Specifications
Endpoint Encryption for Files and Folders client 
| 83 
Accessing encrypted files 
Figure44:EndpointEncryptionforFilesandFoldersauthentication 
To access encrypted information, users simply open the files as they would normally. 
If the files are encrypted, users will be presented with a Endpoint Encryption for Files 
and Folders authentication screen as above. 
If the user has a correct personal ID and password, and the users account has been 
assigned to the key used to protect the files then they will be able to access them. 
The first time encrypted data is accessed Endpoint Encryption for Files and Folders 
communicates over TCP/IP with a Endpoint Encryption Server, and downloads a copy 
of the encryption key used to protect the data. Encryption keys may be cached locally, 
so a connection to the Endpoint Encryption Server is not required when the key is 
needed again. Other keys can only be used online, and a connection to the Endpoint 
Encryption Server is needed each time a key is required. 
You can find out more about Keys in the About Encryption keys chapter of this
 guide. 
To summarize the access restrictions for encrypted data: 
1.  The user must have valid Endpoint Encryption for Files and Folders credentials. 
2.  The user’s Endpoint Encryption account must be allocated to the key used to 
encrypt the data. 
3.  The key must be cached locally, or a connection must be possible to the Endpoint 
Encryption Server. 
NOTE:WithEndpointEncryptionforFilesandFoldersitisimportanttorememberthatthefilesarenot
encryptedwithauseridandpassword,theyareencryptedwithacentrallycontrolledkey,orauserlocally
generatedkey.Accesstothedataisonlypossibleiftheus
ercansuc
cessfullyauthenticatetoaccessthekey.










