Adobe 22002484 Security Guide - Page 81

Searching for Digital ID, Certificates

Page 81 highlights

Acrobat Family of Products Security Feature User Guide Certificate Security Creating a Reusable Certificate Security Policy 81 12. Choose OK. 13. Add document recipients to the recipient list. You will be encrypting the document with each recipient's public key so that they can decrypt it. Choose from the following:  Search lets you search preconfigured directories for certificates on remote servers as well as in your local Trusted Identity list. For details about searching for certificates, see "Searching for Digital ID Certificates" on page 34. Highlight one or more found digital IDs and choose OK.  Browse lets you search your computer for certificate files stored locally. Highlight one or more found digital IDs and choose OK. Tip: Business users may need to search their company LDAP directory server. For details, see "Using Directory Servers to Add Trusted Identities" on page 40. Figure 69 Adding recipients to a document with certificate security 14. If you want to specify document permissions, do the following. Otherwise, skip to Step 16. 1. Highlight one or more recipients. Different permissions can be set for different recipients. Select multiple recipients from the list by using the Control or Shift keys. 2. Choose Permissions. 3. When an alert appears stating that non-Adobe products may not respect these settings, choose OK. 4. Check Restrict printing and editing of the document and security settings. Caution: Adobe products enforce permissions restrictions. However, not all third-party products fully support and respect these permissions. Encryption and therefore document access would likely not be impaired, but Adobe cannot guarantee that individual permissions settings will remain function. Recipients using such third-party products might be able to bypass some of your restrictions. Set the permissions as needed:

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149

Acrobat Family of Products
Certificate Security
Security Feature User Guide
Creating a Reusable Certificate Security Policy
81
12.
Choose
OK
.
13.
Add document recipients to the recipient list. You will be encrypting the document with each
recipient’s public key so that they can decrypt it. Choose from the following:
Search
lets you search preconfigured directories for certificates on remote servers as well as in your
local Trusted Identity list. For details about searching for certificates, see
“Searching for Digital ID
Certificates” on page 34
. Highlight one or more found digital IDs and choose
OK
.
Browse
lets you search your computer for certificate files stored locally. Highlight one or more
found digital IDs and choose
OK
.
Tip:
Business users may need to search their company LDAP directory server. For details, see
“Using Directory Servers to Add Trusted Identities” on page 40
.
Figure 69
Adding recipients to a document with certificate security
14.
If you want to specify document permissions, do the following. Otherwise, skip to
Step 16
.
1.
Highlight one or more recipients. Different permissions can be set for different recipients. Select
multiple recipients from the list by using the
Control
or
Shift
keys.
2.
Choose
Permissions
.
3.
When an alert appears stating that non-Adobe products may not respect these settings, choose
OK
.
4.
Check
Restrict printing and editing of the document and security settings
.
Caution:
Adobe products enforce permissions restrictions. However, not all third-party
products fully support and respect these permissions. Encryption and therefore
document access would likely not be impaired, but Adobe cannot guarantee that
individual permissions settings will remain function. Recipients using such third-party
products might be able to bypass some of your restrictions.
Set the permissions as needed: