Confidencial Documentation
HomepageLog In
  • Getting Started
    • Sending secure PDFs with Confidencial
    • Viewing secure PDFs with Confidencial
    • Sending secure Word docs with Confidencial
    • Viewing secure Word docs with Confidencial
    • Sending secure Excel workbooks with Confidencial
    • Viewing secure Excel workbooks with Confidencial
    • Sending secure images with Confidencial
    • Viewing secure images with Confidencial
    • Sending secure messages with Confidencial
    • Viewing secure messages with Confidencial
    • Protecting content with Confidencial
    • Re-encrypting and changing who can see protected content
  • General
    • How Confidencial Works
      • What is End-to-End Protection
      • In-doc encryption
      • The Confidencial Public Key Registry
      • The Confidencial Private Key Server
      • The Confidencial Log Server
    • Account types
      • Individual
      • Organization
      • Organization administrator
    • File types
    • Key types
      • Cloud-stored keys
      • Device-stored keys
      • Temporary keys
      • Enterprise keys
      • Recovery keys
    • Logging in to the desktop or web app
    • Logging in to Confidencial
    • Encryption policies
    • Selecting encryption recipients
    • Inviting other users to Confidencial
    • Accepting an invite to Confidencial
    • Creating a Confidencial individual account
    • Re-encrypting and changing who can see protected content
    • Confidencial organizations
  • Web App
    • Encrypting a message
    • Decrypting a message
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
    • Re-encrypting a Confidencial-protected file or file bundle and changing who can see them
  • Desktop App
    • Installing the desktop app
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
  • Microsoft Office Add-ins
    • Installing the Microsoft Office add-ins
    • Opening the task pane
    • Logging in from an Office application
    • Encrypting an entire Word document
    • Encrypting parts of a Word document
    • Decrypting a Word document
    • Re-encrypting a Word document and changing who can see protected content
    • Installing Microsoft Add-ins via the Admin Center
  • Advanced Features
    • Storing keys on your device
    • Loading a key from your device
    • Creating a machine token
    • Obtaining public-private key pairs for use with the Confidencial SDK
  • How to Use Secure Document Request (SDR)
  • Secure Document Send
    • Sending Documents with Secure Document Send
    • Viewing Historical Document Sends
    • Creating a Persistent Share Link
    • Receiving a Persistent Share Link
  • Cloud Protector
    • Connecting AWS S3
    • Connecting Box
    • Connecting Dropbox
    • Connecting Google Cloud
    • Connecting Google Drive
    • Connecting Microsoft Azure Blob
    • Connecting Microsoft OneDrive
    • Connecting Microsoft SharePoint
    • Connecting Server Message Block
    • Connecting Wasabi
    • Connecting On-Premises Storage
  • Enterprise Deployment
    • Connecting your identity provider to Confidencial
    • Creating an S3 bucket for document requests
    • Creating a Cognito user pool to enable S3 bucket access via IDP credentials
    • Deploying the Confidencial Key Server in your environment
      • Configuring an AWS Elastic Container Service (ESC) instance
    • Running a database migration
    • Pushing a container image to your AWS container registry
    • Connecting your identity provider to the Confidencial Key Server
    • Deploying the Confidencial Desktop App to your enterprise users
    • Deploying the Confidencial Office Add-ins to your enterprise users
    • Setting up Microsoft Entra to use an Exchange account to send email notifications
  • Organization Administration
    • Adding members to an organization
    • Pre-loading members into your organization
    • Designating a member as an administrator
    • Creating a recovery key for an organization
    • Monitoring Confidencial usage within an organization
    • Organization-level policies
    • Administrator permissions
  • Command-Line Interface (CLI)
  • Software Development Kit (SDK)
  • Contact Us
  • System Requirements
  • Legal/Licensing
  • How to Access Confidencial Documents for First Time Recipients
Powered by GitBook
On this page
Export as PDF
  1. Secure Document Send

Sending Documents with Secure Document Send

PreviousSecure Document SendNextViewing Historical Document Sends

Last updated 1 month ago

💡 When looking to securely send documents to third parties or within your organization you can use Confidencial’s Secure Doc Send. Confidential Secure Document Send is designed to ensure that only authorized personnel can access documents shared with them and protects against unauthorized disclosures and data lekage. This process involves on information sent using SDS. Documents sent with Secure Doc send are automatically encrypted to the recipients of the document send. This ensure sensitive data sent is only accessible by desired parties for the desired time period.

Sending a Document Using Secure Document Send

  1. Navigate to: Document Sends > + New Document Send

Starting a new secure document send

  1. Select desired Files or Folders

  2. Enter the following information:

    1. Name: This name will appear in your Secure Doc send history list

    2. Description: This will appear under the name in your Secure Doc history list

    3. Message to Recipient(s): This message will be show to recipients on the email notification here they are notified that files have been shared.

    4. View-Only: Recipients will only be able to view the contents of the files sent and not be able to download the files locally. This is the most secure sharing option. It ensures you have full control of the documents shared and enables expiration of document access as users need to use the link provided to access the contents of the files.

    *Current files types supported for view-only sends are PDF & MS Office Documents

    1. Disallow Decrypted Downloads: Recipients will only be able to access the contents for shared files using the link provided and viewing using the Confidencial web app or viewers can download and encrypted version locally and will need to decrypt using the web application or MS add-ins. This is a secure method of sharing documents used for when you do not want recipients to be able to have an un-encrypted version of the shared file saved locally.

    2. Request Expiry: This provides the sender the option to specify an expiry time period for access to the shared files.

    3. Data Label: Select the labels that apply to type of data in the files shared. This enables your organization to report on the type of information sent and received.

      1. You must select one data label if this has been enabled by and admin in your org

  3. Add Recipients: Enter the email address of desired recipient(s).

*One or many recipients can be added *Recipients DO NOT need to have a Confidencial Account to receive files

  • Select Send Documents

You have completed the secure doc send workflow.

true End-to-End Protection
Secure document send options
Sending to a new user