What is a proof export?
A Cenelira proof export is a signed PDF and CSV record set for schedules selected by a workspace export range.
Proof record
Every schedule selected by the export range becomes a proof record. The record is bundled into a signed PDF for people and a CSV twin for systems. This page describes exactly what is in the export, how the PDF is signed, how a third party verifies it, and what the record does not claim.
The description here is drawn from the schema the product ships. No separate marketing copy is allowed to drift from the code.
A Cenelira proof export is a signed PDF and CSV record set for schedules selected by a workspace export range.
It records approval, target account, platform, publish outcome, exception, recovery, and delivery-set fields from typed server state.
It does not claim audience, reach, or authenticated identity for external reviewers.
Schema v1
One record per schedule, ordered by publish timestamp. Fields with no data render as a neutral placeholder. No value is inferred, no value is rewritten.
Two formats
Both formats carry the same 17 columns and the same record count for a given date range. The PDF is the readable artifact for clients and auditors. The CSV is for machine processing and long-term storage.
A legal-brief styled PDF with one receipt block per schedule, a schema reference page, and a verification page that carries the HMAC-SHA256 signature of the canonical payload. The artifact is tamper-evident: any edit to a field, a timestamp, or a signature value breaks the signature at verification time.
A flat CSV with the same 17 columns in a stable order, packaged alongside a JSON manifest that names the export id, workspace id, date range, generated timestamp, and record count. The CSV is deterministic: the same inputs produce the same bytes.
How it is signed
The signature lives on the PDF verification page. The canonical payload printed there includes the signed manifest fields. Nothing secret is embedded in the artifact. The key id is a deterministic fingerprint of the signing secret; when the secret rotates, the key id rotates.
How to verify
The verification page of every signed PDF prints the exact canonical payload text, the SHA-256 digest of that payload, and the HMAC. Verification reproduces each value.
Reviewer identity
The record tags every approver. There is no ambiguity about how a given approval was captured.
An approver from inside the workspace. The identity is tied to a workspace user account at the moment of approval. The record stores that identity, the timestamp, and the approved version fingerprint.
An approver who used a review link. Cenelira does not authenticate external reviewers. The name and email the reviewer typed are stored on the record and clearly labeled (self-declared) on the PDF. Only internal approvals are cryptographically tied to a Cenelira account.
What the proof does not claim
A proof export is a record of what happened inside Cenelira. Some claims belong to the signer, the reviewer, or the platform, and the artifact is explicit about where each line of evidence comes from.
FAQ
Each selected schedule becomes one proof record with 17 fields, including approval, target account, platform, publish outcome, exception, recovery, and delivery-set fields.
No. The proof export records workflow state and platform response. It does not claim audience, delivery, or reach.
No. External reviewer identity is self-declared. Internal approvals are tied to workspace user accounts.
A verifier copies the canonical payload, checks its SHA-256 digest, then computes HMAC-SHA256 with the shared signing secret and compares the printed signature.
A short checklist on how to run proof-led publishing without breaking it. Leave an email and we will send it when the checklist is ready.