Configuring document security users and administrators

Assigning document security roles to administrators

Your AEM forms environment contains one or more administrator users who have the appropriate privileges for creating users and groups. If your organization is using document security, at least one administrator must also be assigned the privilege to manage invited and local users.

The administrators must also have the administration console User role to access administration console. (See Creating and configuring roles.)

Configuring visible users and groups

To view users and groups in selected domains during policy user searches, a super administrator or policy set administrator must select and add domains (created in User Management) to the visible user and group list for each policy set.

The visible user and group list is visible to the policy set coordinator and is used to restrict which domains the end user can browse when choosing users or groups to add to policies. If this task is not performed, the policy set coordinator will not find any users or groups to add to the policy. There can be more than one policy set coordinator for any given policy set.

  1. After you install and configure your AEM forms environment with document security, set up all appropriate domains in User Management.

    note: Creating domains must be done before any policies can be created.

  2. In administration console, click Services > Document Management > Policies and then click the Policy Sets tab.

  3. Select Global Policy Set and then click the Visible Users And Groups tab.

  4. Click Add Domain(s) and add existing domains as required.

  5. Navigate to Services > document security > Configuration > My Policies and click the Visible Users And Groups tab.

  6. Click Add Domain(s) and add existing domains as required.

Add the extended authentication provider

AEM forms provides a sample configuration that you can customize for your environment. Perform the following steps:

NOTE
Extended authentication is supported on Apple Mac OS X with Adobe Acrobat release 11.0.6 and above.
  1. Obtain the sample WAR file deploy it. See the installation guide appropriate for your application server.
  2. Ensure that the Forms Server has a fully qualified name instead of IP addresses as the base URL and that it is a HTTPS URL. See Server configuration settings.
  3. Enable Extended Authentication from the Server Configuration page. See Server configuration settings.
  4. Add the required SSO redirect URLs in the User Management configuration file. See Add SSO redirect URLs for extended authentication.

Add SSO redirect URLs for extended authentication

With extended authentication enabled, users opening a policy protected document in Acrobat XI or Reader XI get a dialog for authentication. This dialog loads the HTML page that you specified as the extended authentication landing URL on the document security server settings. See Server configuration settings.

NOTE
Extended authentication is supported on Apple Mac OS X with Adobe Acrobat release 11.0.6 and above.
  1. In administration console, click Settings > User Management > Configuration > Import And Export Configuration Files.

  2. Click Export and save the configuration file to your disk.

  3. Open the file in an editor, and locate the AllowedUrls node.

  4. In the AllowedUrls node, add the following lines: <entry key="sso-l" value="/ssoexample/login.jsp"/> <entry key="sso-s" value="/ssoexample"/> <entry key="sso-o" value="/ssoexample/logout.jsp"/>

    <entry key="sso-l" value="/ssoexample/login.jsp"/>
    <entry key="sso-s" value="/ssoexample"/>
    <entry key="sso-o" value="/ssoexample/logout.jsp"/>
    
  5. Save the file, and then import the updated file from the Manual Configuration page: In administration console, click Settings > User Management > Configuration > Import And Export Configuration Files.

Configuring offline security

document security provides the ability to use policy-protected documents offline without an Internet or network connection. This ability requires that the policy allow offline access, as described in Specify the document permissions for users and groups. Before a document having such a policy can be used offline, the recipient must open the document while online and enable offline access, by clicking Yes when prompted. The recipient may also be requested to authenticate his identity. The recipient can then use documents offline for the duration of the offline lease period that is specified in the policy.

When the offline lease period ends, the recipient must synchronize again with document security either by opening a document online or by using an Acrobat or Acrobat Reader DC extensions menu command to synchronize. (See Acrobat Help or the appropriate Acrobat Reader DC extensions Help.)

Because documents that allow offline access require caching key material on the computer where the files are stored offline, the file can potentially be compromised if an unauthorized user can obtain the key material. To compensate for this possibility, scheduled and manual key rollover options are provided that you can configure to prevent an unauthorized person from using the key to access the document.

Set a default offline lease period

Recipients of policy-protected documents can take the documents offline for the number of days specified in the policy. After initially synchronizing the document with document security, the recipient can use it offline until the offline lease period expires. When the lease period expires, the recipient must take the document online and log in to synchronize with document security to continue using the document.

You can configure a default offline lease period. The lease period can be changed from the default when anyone creates or edits a policy.

  1. On the document security page, click Configuration > Server Configuration.
  2. In the Default Offline Lease Period box, type the number of days for the offline lease period.
  3. Click OK.

Manage key rollovers

Document security uses encryption algorithms and licenses to protect documents. When it encrypts a document, document security generates and manages a decryption key called a DocKey that it passes to the client application. If the policy that protects a document permits offline access, an offline key called a principal key is also generated for each user who has offline access to the document.

NOTE
If a principal key does not exist, document security generates one to secure a document.

To open a policy-protected document offline, the user’s computer must have the appropriate principal key. The computer obtains the principal key when the user synchronizes with document security (opens a protected document online). If this principal key is compromised, any document to which the user has offline access might also be compromised.

One way to lessen the threat to offline documents is to avoid permitting offline access to particularly sensitive documents. Another method is to periodically roll over the principal keys. When document security rolls the key over, any existing keys can no longer access the policy-protected documents. For example, if a perpetrator obtains a principal key from a stolen laptop, that key cannot be used to access the documents that are protected after the rollover occurs. If you suspect that a specific principal key has been compromised, you can manually roll over the key.

However, a key rollover affects all principal keys, not just one. It also reduces the scalability of the system because clients must store more keys for offline access. The default key rollover frequency is 20 days. It is recommended not to set this value lower than 14 days because people may be prevented from viewing offline documents and system performance may be affected.

In the following example, Key1 is the older of the two principal keys, and Key2 is the newer one. When you click the Rollover Keys Now button the first time, Key1 becomes invalid, and a newer, valid principal key (Key3) is generated. Users will obtain Key3 when they synchronize with document security, typically by opening a protected document online. However, users are not forced to synchronize with document security until they reach the maximum offline lease period specified in a policy. After the first key rollover, users who remain offline can still open offline documents, including those protected by Key3, until they reach the maximum offline lease period. When you click the Rollover Keys Now button a second time, Key2 becomes invalid, and Key4 is created. Users who remain offline during the two key rollovers are not able to open documents protected with Key3 or Key4 until they synchronize with document security.

Change the key rollover frequency

For confidentiality purposes, when you are using offline documents, document security provides an automatic key rollover option with a default frequency period of 20 days. You can change the rollover frequency; however, avoid setting the value lower than 14 days because people may be prevented from viewing offline documents and system performance may be affected.

  1. On the document security page, click Configuration > Key Management.
  2. In the Key Rollover Frequency box, type the number of days for the rollover period.
  3. Click OK.

Manually roll over principal keys

To maintain confidentiality of offline documents, you can manually roll over principal keys. You may find it necessary to manually roll over a key (for example, if the key is compromised by someone who obtains it from a computer where it is cached to enable offline access to a document).

NOTE
Avoid frequently using manual rollover because it causes all principal keys to roll over, not just one, and may temporarily prevent users from viewing new documents offline.

The principal keys must be rolled over twice before previously existing keys on client computers are invalidated. Client computers that have invalidated principal keys must re-synchronize with the document security service to acquire the new principal keys.

  1. On the document security page, click Configuration > Key Management.
  2. Click Rollover Keys Now and then click OK.
  3. Wait approximately 10 minutes. The following log message appears in the server log: Done RightsManagement key rollover forN principals. Where N is the number of users in the document security system.
  4. Click Rollover Keys Now and then click OK.
  5. Wait approximately 10 minutes.

Configuring event auditing and privacy settings

Document security can audit and record information about events that are related to interaction with policy-protected documents, policies, administrators, and the server. You can configure event auditing, and you can specify the types of events to audit. To audit events for a particular document, the auditing option on the policy must also be enabled.

