Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

How to revoke document access

in Blog, Document Security, DRM, PDF Security

Why revoking document access is important & how to do it effectively.

In this blog, we discuss the different types of document revocation and what solutions you can use to implement them for PDF documents.

When it comes to document protection, much of the focus is on prevention – stopping documents from leaking, preventing editing, and preventing sharing.  The reality, however, is that a system that does not account for failure is not an effective system.  Or, as renowned security professional Bruce Schneier puts it:

While hyperbolic, the message is clear.  No security system, document or otherwise, is one hundred percent effective.  If you do not have the tools in place to detect and act on misuse, you are forgoing a key part of the security process.

This is one of the reasons that document revocation is so important.  Even with the best document security tools in place, you can’t account for everything.  Perhaps an employee inadvertently sent the wrong document to the wrong people.  Perhaps you believe from tracking usage that somebody you sent a document to is misusing it.  Or maybe it’s something less malicious: the information you provided initially is simply out of date.

Generally, then the need to revoke documents falls into two categories: planned and unplanned.  We’ll be exploring each today, as well as the controls you need to execute them and the type of solution you should be looking for to deliver this.

   Planned disposal

The most common reason for documents to be revoked is because they have outlived their usefulness.  Much like food, many documents have a “sell-by date” – a time after which the information in them is considered too outdated and potentially dangerous.  This is especially true with material like training courses, where documents may be constantly updated.  Keeping old documents in circulation could result in new or old employees referring to practices that are no longer the best way of doing things.

Embargo and copyright expiry are other common reasons for revocation.  Documents may be distributed internally or to press ahead of time, then revoked and reworked for public release.  With books, meanwhile, copyright expires 70-years after the author’s death.  As a result, you may want to expire paid documents and issue new, copyright-free ones at that point, or remove current restrictions after the fact.

For libraries and digital book rental services, document expiry is an essential part of business.  To retain the “loan” structure and prevent illegal distribution, it’s necessary to cut off a reader’s access after a defined period or extend that access after a loan is extended.  You also need controls to stop copying and DRM removal, or the user will just create a new copy of the document without the same restrictions.  Optionally, you may want to expire documents after a number of opens, views or prints.

   Unplanned disposal

While most of us would prefer all of our document revoking to fall into the former category, it’s sadly rarely the case.  There are many scenarios in which it’s necessary to remove access to a document on the fly.

For publishers, for example, it may be necessary to revoke copies of an e-book with a major error and redistribute the accurate version.  Membership associations and subscription services, too, may have to revoke access to a document suddenly when a member decides to cancel or when dues are not paid.

Perhaps the most crucial use for document revocation, though, is removing access when a document is misused.  Whether it’s a publisher fallen prey to piracy or an enterprise whose confidential meeting minutes have leaked, having the ability to revoke access can greatly reduce harm.

To be able to do so, however, organizations must have comprehensive controls in place.  The document needs to be checked over the internet to ensure that access is still allowed, either on each open or at regular intervals.  It’s also necessary to have the ability to revoke access to a single or all documents on a per-user and per-publication basis.

   Choosing the right solution

Though several types of solutions claim to protect documents, such as secure data rooms and Adobe’s PDF security, most don’t have the controls necessary to effectively enforce both types of revocation.

  Secure data rooms


Secure data rooms usually use passwords as an authentication method to access the secure server space that houses the document.  This is not effective for multiple reasons.  Firstly, a user can just share their login password to grant somebody else access to the document.

Secondly, data rooms are accessed via the browser, and the browser is not a secure environment.  It cannot enforce certain restrictions, such as the blocking of third-party screen grabbing tools. Users can also manipulate the browser via its developer mode or plugins, extracting the document’s text in many cases.  For an example of how insecure JavaScript-based browser controls are, see how easy it is to bypass Google Docs security.

Finally, they miss out on the core aspect of security mentioned earlier: the ability to revoke the document if it does leak.  Once a user downloads, prints to PDF, or otherwise extracts a document, the admin loses all control over it.  It can no longer be revoked or tracked.

  Adobe PDF security


Adobe security that uses password encryption can be trivially bypassed in numerous ways.  Documents can be decrypted with a password for viewing, and that password can be passed onto others.  Though users can place a separate password to prevent editing, printing, copy-pasting, etc., this is enforced not by cryptography but by the viewer application itself.  All somebody needs to do to bypass it is use a viewer application that does not enforce the permissions password, or upload it to an online removal tool.

Adobe Acrobat has no built-in revocation tools either, so once a document is distributed there’s no ‘undo’ button.

  Azure Information Protection


MicroSoft Azure Information Protection or RMS provides protection of documents in the cloud.  It enables admins to encrypt MS document formats, and, through policies embedded in the documents, prevent the content from being decrypted by unauthorized users.  Specific document operations like printing, copying, editing, forwarding, etc. can be allowed or disallowed, tracking can be enabled, and admins can revoke protected files remotely.

