You can combine multiple authentication methods in a ceremony to create layered authentication workflows. This provides flexibility in how recipients access and authenticate for signing ceremonies.
SignatureAPI enforces specific rules for combining authentication methods:
The table below shows which authentication methods you can use as the first step or as a secondary (or later) step in a ceremony. Use this as a quick reference when designing your authentication workflow.
Authentication Method | First Step Allowed | Second Step and Up Allowed |
---|---|---|
Email Link Authentication | ✅ | ❌ |
Email Code Authentication | ✅ | ✅ |
Custom Authentication | ✅ | ❌ |
Combine custom authentication with email code for enhanced verification.
Use case: When you want to authenticate the signer in your own application, and also require SignatureAPI to independently verify the signer’s identity (by sending a verification code to their email).
Your Application
The recipient authenticates in your system (custom authentication)
Ceremony Access
You direct them to the ceremony URL or embed the ceremony UI in your app
Email Verification
SignatureAPI prompts for additional email verification.
Code Entry
Recipient enters the 9-digit code from their email
Signing
Recipient proceeds to sign documents
Combine email link with email code for enhanced email-based verification.
Use case: When you want SignatureAPI to send the signature request email automatically, but also need to authenticate the recipient’s access inside the ceremony for compliance reasons (e.g., HIPAA requirements).
Email Link
Recipient clicks the ceremony link in the email sent by SignatureAPI
Email Verification
SignatureAPI prompts for additional email verification for compliance
Code Entry
Recipient enters the 9-digit verification code from their email
Signing
Recipient proceeds to sign documents
Match Your Use Case: Choose authentication combinations that align with your security requirements and user experience goals
Consider User Experience: More authentication steps provide stronger verification but may impact user convenience
Test Combinations: Always test the complete authentication flow in test mode before production