When auditing is enabled, you can view details of the audited events on the Events page. document security users can also view events that are related specifically to the policy-protected documents that they use or create.

You can select these types of events for auditing:

  • Policy-protected document events, such as attempts by authorized or unauthorized users to open documents
  • Policy events, such as creating, changing, deleting, enabling, and disabling of policies
  • User events, such as external user invitations and registrations, activated and deactivated user accounts, changes to user passwords, and profile updates
  • AEM forms events, such as version mismatches, unavailable directory server and authorization providers, and server configuration changes

Enable or disable event auditing

You can enable and disable auditing of events related to the server, policy-protected documents, policies, policy sets, and users. When you enable event auditing, you can choose to audit all the possible events or you can select specific events to audit.

When you enable the server auditing, you can view the audited events on the Events page.

  1. In administration console, click Services > Document Security > Configuration > Audit and Privacy Settings.

  2. To configure server auditing, under Enable Server Auditing, select Yes or No.

  3. If you selected Yes, under each event category, do one of the following actions to select the options to audit:

    • To audit all events in the category, select All.

    • To audit only some events, deselect All, and then select the check boxes beside the events you want to audit.

      (See Event auditing options.)

  4. Click OK.

NOTE
When working with the web pages, avoid using the browser buttons, such as the back button, refresh button, and the back or forward arrow because this action can cause unwanted data capture and data display problems.

Enable or disable privacy notification

You can enable and disable a privacy notification message. When you enable privacy notification, a message appears when a recipient attempts to open a policy-protected document. The notice informs the user that the document usage is being audited. You can also specify a URL that the user can use to view your privacy policy page if one is available.

  1. In administration console, click Services > Document Security> Configuration > Audit and Privacy Settings.

  2. To configure the privacy notification, under Enable Privacy Notice, select Yes or No.

    If the policy attached to a document allows anonymous user access and Enable Privacy Notice is set to No, the user is not prompted to log in and the privacy notification message is not displayed.

    If the policy attached to a document does not allow anonymous user access, the user will see the privacy notification message.

  3. If applicable, in the Privacy URL box, type the URL to your privacy policy page. If the Privacy URL box is left blank, the privacy page from adobe.com is displayed.

  4. Click OK.

NOTE
Disabling the privacy notice does not disable document usage auditing. Out of the box auditing actions and custom actions supported via extended usage tracking can still collect user behavior information.

Import a custom audit event type

If you are using a document security-enabled application that supports auditing of additional events, such as events specific to a certain file type, an Adobe partner can provide you with custom audit events that you can import into document security. Use this feature only if you have been provided with custom event types by an Adobe partner.

  1. In administration console, click Services > Document Security > Configuration > Event Management.
  2. Click Browse to go to the XML file to import and click Import.
  3. Importing overwrites existing custom audit event types on the server if identical event code and namespace combinations are found.
  4. Click OK.

Delete a custom audit event type

  1. In administration console, click Services > document security > Configuration > Event Management.
  2. Select the check box next to the custom audit event type to delete and click Delete.
  3. Click OK.

Export audit events

You can export audit events to a file for archiving purposes.

  1. In administration console, click Services > Document Security > Configuration > Event Management.

  2. Edit the settings under Export Audit Events as required. You can specify:

    • the minimum age of the audit events to export
    • the maximum number of audit events to include in a single file. The server generates one or more files, based on this value.
    • the folder where the file will be created. This folder is on the Forms Server. If the folder path is relative, then it is relative to your application server root directory.
    • the file prefix to use for the audit events files
    • the format of the file, either a comma-separated values (CSV) file that is compatible with Microsoft Excel or an XML file.
  3. Click Export. If you want to cancel the export, click Cancel Export. If another user has scheduled an export, the Cancel Export button is unavailable until that export is complete. The Cancel Export button is unavailable if another user has scheduled an export. To check whether a scheduled Export or Delete has started or finished, click Refresh.

Delete audit events

You can delete audit events that are older than a specified number of days.

