Acrobat 8 Family of Products
Security Feature User Guide 4
3.2.4 Searching for Digital ID Certificates.....................................................................................................................34
3.3 Certificate Trust Settings..................................................................................................................36
3.3.1 Setting Certificate Trust............................................................................................................................................37
3.3.2 Setting Certificate Policy Restrictions .................................................................................................................39
3.3.3 Using Certificates for Certificate Security (Encryption).................................................................................40
3.4 Using Directory Servers to Add Trusted Identities ........................................................................40
3.4.1 Manually Configuring a Directory Server...........................................................................................................41
3.4.2 Editing Directory Servers Details ..........................................................................................................................42
3.4.3 Deleting a Directory Server.....................................................................................................................................42
3.4.4 Specifying a Default Directory Server .................................................................................................................43
3.4.5 Importing and Exporting Directory Server Settings ......................................................................................43
3.5 Managing Contacts...........................................................................................................................43
3.5.1 Viewing and Editing Contact Details...................................................................................................................43
3.5.2 Emailing Certificate or Contact Data ...................................................................................................................44
3.5.3 Saving Certificate or Contact Details to a File ..................................................................................................44
3.5.4 Associating a Certificate with a Contact.............................................................................................................45
3.5.5 Changing a Trusted Identity’s Certificate Association ..................................................................................45
3.5.6 Deleting Contacts and Certificates.......................................................................................................................46
4 Document Security Basics....................................................................................................48
4.1 Security Method Basics ....................................................................................................................48
4.1.1 Choosing a Security Method Type .......................................................................................................................49
4.1.2 Security Policies...........................................................................................................................................................50
4.1.3 Security Methods and Encryption........................................................................................................................50
4.1.3.1 Encryption Workflow.......................................................................................................................................50
4.1.3.2 Choosing What to Encrypt ............................................................................................................................51
4.1.3.3 Choosing an Algorithm ..................................................................................................................................51
4.1.4 Security Methods and Permissions......................................................................................................................52
4.1.4.1 Permissions Workflow.....................................................................................................................................53
4.1.4.2 Permissions Options........................................................................................................................................53
4.1.5 Associating Batch Processing with a Security Method.................................................................................54
4.2 Changing and Viewing Security Settings .......................................................................................55
4.2.1 Viewing Document Encryption and Permission Settings............................................................................55
4.2.2 Viewing Document Restrictions............................................................................................................................56
4.2.3 Viewing Security Settings in a Browser ..............................................................................................................57
4.2.4 Changing the Security Method Type ..................................................................................................................57
4.2.5 Editing Security Method Settings.........................................................................................................................58
4.2.6 Removing Document Security...............................................................................................................................58
4.3 Security Policies: Reusable Security Settings.................................................................................59
4.3.1 Creating Security Policies with Policy Manager ..............................................................................................60
4.3.2 Applying a Security Policy to a Document........................................................................................................60
4.3.3 Viewing a Security Policy.........................................................................................................................................61
4.3.4 Copying a Security Policy ........................................................................................................................................61
4.3.5 Editing a Security Policy...........................................................................................................................................61
4.3.6 Making a Security Policy Favorite.........................................................................................................................62
4.3.7 Refreshing the Security Policy List .......................................................................................................................62
4.3.8 Deleting a Security Policy........................................................................................................................................62
4.4 Envelopes ..........................................................................................................................................63
5 Password Security ................................................................................................................65
5.1 Creating Password Security Settings ..............................................................................................66