Authentication Order Rules
SignatureAPI enforces specific rules for combining authentication methods: The table below shows which authentication methods you can use as the first step or as a secondary (or later) step in a ceremony.| Authentication Method | First Step Allowed | Second Step and Up Allowed |
|---|---|---|
| Email Link Authentication | ✅ | ❌ |
| Email Code Authentication | ✅ | ✅ |
| Custom Authentication | ✅ | ❌ |
- First Step Allowed: You can use this method as the initial authentication step.
- Second Step and Up Allowed: You can use this method after another authentication method (as a secondary or later step).
Common Combinations
Custom + Email Code
Combine custom authentication with email code for enhanced verification. Use case: When you want to authenticate the signer in your own application, and also require SignatureAPI to independently verify the signer’s identity (by sending a verification code to their email).Recipient Experience
Email Link + Email Code
Combine email link with email code for enhanced email-based verification. Use case: When you want SignatureAPI to send the signature request email automatically, but also need to authenticate the recipient’s access inside the ceremony for compliance reasons (e.g., HIPAA requirements).Recipient Experience
Best Practices
- Match Your Use Case: Choose authentication combinations that align with your security requirements and user experience goals
- Consider User Experience: More authentication steps provide stronger verification but may impact user convenience
- Test Combinations: Always test the complete authentication flow in test mode before production
Limitations
- A ceremony supports a maximum of 5 authentication methods
- Custom and email link authentication can only be used as the first method
- Custom and email link authentication cannot be combined together
- Recipients must complete all authentication methods in sequence before they can sign documents
- Cannot use duplicate authentication methods in the same ceremony