  1. In administration console, click Services > Document Security > Configuration > Event Management.
  2. Under Delete Audit Events, specify the number of days in the Delete Audit Events Older Than box.
  3. Click Delete. Click Export. If you want to cancel the delete, click Cancel Delete. If another user has scheduled a delete, the Cancel Delete button is unavailable until that export is complete. The Cancel Delete button is unavailable if another user has scheduled an export. To check whether a scheduled Delete has started or finished, click Refresh.

Event auditing options

You can enable and disable event auditing and specify the types of events to be audited.

Document events

View Document: A recipient views a policy-protected document.

Close Document: A recipient closes a policy-protected document.

Print Low resolution A recipient prints a policy-protected document with the low-resolution option specified.

Print High resolution: A recipient prints a policy-protected document with high-resolution option specified.

Add Annotation to Document: A recipient adds an annotation to a PDF document.

Revoke Document: A user or administrator revokes access to a policy-protected document.

Unrevoke Document: A user or administrator reinstates access to a policy-protected document.

Form Filling: A recipient enters information into a PDF document that is a fillable form.

Removed Policy: A publisher removes a policy from a document to withdraw the security protections.

Change Document Revocation URL: A call from the API level changes the revocation URL that is specified to access a new document that replaces a revoked document.

Modify Document: A recipient changes the content of a policy-protected document.

Sign Document: A recipient signs a document.

Secure a New Document: A user applies a policy to protect a document.

Switch Policy on Document: A user or administrator switches the policy that is attached to a document.

Publish Document As: A new document whose documentName and license are identical to an existing document is registered on the server, and the documents do not have a parent-child relationship. This event can be triggered using the AEM forms SDK.

Iterate Document: A new document whose documentName and license are identical to an existing document is registered on the server, and the documents have a parent-child relationship. This event can be triggered using the AEM forms SDK.

Policy events

Created Policy: A user or administrator creates a policy.

Enabled Policy: An administrator makes a policy available.

Changed Policy: A user or administrator changes a policy.

Disabled Policy: An administrator makes a policy unavailable.

Deleted Policy: A user or administrator deletes a policy.

Change Policy Owner: A call from the API level changes the policy owner.

User events

Deleted User: An administrator deletes a user account.

Register Invited User: An external user registers with document security.

Successful Login: Successful login attempts by administrators or users.

Invited Users: Document security invites a user to register.

Activated Users: External users activate their accounts by using the URL in the activation email, or an administrator enables an account.

Change Password: Invited users change their passwords or an administrator resets a password for a local user.

Failed Login: Failed login attempts by administrators or users.

Deactivated Users: An administrator disables a local user account.

Profile Update: Invited users change their name, organization name, and password.

Account Locked: An administrator locks an account.

Policy Set Events

Created Policy Set: An administrator or policy set coordinator creates a policy set.

Deleted Policy Set: An administrator or policy set coordinator deletes a policy set.

Modified Policy Set: An administrator or policy set coordinator changes a policy set.

System events

Directory Synchronization Complete: This information is not available from the Events page. The current directory synchronization information, including the current synchronization state and time of the last synchronization, is displayed on the Domain Management page. To access the Domain Management page in administration console, click Settings > User Management > Domain Management.

Client Enable Offline Access: A user enabled offline access to documents that are secured against the server on the user’s computer.

Synchronized Client Client application must synchronize information with the server to allow for offline access.

Version Mismatch: A version of the AEM forms SDK that is incompatible with the server attempted to connect to the server.

Directory Synchronization Information: This information is not available from the Events page. The current directory synchronization information, including the current synchronization state and time of the last synchronization, is displayed on the Domain Management page. To access the Domain Management page in administration console, click Settings > User Management > Domain Management.

Server Configuration Change: Changes to the server configuration that are done either through the web pages or manually by importing a config.xml file. This includes changes to the base URL, session time-outs, login lockouts, directory settings, key rollovers, SMTP server settings for external registration, watermark configuration, display options, and so on.

