The external-sharing control layer for Microsoft 365
DocLoq is an additive control layer over SharePoint, OneDrive, and Teams. Documents stay in your tenant, while access, policy, delivery, and audit are governed in one place.
A governed path for sharing tenant documents externally
DocLoq sits between Microsoft 365 content and external recipients. It does not replace SharePoint, OneDrive, or Teams - it adds the controls enterprises need so external sharing stops being an uncontrolled link.
Identity-bound access
External recipients are verified before they see a document. OTP shares avoid unnecessary guest setup; federated access can align with Entra policies, Conditional Access, MFA, and governance.
Policy before delivery
Expiry, role, view-only, watermarking, and download restrictions are defined before the document is exposed outside the tenant.
Tenant-resident documents
Source files stay where they live in Microsoft 365. DocLoq governs the access workflow around them, not a separate file repository.
Workflow-focused audit
Access events are grouped around the actual external-sharing workflow, so reviewers see who shared what, with whom, under which conditions.
Where DocLoq sits in your Microsoft 365 stack
Additive control layer over tenant content. Documents do not leave their source library. External access can use OTP or federation, depending on policy.
- spSharePoint
- odOneDrive
- tmTeams
Source files stay here. DocLoq references content; it does not copy or rehost it.
- Identity & verificationEntra ID for internal · OTP or federated access for external
- Policy & protectionRole · expiry · watermark · download mode
- Audit & revocationWorkflow-grouped events · revoke at any time
OTP shares avoid unnecessary guest setup. Federated access can follow Entra policy. No software to install.
Additive to Microsoft 365, not a parallel stack
DocLoq complements the Microsoft 365 platform your enterprise has already standardized on.
- 01SharePoint and OneDrive
Source documents remain in SharePoint sites and OneDrive libraries. DocLoq references them rather than duplicating storage.
- 02Microsoft Entra ID
Internal users authenticate with their corporate identity. External access can use OTP for quick secure shares or federated login when Entra policy controls are required.
- 03Microsoft Purview
DocLoq is designed to coexist with Purview classification, sensitivity labels, and DLP policies that already apply to your tenant content.
- 04Teams and Microsoft 365 apps
Sharing originates from the apps people already use. DocLoq does not require external recipients to install anything.
What stays in your tenant, what DocLoq operates on
A precise, item-by-item view for security reviewers. Confirm exact data scope during your evaluation.
- ItemSource documentsMicrosoft 365In SharePoint / OneDrive libraryIn DocLoqReference only - not copied
- ItemDocument renderingMicrosoft 365Original file untouchedIn DocLoqControlled viewer surface for the recipient
- ItemRecipient identityMicrosoft 365Depends on access model and tenant policyIn DocLoqOTP verification or federated access per share
- ItemSharing policyMicrosoft 365-In DocLoqRole · expiry · watermark · download rules
- ItemAudit & activityMicrosoft 365Tenant-side events remain in M365 logsIn DocLoqWorkflow-grouped events for the share
- ItemRevocationMicrosoft 365-In DocLoqSingle action ends recipient access
What happens to documents when they are shared
A clear answer to the first question every IT admin asks during a review.
Source of truth stays in your tenant
The original document continues to live in SharePoint or OneDrive. DocLoq governs access rather than replacing storage.
Controlled rendering for recipients
External recipients access content through a controlled viewer that enforces the policy chosen for that share - view-only, watermarked, time-bound.
Metadata is operational
DocLoq stores the data needed to operate sharing: who has access, with what conditions, and what activity occurred. Confirm the precise data scope as part of your security review.
Lifecycle is explicit
Access can be revoked at any time. Expiry is enforced. Activity is captured for the audit trail and removed in line with retention.
External access with the right identity model
Recipients are verified, and the access model can match the risk, duration, and governance needs of the share.
- Recipient verification
- External users prove who they are before access is granted. OTP works for quick document access; federated login supports scenarios that need Entra policy enforcement.
- No anonymous links
- A DocLoq share is bound to a recipient identity, not a public URL that anyone can forward.
- Time-bound sessions
- Sessions expire. OTP access can avoid unnecessary tenant guest accounts, while federated access can remain governed by your Entra policies.
- Visible to admins
- Admins can see active shares, who has access, and the policy each recipient is operating under.
Controls applied to each share
View-only enforcement
Recipients can read documents without download by default. Download is a deliberate decision, not the only option.
Watermarking
Apply visible watermarks tied to the recipient identity to deter screenshot leaks of sensitive material.
Expiry and time bounds
Set an expiry that matches the engagement and revoke instantly when scope changes.
Protected delivery
Deliver documents through a controlled flow rather than as a direct attachment that leaves the tenant.
Audit and revocation
Sharing events, access activity, and revocation actions are captured for review and export.
Policy templates
Reuse standard combinations of role, expiry, watermarking, and download rules so teams do not configure from scratch each time.
What to check before a demo
Bring these to the first conversation so the walkthrough lines up with your tenant reality.
- 1
Tenant prerequisites
Microsoft 365 tenant, target SharePoint/OneDrive locations, and the team or business unit that should pilot first.
- 2
Identity model
Which flows should use OTP, which should use federated login, and how guest registration should interact with Entra ID policies you already enforce.
- 3
Data scope
The document types, sensitivity labels, and Purview policies that need to coexist with DocLoq sharing.
- 4
Rollout model
Pilot scope, success criteria, and the controls that must be on by default before broader rollout.
- 5
Security review questions
Subprocessors, incident contact, deployment model, and the architecture details your security team needs.
Walk through DocLoq with your IT and security teams
Bring stakeholders to the first conversation. We will walk through the control model directly against one external-sharing workflow.