However, an attack in 2016 showed that authorized users could remove the protection, thus rendering it useless.  This paper details how to break Microsoft RMS – it covers all RMS implementations, including Azure rights management, AD RMS and Office 365.  All a end-user needs is view access to remove the RMS protection from a protected file.

  PDF DRM solutions


For serious protection, the best choice is a fully-fledged PDF DRM system like Locklizard Safeguard.  With Safeguard, organizations can manage everything on the fly from a web portal, revoking documents and applying print, view, and time limits, while effectively cutting out unauthorized copying.  At the same time, it has less overhead and requires less groundwork than traditional certificate-based systems, making it a no-brainer for document expiry and revocation.

Here’s how it works:

  1. You encrypt a PDF on your local PC and add any DRM controls you want to enforce.
  2. Your protected PDF is saved to your disk and a document record is created on the Admin System.
  3. You create a user account for each user you want to view your protected confidential PDF.
  4. An email is automatically sent to the user with a link to the Viewer and their license file.
  5. Once the Viewer is installed and the license file activated (clicked-on) it is registered to that device and cannot be registered elsewhere (unless otherwise specified).
  6. You control from the Admin System which protected documents each user can access.
  7. You distribute your DRM protected PDF just like any other file (email, file sharing site, etc.).

Thus, only people who are authorized to view the document can open or print it, and nobody can edit or copy it.  Depending on your DRM license controls and restrictions, you can also deny users the ability to screengrab or view outside of select countries or locations.  Safeguard also allows admins to track document views/prints to identify misuse.

  How to revoke document access using Safeguard PDF DRM

Safeguard PDF security allows you to revoke document access for all users, individual users, and devices (in case a device is lost or compromised).  Note: Revocation cannot occur in offline access mode.  Documents must be set to connect to the licensing server when opened, either every time or when an Internet connection is available.

  Revoking a user account so they can no longer view any documents

Revoking a user account can be useful in a number of circumstances.  For publishers, the most common use case is when a user purchases an ebook and then performs a chargeback on their credit card.  You may also want to revoke a user’s access to all documents if they leave your company or you suspect them of misuse:

  1. In the ‘Customers’ tab, click ‘Manage’, then tick the user’s name
  2. Change the ‘With all checked’ dropdown to ‘Suspend’ and press ‘OK’
  3. Press ‘SUSPEND’ on the confirmation dialog.

  Revoking a document so that it can no longer be viewed by anyone

If you want to stop a document from being accessible to all users, you can do so.  This is handy if the document has a mistake in it and you need to re-issue it, if the document it out of copyright, if one was distributed accidentally, etc.

  1. Open the ‘Documents’ tab and press the ‘Details’ arrow next to the document you’d like to revoke.
  2. In the details panel, find the ‘Manage Access’ section and press ‘Grant or revoke access’.
  3. Press ‘Check’ link to check all users and change ‘With all checked’ to ‘Revoke Access’.

    Press ‘OK’ to apply the changes.  None of the customers in your database will be able to access the document.

  Revoking access on certain devices

Safeguard restricts documents to devices, but what happens if that device is lost, stolen, or purposefully given away?  Even if your device is encrypted without a password or physical security key, you should not assume your documents are safe.  Instead, revoke the device’s access in the ‘Customer’ section of the admin portal:

  1. Click the ‘Details’ arrow next to the customer whose device you’d like to revoke.
  2. Press ‘Suspend or Activate’ next to the ‘Device:’ section under the ‘License information’ heading.
  3. Tick the machine(s), change the ‘With all checked:’ dropdown to ‘Suspend’ and press ‘OK’.

  Revoking individual user access to a document

It’s a good practice to revoke a user’s access to a document when they no longer have a reasonable reason to access the information.  This can be achieved through the ‘Documents’ tab in the admin portal:

  1. Press the ‘Details’ arrow next to the document and click ‘Grant or revoke access’.
  2. Tick the users you’d like to revoke, change ‘With all checked’ to ‘Revoke Access’ and click ‘OK’.

   The best PDF security solution

To summarize, Safeguard represents a significant upgrade in security compared to other solutions on the market.  Through the use of strong cryptography, secure licensing, and a bespoke file format/viewer application, it is able to prevent authorized viewing, copying, editing, screenshotting, and more.  Crucially, there are also mitigations in place should the system fail (for example somebody loses their device).

Though DRM can be more expensive than other solutions, in the vast majority of cases it will outlive its value.  Leaks and piracy can cost organizations millions, while a PDF DRM solution can be had for a few thousand dollars.

Take a free 15 day trial of our PDF DRM software to instantly revoke document access regardless of location.

Tags: adobe pdf security, data room security, digital rights management, encrypt a pdf, pdf drm, pdf drm security, pdf security, pdf security restrctions, revoke document access, revoke documents, revoke file access, revoke pdf
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: How to Change PDF Security Settings after Sending Link to: How to Change PDF Security Settings after Sending How to Change PDF Security Settings after SendingLink to: How to protect a PDF securely Link to: How to protect a PDF securely How to protect a PDF securely
Scroll to top Scroll to top Scroll to top