Identity-bound access
No anonymous links. Access is tied to verified users through one-time passkeys or federated authentication.
A short, honest description of the product constraints we accept and the way we engage with security, IT, and procurement teams running on Microsoft 365.
These are the constraints we have chosen and the patterns we use on every customer engagement. They shape product decisions, deployment scope, and how we respond when things change.
DocLoq adds a dedicated control layer around the external sharing workflow while keeping documents inside Microsoft 365.
No anonymous links. Access is tied to verified users through one-time passkeys or federated authentication.
Define and enforce consistent sharing policies. See who shared what, with whom, and under which conditions.
Control how documents are accessed and used: view-only, watermarking, download restrictions, and protected download.
Works with SharePoint, Teams, and OneDrive. Documents stay in the tenant. No file duplication or reuploading.
Sharing-focused audit visibility, including access activity, permissions, sharing conditions, and revocation events.
Your documents never leave your Microsoft 365 tenant. This is a product constraint we accept and design around, not a marketing line. DocLoq stores tokens, policy, and audit metadata — not your files.
We build on top of SharePoint, OneDrive, Entra ID, and Purview. When Microsoft ships a control that improves the picture, we adopt it rather than reinvent it.
Every shared workspace starts read-only, watermarked, and short-lived. Opening up access — copy, download, longer expiry — is an explicit choice your team makes per workflow.
We publish our architecture summary, subprocessor list, and security posture. We are clear about which controls are in place today and which are on the roadmap.
We collect what we need to operate the service and nothing more. Audit logs and document content stay in your tenant. Telemetry is opt-in for new features.
When something breaks or a use case needs a closer look, customers talk to the people who build the product — not a tier-one queue. Response targets are written into the agreement.
We share what we are building next and what we have decided not to build. Customers shape priorities through a structured feedback channel, not back-channel emails.
Book a demo against your tenant or talk to us about an evaluation scope. We will be specific about what is in the product today.