|By An Bui||
|July 29, 2014 07:00 AM EDT||
Every DocuSign envelope uses email authentication for security. If you require an extra level of security on your documents, you can add additional authentication methods.
In addition to the standard email authentication, DocuSign provides three authentication methods and allows you to select one or two additional authentication options for each envelope recipient. You can use different authentication options for each recipient.
When using the Access Code Authentication option, signers must enter an access code you've created prior to viewing the document.This is a common form of additional authentication.
For more information on other Signer Authentication options, please review Signer Authentication Options.
To add an access code to an envelope as a sender, follow these steps:
- Create a new envelope.
- Add documents to the envelope normally.
- Add a recipient normally.
- Click on the Identify drop-down to select the authentication option you want to use for the recipient.
- Click to enable the Access Code field, then enter the desired access code (access codes can include upper case or lower case letters, numbers, and special characters).
Note: You must provide this access code to your recipient. It is recommended that you provide the code over the phone or using some other secure method. There is no additional fee for using this authentication check. The maximum length of an Access Code is 50 characters.
- Add any other recipients for the envelope.
Note: You are not required to set any security options for the other recipients.
- Add the Email Subject and any Email messages, select any Envelope Settings, add tags to the documents, and complete sending your envelope normally.
The envelope is sent and any recipient with an active security option must complete the authentication before they can access the envelope.
To view an envelope that requires an access code as a signer, follow these steps:
- Open the DocuSign notification email from the sender and click View Documents.
- Enter the code provided to you by the sender, then click Validate.
Note: You have three attempts to enter the code. If you fail to enter the correct code on the third attempt, the sender will be notified and must resend the document. If you have not received the code or lost it, click I never received an access code to prompt the sender to resend it.
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mo...
May. 5, 2015 09:00 AM EDT Reads: 4,017
Chuck Piluso will present a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Speaker Bio: Prior to Data Storage Corporation (DSC), Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of ...
May. 5, 2015 09:00 AM EDT Reads: 825
While Docker continues to be the darling of startups, enterprises and IT innovators around the world, networking continues to be a real mess. Indeed, managing the interaction between Docker containers and networks has always been fraught with complications. Without automation in networking, the vision of running Docker at scale and letting IT run the same apps unchanged on the laptop and in the data center or for any cloud cannot be realized.
May. 5, 2015 09:00 AM EDT Reads: 790
ScriptRock has been included in the list of "Cool Vendors" in the "Cool Vendors in DevOps 2015" report by Gartner, Inc.* ScriptRock provides visibility into the configuration state of an organization's IT environments, enabling the continuous delivery of mission critical services. For enterprises where downtime is not an option, ScriptRock's system-wide overwatch offers the assurance that misconfigurations and anomalies are caught before they affect the business. By satisfying this fundamental ...
May. 5, 2015 08:50 AM EDT Reads: 106
To manage complex web services with lots of calls to the cloud, many businesses have invested in Application Performance Management (APM) and Network Performance Management (NPM) tools. Together APM and NPM tools are essential aids in improving a business's infrastructure required to support an effective web experience... but they are missing a critical component - Internet visibility. Internet connectivity has always played a role in customer access to web presence, but in the past few years u...
May. 5, 2015 08:45 AM EDT Reads: 1,372
SYS-CON Events announced today Isomorphic Software, the global leader in high-end, web-based business applications, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software ...
May. 5, 2015 08:45 AM EDT Reads: 704
Working with Big Data is challenging, especially when decision makers depend on market insights and intelligence from your data but don't have quick access to it or find it unusable. In their session at 6th Big Data Expo, Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia; Zel Bianco, President, CEO and Co-Founder of Interactive Edge of Solgenia; and Ermanno Bonifazi, CEO & Founder at Solgenia, discussed how a revolutionary cloud-based BI along with mobile analytics is already c...
May. 5, 2015 08:30 AM EDT Reads: 4,610
May. 5, 2015 08:00 AM EDT Reads: 3,544
May. 5, 2015 08:00 AM EDT Reads: 3,637
May. 5, 2015 08:00 AM EDT Reads: 1,789
May. 5, 2015 08:00 AM EDT Reads: 662
May. 5, 2015 08:00 AM EDT Reads: 739
May. 5, 2015 07:45 AM EDT Reads: 2,940
May. 5, 2015 07:30 AM EDT Reads: 3,574
May. 5, 2015 07:15 AM EDT Reads: 1,237