Online / 6 & 7 February 2021


ONLYOFFICE: How to provide ultimate security for real-time document collaboration

Nowadays, lots of users are concerned about the safety of their confidential data when it comes to online collaboration. And their concerns are fully justified.

So we at ONLYOFFICE, an open-source project with the focus on advanced and secure document processing, do our best to provide a comprehensive level of security for online doc editing and collaboration.

With GDPR compliant ONLYOFFICE Docs, you get a wide range of security tools and services to protect yourself from unauthorized access, data leaks, or insider actions. Self-hosted ONLYOFFICE can be installed on your own private server, so all your data always stays ‘in-house.’ The server level of data protection is implemented, among other things, with JSON Web Token and configurable cache lifetime. Important is, that no user data is stored on the ONLYOFFICE server. Besides, there are additional security features such as restriction on copying, downloading and printing, watermarking, flexible document permissions, etc.

The same applies to the integration of ONLYOFFICE Docs with other open-source services and platforms so that users of the combined solutions also get secure document editing and co-authoring.

To make your experience even more secure, last year we implemented:

  • Custom filter access permission that allows hiding the data you don’t want to show before sharing your spreadsheet. In other words, users won’t be able to change the filter you’ve applied before sharing your spreadsheet and will be able to work only with the specified fields.

  • Storage encryption so that you can protect data at rest against breaches. If the storage encryption option is enabled, all the files stored in your ONLYOFFICE will be encrypted using the Advanced Encryption Standard, symmetric block cipher, also known as Rijndael, that encrypt data blocks of 128 bits using symmetric keys of 256 bits.

  • The first version of ONLYOFFICE Private Rooms, protected workplaces where every symbol you type is encrypted using the unbreakable AES-256 algorithm, even if you are co-editing documents with your teammates in real-time. Files that are created, stored and shared within a Private Room never leave the directory and cannot be copied, re-distributed, or decrypted. Document encryption and decryption is performed strictly on the user’s machine end-to-end.

Besides, we are now working on multi-functional secure forms for building any document template and secure form filling when your co-author is not permitted to see some parts of the doc.


Alex Mikheev