When to use
Custom authentication is the right choice when:- Recipients are already authenticated in your system.
- You want to integrate signing into your existing application flow.
- You need specific authentication methods (biometrics, SSO, multi-factor).
- You want to embed the ceremony in your application.
- Send the URL via email or SMS with your own branding.
- Redirect the recipient directly to the ceremony.
- Embed the ceremony in your application interface.
- Include the URL in push notifications.
Creating a custom authentication ceremony
On envelope creation (automatic)
Set the recipient’s ceremony authentication tocustom when creating the envelope. Include your authentication details in the provider and data properties.
Custom authentication ceremony on envelope creation
ceremony.url for each recipient:
Response (excerpt)
Create Ceremony endpoint (manual)
Use the Create Ceremony endpoint to create a custom authentication ceremony after the envelope is created.Creating a new ceremony automatically revokes any previous ceremony for that recipient. Only the most recent ceremony remains active.
Create custom authentication ceremony
url property in the response is the ceremony URL to deliver to the recipient.
Response
Authentication provider
Setprovider to the name of the company or application that authenticated the recipient. This value appears in the audit log:
John Doe has been authenticated by [Provider Name]
Authentication data
Thedata property holds key-value pairs that link the ceremony to your authentication records. These values appear in the envelope audit log.
The values in
data must be sufficient to verify how the recipient was authenticated. In edge cases such as legal proceedings, you may need to provide your internal records to confirm the recipient’s identity.When using custom authentication, retain all records necessary to prove authentication. Review our Terms & Conditions for details.- Session data: Session IDs and session start timestamps that link to your authentication records.
- User identification: Email addresses, phone numbers, or user IDs from your system.
- Authentication method: The method used (OTP, biometrics, SSO) and relevant details like device IDs or IP addresses.
- Transaction references: Hashes, nonces, or other unique identifiers.
Using the ceremony URL
After creating the ceremony, you receive the URL. You can:- Send a customized email using your own domain and branding.
- Embed the ceremony in your application.
- Redirect the recipient from your application directly to the ceremony.
Audit log
When a recipient accesses a ceremony using custom authentication, SignatureAPI records the timestamp, provider, and authentication data. The audit log entry looks like this:12/31/2025 11:59:59 PM
John Doe (#7161cf07) has been authenticated by SuperApp:
Session ID: a4f9e8b2-7c1d-4b2d-9a4b-e0c5d6f7a1b3
Order Reference: 25005
Authenticated At: Dec 31, 2025 23:59:59
Authentication Method: SMS
Phone Number: +1-111-1111111
IP Address: 100.100.100.100
As provided by the initiator of the electronic signature transaction.