Skip to main content

Share Links

Share your designs securely with stakeholders, clients, and team members through customizable sharing links. Control access, gather feedback, and maintain design confidentiality.

Sharing Options

Access Control Management

1

Permission Levels

Granular access control options:
  • Viewer Permissions
  • Commenter Permissions
  • Collaborator Permissions
View-only access includes:
✅ Design viewing and navigation
✅ Zoom and pan capabilities
✅ Layer inspection (if enabled)
✅ Measurement tools access
✅ Export basic formats (if enabled)

Restrictions:
❌ No editing capabilities
❌ No comment creation
❌ No asset downloads
❌ No sharing permissions
❌ No version history access
2

Time-Based Access

Temporary sharing with automatic expiration:
Interface showing time-based access controls with expiration settings
Temporal access options:
Short-term sharing (1-7 days):
- Client presentations
- Quick feedback rounds
- Emergency reviews
- Time-sensitive approvals

Medium-term sharing (1-4 weeks):
- Project development cycles
- Stakeholder review periods
- User testing phases
- Implementation planning

Long-term sharing (1-6 months):
- Ongoing project access
- Client collaboration
- Documentation reference
- Style guide maintenance

Permanent sharing:
- Public portfolios
- Open source projects
- Educational materials
- Community resources
3

Dynamic Access Control

Smart permission management:
Smart access rules:

Time-based conditions:
- Business hours only access
- Weekend restriction
- Timezone-aware permissions
- Project phase alignment

User-based conditions:
- Role-specific access levels
- Department-based permissions
- Seniority-based privileges
- Project involvement level

Content-based conditions:
- Sensitivity level restrictions
- Confidentiality requirements
- IP protection needs
- Client-specific access
Permission automation:

Project lifecycle integration:
- Discovery phase: Broad access
- Development phase: Team focus
- Review phase: Stakeholder access
- Launch phase: Public sharing

User behavior adaptation:
- Active users: Extended permissions
- Inactive users: Reduced access
- High-value feedback: Enhanced privileges
- Policy violations: Restricted access

Feedback Collection

  • Comment System
  • Approval Workflows
  • Analytics and Insights
Structured feedback collection:

Contextual Comments

Precise feedback placement:
  • Pin comments to specific elements
  • Area-based feedback regions
  • Page-level general comments
  • Design-wide suggestions

Comment Threading

Organized discussions:
  • Reply chains and discussions
  • Comment resolution tracking
  • Status updates and follow-ups
  • Decision documentation
Comment features:
Rich text formatting:
- Bold, italic, underline text
- Bullet points and numbering
- Link insertion and references
- Code snippet inclusion

Media attachments:
- Screenshot annotations
- Reference image uploads
- Document attachments
- Video explanation links

Categorization:
- Feedback type tagging
- Priority level assignment
- Department categorization
- Action item identification

Security and Privacy

1

Data Protection

Comprehensive security measures:
  • Encryption
  • Privacy Controls
Data security:
- TLS 1.3 for data transmission
- AES-256 encryption at rest
- End-to-end encryption for sensitive shares
- Secure key management

Access security:
- Multi-factor authentication support
- SSO integration capabilities
- Session management and timeouts
- Device fingerprinting
2

Compliance Features

Enterprise-grade compliance:
Activity logging:
- User access tracking
- Action timestamps
- IP address logging
- Device information capture

Compliance reporting:
- Access audit reports
- Data handling documentation
- Privacy compliance verification
- Security incident tracking
Data management:
- Retention policy enforcement
- Automatic data purging
- Export and portability
- Right to deletion compliance

Geographic compliance:
- Data residency controls
- Cross-border transfer restrictions
- Regional privacy law compliance
- Localized data processing

Advanced Sharing Features

Branded Sharing

Custom branded experience:
  • Company logo integration
  • Custom color schemes
  • Branded domain usage
  • Personalized welcome messages
  • Corporate footer inclusion

Integration Workflows

Tool ecosystem integration:
  • Slack sharing and notifications
  • Microsoft Teams integration
  • Email client embedding
  • Project management tool sync
  • Calendar meeting integration

Sharing Best Practices

1

Access Strategy

Plan appropriate access levels:
✅ Use least privilege principle
✅ Set appropriate expiration dates
✅ Regular access review and cleanup
✅ Clear sharing purpose communication
✅ Document sharing decisions
2

Feedback Optimization

Maximize feedback quality:
✅ Provide context and objectives
✅ Set clear feedback guidelines
✅ Use structured review processes
✅ Follow up on action items
✅ Acknowledge contributions
3

Security Maintenance

Maintain sharing security:
✅ Regularly audit active shares
✅ Revoke unnecessary access
✅ Monitor for unusual activity
✅ Update security settings
✅ Train team on best practices

Troubleshooting Common Issues

Issue: Users can't access shared designs
Solutions:
- Verify link hasn't expired
- Check permission settings
- Confirm user authentication
- Test link functionality
- Review access restrictions
Issue: Slow loading of shared designs
Solutions:
- Optimize design file size
- Check internet connection
- Use appropriate sharing format
- Enable progressive loading
- Consider embedded alternatives
Issue: Unauthorized access or sharing
Solutions:
- Revoke compromised links
- Enable additional security measures
- Review and update permissions
- Implement stronger authentication
- Audit access logs

Manage Team Permissions

Learn how to set up detailed permission systems for different team roles and responsibilities.Permissions →
I