Apply PDF Security to Reports

DocumentBurster software can be configured to apply standard PDF security features on top of the business reports which are being distributed.

The simplest scenario would be to password protect the business reports which are being distributed and which contain sensitive information. Each PDF report can be secured with a custom password for the recipient which is intended to receive the report.

Following PDF security capabilities are all possible to be implemented for the business reports which are distributed:

  • Set the owner and user PDF passwords
  • Digitally sign the report with a X.509 cert file
  • Set the assemble permission
  • Set the extraction permission
  • Set the fill in form permission
  • Set the modify permission
  • Set the modify annots permission
  • Set the print permission
  • Set the print degraded permission
  • Sets the number of bits for the encryption key. Default is 40

DocumentBurster offers two (2) alternatives to apply PDF security to the reports. Both of the methods will get the job done and you are free to choose the one which you will find it to be the most convenient for yourself.

  • encrypt.groovy
  • Execute the free Pdftk – The PDF Toolkit utility during the endExtractDocument report bursting life-cycle

1. encrypt.groovy

This PDF security sample script is coming built-in with DocumentBurster. By default the script will password protect each output report using the unique burst token, however this can be customized in order to fetch the password from some other sources.

Complete documentation about this script can be found in Chapter 1. Using scripts to achieve
more -> Sample scripts -> encrypt.groovy
from the DocumentBurster – Advanced report delivery scenarios document.

2. Pdftk – The PDF Toolkit is a simple tool for doing everyday operations with PDF documents. Using this tool it is easy to apply passwords or security restrictions to the PDF reports.

Install Pdftk

  • Please download pdftk from this location –
  • Make sure to download the binaries which are specific to the target operating system.
  • Move the pdftk.exe and libiconv2.dll in the folder where DocumentBurster was installed, next to the DocumentBurster.exe file.

Complete documentation about executing Pdftk during the report bursting flow can be found in Chapter 1. Using scripts to achieve more -> Sample scripts -> exec_pdftk_background.groovy from the DocumentBurster – Advanced report delivery scenarios document.

Feel free to download DocumentBurster and see for yourself how this software can help in applying PDF security to the reports which your organization is distributing to all business partners.