Adobe 22020737 Acrobat X Pro Manual - Page 234

Change encryption settings, Sharing certificates with others, For a PDF Portfolio

Page 234 highlights

USING ACROBAT X PRO 228 Security 7 Click Next to review your settings, and then click Finish. When a recipient opens the PDF or PDF Portfolio, the security settings you specified for that person are used. More Help topics "About digital IDs" on page 238 "Get certificates from other users" on page 229 "About PDF Portfolios" on page 95 "Signed and certified PDF Portfolios" on page 264 Change encryption settings 1 Do one of the following: • For a single PDF or a component PDF in a PDF Portfolio, open the PDF. • For a PDF Portfolio, open the PDF Portfolio and choose View > Portfolio > Cover Sheet. 2 Select Tools > Protection > More Protection > Security Properties. If you don't see the Protection panel, see the instructions for adding panels at "Task panes" on page 9. 3 Click Change Settings. 4 Do any of the following, and then click Next. • To encrypt different document components, select that option. • To change the encryption algorithm, choose it from the menu. 5 Do any of the following: • To check a trusted identity, select the recipient, and then click Details. • To remove recipients, select one or more recipients, and then click Remove. Do not remove your own certificate unless you do not want access to the file using that certificate. • To change permissions of recipients, select one or more recipients, and then click Permissions. 6 Click Next, and then click Finish. Click OK to close the Document Properties dialog box, and save the document to apply your changes. Remove encryption settings 1 Do one of the following: • For a single PDF or a component PDF in a PDF Portfolio, open the PDF. • For a PDF Portfolio, open the PDF Portfolio and choose View > Portfolio > Cover Sheet. 2 Select Tools > Protection > Encrypt > Remove. If you don't see the Protection panel, see the instructions for adding panels at "Task panes" on page 9. 3 If prompted, type the permissions password. If you don't know the permissions password, contact the author of the PDF. Sharing certificates with others Businesses that use certificates for secure workflows often store certificates on a directory server that participants can search to expand their list of trusted identities. Last updated 10/11/2011

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496

228
USING ACROBAT X PRO
Security
Last updated 10/11/2011
7
Click Next to review your settings, and then click Finish.
When a recipient opens the PDF or PDF Portfolio, the security settings you specified for that person are used.
More Help topics
About digital IDs
” on page
238
Get certificates from other users
” on page
229
About PDF Portfolios
” on page
95
Signed and certified PDF Portfolios
” on page
264
Change encryption settings
1
Do one of the following:
For a single PDF or a component PDF in a PDF Portfolio, open the PDF.
For a PDF Portfolio, open the PDF Portfolio and choose View > Portfolio > Cover Sheet.
2
Select Tools > Protection > More Protection > Security Properties. If you don’t see the Protection panel, see the
instructions for adding panels at “
Task panes
” on page
9.
3
Click Change Settings.
4
Do any of the following, and then click Next.
To encrypt different document components, select that option.
To change the encryption algorithm, choose it from the menu.
5
Do any of the following:
To check a trusted identity, select the recipient, and then click Details.
To remove recipients, select one or more recipients, and then click Remove. Do not remove your own certificate
unless you do not want access to the file using that certificate.
To change permissions of recipients, select one or more recipients, and then click Permissions.
6
Click Next, and then click Finish. Click OK to close the Document Properties dialog box, and save the document
to apply your changes.
Remove encryption settings
1
Do one of the following:
For a single PDF or a component PDF in a PDF Portfolio, open the PDF.
For a PDF Portfolio, open the PDF Portfolio and choose View > Portfolio > Cover Sheet.
2
Select Tools > Protection > Encrypt > Remove. If you don’t see the Protection panel, see the instructions for adding
panels at “
Task panes
” on page
9.
3
If prompted, type the permissions password. If you don’t know the permissions password, contact the author of the PDF.
Sharing certificates with others
Businesses that use certificates for secure workflows often store certificates on a directory server that participants can
search to expand their list of trusted identities.