Skip to main content
All CollectionsSecurity
What methods does CloudSign use to identify and authenticate recipients?
What methods does CloudSign use to identify and authenticate recipients?
クラウドサイン運営事務局 avatar
Written by クラウドサイン運営事務局
Updated over a year ago

When a sender sends documents, the recipient receives a confirmation request email from this service containing a unique, randomly-generated URL in order to access documents. This URL is generated in a format that is impossible to guess by third parties.

As such, only the recipient of the email containing the relevant URL can access documents, a method that is used to verify the identity of the actual recipient.

The sender is also able to specify optional authentication using an access code in order to access documents. Authentication using an access code available only to the actual recipient ensures an even stricter identification and authentication process.

See here for details about authentication using access codes.

The high-level authentication request function can also be used to ensure that documents are consented to with an even higher identitfy verification.

High-level authentication request function is a function where the sender requires the recipient to complete two-factor authentication (or IdP authentication) before consenting to documents.

See here for more details about advanced authentication request function

Related Links

Did this answer your question?