Skip to Content
FeaturesSecurityCertificate Encryption

Certificate Encryption

Encrypt documents using PKI (Public Key Infrastructure) certificates.

Certificate encryption requires a Business plan or higher.

What is Certificate Encryption?

Certificate-based encryption uses public/private key pairs:

  • Public key: Encrypts the document
  • Private key: Decrypts the document

Only recipients with the matching private key can open the document.

Benefits Over Passwords

FeaturePasswordCertificate
Share secret?Yes (password)No
Per-recipient controlNoYes
RevocableNoYes
Audit trailLimitedFull
Enterprise integrationNoYes

Adding Certificate Encryption

  1. Open the document
  2. Click SecurityCertificate Encryption
  3. Add recipient certificates
  4. Set permissions for each
  5. Click Apply

Adding Recipients

From Address Book

  1. Click Add Recipient
  2. Select from your contacts
  3. Certificate is attached to contact

Import Certificate

  1. Click Add RecipientImport
  2. Select certificate file (.cer, .pem)
  3. Verify certificate details
  4. Add to recipients

From Directory

For enterprise LDAP integration:

  1. Click Add RecipientDirectory
  2. Search for user
  3. Select from results

Per-Recipient Permissions

Set different permissions for each recipient:

  • Full access: All permissions
  • View only: No printing or copying
  • Custom: Specific permissions per user

Opening Encrypted Documents

  1. Open the certificate-encrypted PDF
  2. Your certificate is automatically detected
  3. If matched, document opens
  4. If not matched, access denied

Certificate Requirements

  • X.509 digital certificates
  • Key usage: Key Encipherment
  • RSA 2048-bit or higher
  • Valid (not expired)

Managing Certificates

View Your Certificates

  1. Click SecurityManage Certificates
  2. View installed certificates
  3. Check validity and details

Export Your Certificate

Share your public certificate:

  1. Click SecurityManage Certificates
  2. Select your certificate
  3. Click Export
  4. Choose format (.cer)
  5. Share with others

Best Practices

  • Use certificates from trusted CAs
  • Keep private keys secure
  • Regularly update certificates
  • Remove access when needed
  • Maintain certificate backups

Next Steps

Last updated on