File and select the PDF file you downloaded from Slack (or whatever messaging app George used to give you the PDF)

  3. You can now see the PDF with the protected parts blocked off

  4. Click View Encrypted Content in the right taskpane

  5. The protected parts that George has allowed you to see are now visible

✅ Congrats! You now know how to view protected PDFs with Confidencial.

First, with Confidencial if you haven’t done so already. You need to do this so Confidencial can ensure that protected data is made visible to the right people. The first time someone sends a Confidencial document to you, you will receive an invitation email like that below. Simply click the button in the email to create your account.

ℹ️ If you’re part of an organization that is using Confidencial, you will probably not need to verify your email; simply to with your enterprise credentials using an

With your email verified, you can now go to and . If you verified your email address in the previous step, you’ll automatically be taken there and logged in.

💡 In addition to , you can also use the Confidencial to view protected content in Confidencial files

verify your email address
log in
my.confidencial.io
organization account
my.confidencial.io
log in
my.confidencial.io
desktop app
Sending secure PDFs with Confidencial
Note that some of the parts of the PDF are still encrypted. Sorry, those parts are for Mr. Cogswell’s eyes only!