Adobe 62000236 Extended User Guide - Page 251

How organizational policies are authenticated, Create a user security policy

Page 251 highlights

USING ACROBAT 9 PRO EXTENDED 245 Security • User policies are policies created and applied by individuals. If you apply the same security settings to numerous documents, you can save time by creating a user policy. Then, apply the user policy to documents. User policies for passwords and public key certificates are stored on your local computer. With access to Adobe LiveCycle Rights Management ES, you can create a user policy that's stored on Adobe LiveCycle Rights Management ES. That policy is available only to you. How organizational policies are authenticated In addition to reusing security settings, policies stored on Adobe LiveCycle Rights Management ES enable you to expire and revoke documents (no matter how many copies were created or distributed). You can also maintain accountability by auditing users who open protected documents. A B C Security policies A. Policies are stored on server. B. Policies are applied to a PDF. C. Users can open, edit, and print a document only if permitted by policy. Setting up server-based security policies involves four main stages: Configure the Adobe LiveCycle Rights Management ES The system administrator of your company or group usually configures Adobe LiveCycle Rights Management ES, manages accounts, and sets up organizational policies. For more information on configuring Adobe LiveCycle Rights Management ES, see the Adobe website. Publish a document with a security policy An author creates a PDF and applies a policy stored on Adobe LiveCycle Rights Management ES to the PDF. The server generates a license and unique encryption key for the PDF. Acrobat embeds the license in the PDF and encrypts it using the encryption key. The author or administrator can use this license to track and audit the PDF. View a document with a policy applied When users try to open the secure PDF in Acrobat 9 (or Reader 9), they must authenticate their identities. If the user is granted access to the PDF, the PDF is decrypted and opens with whatever permissions are specified in the policy. Administer events and modify access By logging in to an Adobe LiveCycle Rights Management ES account, the author or administrator can track events and change access to policy-secured PDFs. Administrators can view all PDF and system events, modify configuration settings, and change access to policy-secured PDFs. Create a user security policy User policies can use passwords, certificates, or Adobe LiveCycle Rights Management ES to authenticate documents. The policies for password and certificate security can be stored on a local computer. Security policies created by using Adobe LiveCycle Rights Management ES are stored on a server, so you can audit actions and change security settings dynamically. You can use Adobe LiveCycle Rights Management ES if your company has licensed the software and made it available to you. Last updated 9/30/2011

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546

245
USING ACROBAT 9 PRO EXTENDED
Security
Last updated
9
/30/2011
User policies
are policies created and applied by individuals. If you apply the same security settings to numerous
documents, you can save time by creating a user policy. Then, apply the user policy to documents. User policies for
passwords and public key certificates are stored on your local computer. With access to Adobe LiveCycle Rights
Management ES, you can create a user policy that’s stored on Adobe LiveCycle Rights Management ES. That policy
is available only to you.
How organizational policies are authenticated
In addition to reusing security settings, policies stored on Adobe LiveCycle Rights Management ES enable you to
expire and revoke documents (no matter how many copies were created or distributed). You can also maintain
accountability by auditing users who open protected documents.
Security policies
A.
Policies are stored on server.
B.
Policies are applied to a PDF.
C.
Users can open, edit, and print a document only if permitted by policy.
Setting up server-based security policies involves four main stages:
Configure the Adobe LiveCycle Rights Management ES
The system administrator of your company or group usually
configures Adobe LiveCycle Rights Management ES, manages accounts, and sets up organizational policies. For more
information on configuring Adobe LiveCycle Rights Management ES, see the Adobe website.
Publish a document with a security policy
An author creates a PDF and applies a policy stored on Adobe LiveCycle
Rights Management ES to the PDF. The server generates a license and unique encryption key for the PDF. Acrobat
embeds the license in the PDF and encrypts it using the encryption key. The author or administrator can use this
license to track and audit the PDF.
View a document with a policy applied
When users try to open the secure PDF in Acrobat 9 (or Reader 9), they must
authenticate their identities. If the user is granted access to the PDF, the PDF is decrypted and opens with whatever
permissions are specified in the policy.
Administer events and modify access
By logging in to an Adobe LiveCycle Rights Management ES account, the author
or administrator can track events and change access to policy-secured PDFs. Administrators can view all PDF and
system events, modify configuration settings, and change access to policy-secured PDFs.
Create a user security policy
User policies can use passwords, certificates, or Adobe LiveCycle Rights Management ES to authenticate documents.
The policies for password and certificate security can be stored on a local computer. Security policies created by using
Adobe LiveCycle Rights Management ES are stored on a server, so you can audit actions and change security settings
dynamically. You can use Adobe LiveCycle Rights Management ES if your company has licensed the software and
made it available to you.
A
B
C