Configuring extended usage tracking

Document security can track various custom events that may be performed on a protected document. You can enable the tracking of events from the document security server at the global level or at a policy level. You can then set up a JavaScript to capture specific actions performed within the protected PDF document such as clicking a button, or saving the document. This usage data is sent as an XML file in key-value pairs, which you can use for further analysis. End users who access the protected documents can allow or decline such tracking from the client application.

If tracking is enabled at the global level, you can override this setting at the policy level and disable it for a particular policy. Policy-level overriding is not possible if tracking is disabled at the global level. The list of tracked events is automatically pushed to the server when the event count reaches 25 or when the document is closed. You can also configure your script to explicitly push the event list as per your requirements. You can customize the event tracking by accessing the document security object properties and methods.

After you enable tracking, all policies that are subsequently created will have tracking turned on by default. Policies created prior to tracking being enabled on the server will need manual updates.

Enable or disable extended usage tracking

Before you begin, ensure that Server Auditing is enabled. See Configuring event auditing and privacy settings for more information on auditing.

  1. In administration console, click Services > Document Security > Configuration > Audit and Privacy Settings.
  2. To configure extended usage tracking, under Enable Tracking, select Yes or No.
  3. To set the selection of the Allow collection of detailed usage data check box on the log in page, under Enable Tracking default, select Yes or No.

To view the tracked events you can use the Document Events filter on the Events page. The events tracked using JavaScript are labelled as Detailed Usage Tracking. Refer to Monitoring events for more information on events.

Configure document security display settings

  1. In administration console, click Services > document security > Configuration > Display Options.
  2. Configure the settings and click OK.

Display settings

Rows to display for search results: Number of rows that appear on a page when searches are performed.

Customization for client login dialog

These settings control the text displayed in the login prompt that appears when a user logs into document security through a client application.

Welcome Text: The welcome message text, such as “Please Login with Your User name and Password”. The welcome message text should contain information on how to log in to document security and how to contact an administrator or other designated support person in your organization for assistance. For example, external users may need to contact an administrator if they forget their passwords or need assistance with the registration or login process. The maximum length of the welcome text is 512 characters.

User Name Text: The text label for the user name box.

Password Text: The text label for the password box.

Customization for client certificate authentication dialog

These settings control the text displayed in the certificate authentication dialog box.

Choose Authentication Type Text: The text displayed to direct a user to select an authentication type.

Choose Certificate Text: The text displayed to direct a user to select a certificate type.

Certificates Not Available Error Text: Message of up to 512 characters to display when the selected certificate is not available.

Customization for client certificate display

Only Display Trusted Credential Issuers: When this option is selected, the client application presents the user with only certificates from credential issuers that AEM forms is configured to trust (See Managing certificates and credentials.) When this option is not selected, the user is presented with a list of all certificates on the user’s system.

Configure dynamic watermarks

Using document security, you can configure default settings for the dynamic watermark option that you can apply when you create policies. A watermark is an image that is superimposed over text in the document. It is useful for tracking the content of a document and can help identify illegal use of the content.

A dynamic watermark can consist of either text made up of defined variables such as user ID and date and custom text, or rich content within a PDF. You can configure watermarks with several elements each with its own positioning and formatting.

Watermarks are not editable and therefore they are a more secure method of ensuring the confidentiality of the document content. Dynamic watermarks also ensure that a watermark shows enough user-specific information to act as a deterrent to further distributing the document.

The watermark that a policy specifies appears in the policy-protected document when a recipient views or prints the document. Unlike permanent watermarks, a dynamic watermark is never saved in the document, which provides the flexibility that is necessary when deploying a document in an intranet environment to ensure that the viewing application displays the identity of the specific user. Also, if a document has multiple users, the use of the dynamic watermark means you can use one document instead of multiple versions, each with a different watermark. The watermark that appears reflects the identity of the current user.

Notice that dynamic watermarks are different from the watermarks that users can add directly to the document in Acrobat. The result is that you can have two watermarks in a policy-protected document.