Page cover

DMS Workspace E-Signature

DMS Workspace E-Signature is one of the leading eSignature platforms, offering a comprehensive suite of electronic signature and digital transaction management solutions.

Welcome to E-Signature REST API

Here you'll find all the documentation you need to get up and running with our APIs.

Document Signature

Here's an overview of the electronic signature process:

  1. Document Preparation: The first step in the electronic signature process is to prepare the document that needs to be signed. This can be done using various document creation tools or by converting existing paper documents into digital formats.

  2. Signature Placement: Once the document is prepared, the signer can place their electronic signature at the appropriate location within the document. This can be done using a mouse, stylus, touchscreen, or by typing their name into a designated field.

  3. Signature Authentication: TTo guarantee the authenticity and integrity of electronic signatures, we employ cryptographic methods, specifically digital certificates.

  4. Document Encryption: To protect the privacy and security of the signed document, it will be encrypted using encryption algorithms. This helps prevent unauthorized access to the document and ensures that it cannot be tampered with after it has been signed.

  5. Signature Capture: Once the signer has placed their electronic signature and authenticated themselves, the signature is captured and embedded into the document. This creates a legally binding representation of the signer's intent to agree to the contents of the document.

  6. Document Distribution: After the document has been signed, it can be distributed to all parties involved in the transaction. This can be done electronically via email, file sharing platforms, or our document management system.

  7. Audit Trail: To maintain a record of the signing process and ensure compliance with legal and regulatory requirements, an audit trail will be generated. This records information such as the date and time of the signature, the identity of the signer, and any authentication methods used.

Signature Validation

Electronic signature validation summary will provide an overview of the results of validating electronic signatures on digital documents. It includes information about whether the signatures are valid, any issues encountered during validation, and additional details about the validation process.

  1. Document Information: Details about the digital document being validated, such as its name, file type, size, and creation/modification timestamps.

  2. Signer Information: Information about the signer(s) of the document, including their name, email address, organization, role, and any additional identifying information.

  3. Signature Details: Information about each electronic signature present in the document, including the signature timestamp, signature algorithm, certificate issuer, and certificate expiration date.

  4. Validation Results: A summary of the validation results for each signature, indicating whether the signature is valid, invalid, or not applicable. This section may also include details about any issues encountered during validation, such as expired certificates, missing signatures, or signature tampering.

  5. Validation Methodology: Details about the validation methodology used, including the cryptographic algorithms, digital certificate validation procedures, and compliance with relevant electronic signature standards (e.g., PAdES, XAdES, CAdES).

  6. Trust Information: Information about the trustworthiness of the digital certificates used for signing, including the certificate authority (CA) chain, certificate revocation status, and any additional trust anchors or certificate policies.

  7. Compliance and Standards: Confirmation of compliance with relevant electronic signature laws, regulations, and industry standards (e.g., eIDAS in Europe, ESIGN Act in the United States).

  8. Recommendations: Recommendations for further actions based on the validation results, such as accepting the signatures, requesting re-signing, or further investigation into validation issues.

Compliance

Compliance

Security Policy

Security Policy

Want to jump right in?

Feeling like an eager beaver? Jump in to the quick start docs and get making your first request

Quick Start

Want to deep dive?

Dive a little deeper and start exploring our API reference to get an idea of everything that's possible with the API:

REST API

Last updated