|By Mat Rider||
|July 29, 2014 07:00 AM EDT||
Every DocuSign envelope uses email authentication for security. If you require an extra level of security on your documents, you can add additional authentication methods.
In addition to the standard email authentication, DocuSign provides three authentication methods and allows you to select one or two additional authentication options for each envelope recipient. You can use different authentication options for each recipient.
When using the Access Code Authentication option, signers must enter an access code you've created prior to viewing the document.This is a common form of additional authentication.
For more information on other Signer Authentication options, please review Signer Authentication Options.
To add an access code to an envelope as a sender, follow these steps:
- Create a new envelope.
- Add documents to the envelope normally.
- Add a recipient normally.
- Click on the Identify drop-down to select the authentication option you want to use for the recipient.
- Click to enable the Access Code field, then enter the desired access code (access codes can include upper case or lower case letters, numbers, and special characters).
Note: You must provide this access code to your recipient. It is recommended that you provide the code over the phone or using some other secure method. There is no additional fee for using this authentication check. The maximum length of an Access Code is 50 characters.
- Add any other recipients for the envelope.
Note: You are not required to set any security options for the other recipients.
- Add the Email Subject and any Email messages, select any Envelope Settings, add tags to the documents, and complete sending your envelope normally.
The envelope is sent and any recipient with an active security option must complete the authentication before they can access the envelope.
To view an envelope that requires an access code as a signer, follow these steps:
- Open the DocuSign notification email from the sender and click View Documents.
- Enter the code provided to you by the sender, then click Validate.
Note: You have three attempts to enter the code. If you fail to enter the correct code on the third attempt, the sender will be notified and must resend the document. If you have not received the code or lost it, click I never received an access code to prompt the sender to resend it.
Sep. 26, 2016 04:30 PM EDT Reads: 1,614
Sep. 26, 2016 04:30 PM EDT Reads: 3,326
Sep. 26, 2016 04:30 PM EDT Reads: 2,067
Sep. 26, 2016 04:15 PM EDT Reads: 1,016
Sep. 26, 2016 04:00 PM EDT Reads: 2,508
Sep. 26, 2016 04:00 PM EDT Reads: 2,816
Sep. 26, 2016 03:45 PM EDT Reads: 2,896
Sep. 26, 2016 03:30 PM EDT Reads: 1,554
Sep. 26, 2016 03:00 PM EDT Reads: 1,549
Sep. 26, 2016 02:45 PM EDT Reads: 2,603
Sep. 26, 2016 02:30 PM EDT Reads: 2,540
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Sep. 26, 2016 02:15 PM EDT Reads: 2,097
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
Sep. 26, 2016 02:00 PM EDT Reads: 1,716
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
Sep. 26, 2016 01:45 PM EDT Reads: 2,570
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Sep. 26, 2016 01:30 PM EDT Reads: 1,168