Confidencial Documentation
HomepageLog In
  • Getting Started
    • Sending secure PDFs with Confidencial
    • Viewing secure PDFs with Confidencial
    • Sending secure Word docs with Confidencial
    • Viewing secure Word docs with Confidencial
    • Sending secure Excel workbooks with Confidencial
    • Viewing secure Excel workbooks with Confidencial
    • Sending secure images with Confidencial
    • Viewing secure images with Confidencial
    • Sending secure messages with Confidencial
    • Viewing secure messages with Confidencial
    • Protecting content with Confidencial
    • Re-encrypting and changing who can see protected content
  • General
    • How Confidencial Works
      • What is End-to-End Protection
      • In-doc encryption
      • The Confidencial Public Key Registry
      • The Confidencial Private Key Server
      • The Confidencial Log Server
    • Account types
      • Individual
      • Organization
      • Organization administrator
    • File types
    • Key types
      • Cloud-stored keys
      • Device-stored keys
      • Temporary keys
      • Enterprise keys
      • Recovery keys
    • Logging in to the desktop or web app
    • Logging in to Confidencial
    • Encryption policies
    • Selecting encryption recipients
    • Inviting other users to Confidencial
    • Accepting an invite to Confidencial
    • Creating a Confidencial individual account
    • Re-encrypting and changing who can see protected content
    • Confidencial organizations
  • Web App
    • Encrypting a message
    • Decrypting a message
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
    • Re-encrypting a Confidencial-protected file or file bundle and changing who can see them
  • Desktop App
    • Installing the desktop app
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
  • Microsoft Office Add-ins
    • Installing the Microsoft Office add-ins
    • Opening the task pane
    • Logging in from an Office application
    • Encrypting an entire Word document
    • Encrypting parts of a Word document
    • Decrypting a Word document
    • Re-encrypting a Word document and changing who can see protected content
    • Installing Microsoft Add-ins via the Admin Center
  • Advanced Features
    • Storing keys on your device
    • Loading a key from your device
    • Creating a machine token
    • Obtaining public-private key pairs for use with the Confidencial SDK
  • How to Use Secure Document Request (SDR)
  • Secure Document Send
    • Sending Documents with Secure Document Send
    • Viewing Historical Document Sends
    • Creating a Persistent Share Link
    • Receiving a Persistent Share Link
  • Cloud Protector
    • Connecting AWS S3
    • Connecting Box
    • Connecting Dropbox
    • Connecting Google Cloud
    • Connecting Google Drive
    • Connecting Microsoft Azure Blob
    • Connecting Microsoft OneDrive
    • Connecting Microsoft SharePoint
    • Connecting Server Message Block
    • Connecting Wasabi
    • Connecting On-Premises Storage
  • Enterprise Deployment
    • Connecting your identity provider to Confidencial
    • Creating an S3 bucket for document requests
    • Creating a Cognito user pool to enable S3 bucket access via IDP credentials
    • Deploying the Confidencial Key Server in your environment
      • Configuring an AWS Elastic Container Service (ESC) instance
    • Running a database migration
    • Pushing a container image to your AWS container registry
    • Connecting your identity provider to the Confidencial Key Server
    • Deploying the Confidencial Desktop App to your enterprise users
    • Deploying the Confidencial Office Add-ins to your enterprise users
    • Setting up Microsoft Entra to use an Exchange account to send email notifications
  • Organization Administration
    • Adding members to an organization
    • Pre-loading members into your organization
    • Designating a member as an administrator
    • Creating a recovery key for an organization
    • Monitoring Confidencial usage within an organization
    • Organization-level policies
    • Administrator permissions
  • Command-Line Interface (CLI)
  • Software Development Kit (SDK)
  • Contact Us
  • System Requirements
  • Legal/Licensing
  • How to Access Confidencial Documents for First Time Recipients
Powered by GitBook
On this page
  • Re-encrypting a Word document for the original recipients
  • Re-encrypting a Word document for a new group of recipients
Export as PDF
  1. Microsoft Office Add-ins

Re-encrypting a Word document and changing who can see protected content

PreviousDecrypting a Word documentNextInstalling Microsoft Add-ins via the Admin Center

Last updated 1 month ago

ℹ️ After you have opened a and , you can re-encrypt the content. These instructions cover how to re-encrypt for the original recipients and how to re-encrypt for a different group of recipients.

Re-encrypting a Word document for the original recipients

  1. Click Re-encrypt Before Saving in the Confidencial task pane

  2. Save the document

✅ This will protect all content in the document for the original group of recipients

ℹ️ If the document was in the protected state (encrypted content not visible) during the last time you saved the document, you can also close the document without saving. This will leave the document in the protected state with the original recipients intact. However, it is best practice to click Re-encrypt Before Saving and re-save the document to guarantee that the document is saved in the protected state.

⚠️ If you save and share the document before clicking Re-encrypt Before Saving, all decrypted contents in the document will be visible to anyone who gains access to and opens the document.

Re-encrypting a Word document for a new group of recipients

  1. Remove encryption from the content for which you want to change the recipients

  2. With Confidencial protection removed from the necessary parts of the document, you can now re-encrypt the content for a new group of recipients

    1. ✅ This will re-encrypt the entire document for the new group of recipients and put the document in the protected state. The document can now be safely distributed.

    2. ✅ This will re-encrypt the parts for the new group of recipients and put the document in the protected state. The document can now be safely distributed.

if it is not open already and if necessary

if it is not open already and if necessary

If the document is using , click Remove All Encryption in the Confidencial task pane

If the document is using (only parts of the document are encrypted), for each part that you want to encrypt for a different group of recipients, select the part, then click Remove Selected Encryption in the Confidencial task pane

If you are using whole-document encryption, in the Confidencial task pane and click Encrypt Document

If you are encrypting only parts of the document, one-at-a-time select each part of the document you want to encrypt, in the Confidencial task pane, and click Encrypt Selection

Open the Confidencial task pane
log in
Open the Confidencial task pane
log in
whole-document encryption
selective encryption
select the recipients you want to encrypt for
select the recipients you want to encrypt for
Confidencial-protected document
viewed the encrypted content
Re-encrypting a Word document for the original recipients
Re-encrypting a Word document for a new group of recipients
Changing who can see a protected part of a Word document
Click on the Decrypted content control on either side of a part to select it
Remove Selected Encryption is found under the Edit tab of the Confidencial task pane