SYS-CON MEDIA Authors: Yeshim Deniz, Elizabeth White, Pat Romanski, Ian Khan, AppDynamics Blog

Blog Feed Post

Quick Tip Tuesday: Add Extra Security to DocuSign Envelopes with Signer Authentication Access Codes

Every DocuSign envelope uses email authentication for security. If you require an extra level of security on your documents, you can add additional authentication methods. 

In addition to the standard email authentication, DocuSign provides three authentication methods and allows you to select one or two additional authentication options for each envelope recipient. You can use different authentication options for each recipient.

When using the Access Code Authentication option, signers must enter an access code you've created prior to viewing the document.This is a common form of additional authentication.

For more information on other Signer Authentication options, please review Signer Authentication Options.

To add an access code to an envelope as a sender, follow these steps:

  1. Create a new envelope.
  2. Add documents to the envelope normally.
  3. Add a recipient normally.
  4. Click on the Identify drop-down to select the authentication option you want to use for the recipient.
    https://www.docusign.com/sites/default/files/images/Quick%20Tips%20Blog/July%2022nd/e.png
  5. Click to enable the Access Code field, then enter the desired access code (access codes can include upper case or lower case letters, numbers, and special characters).
    https://www.docusign.com/sites/default/files/images/Quick%20Tips%20Blog/July%2022nd/h.png
    Note: You must provide this access code to your recipient. It is recommended that you provide the code over the phone or using some other secure method. There is no additional fee for using this authentication check. The maximum length of an Access Code is 50 characters.
     
  6. Add any other recipients for the envelope.
    Note: You are not required to set any security options for the other recipients.
  7. Add the Email Subject and any Email messages, select any Envelope Settings, add tags to the documents, and complete sending your envelope normally.

The envelope is sent and any recipient with an active security option must complete the authentication before they can access the envelope.

To view an envelope that requires an access code as a signer, follow these steps:

  1. Open the DocuSign notification email from the sender and click View Documents.
    https://www.docusign.com/sites/default/files/images/Quick%20Tips%20Blog/July%2022nd/i.png
  2. Enter the code provided to you by the sender, then click Validate.
    https://www.docusign.com/sites/default/files/images/Quick%20Tips%20Blog/July%2022nd/j.png
    Note: You have three attempts to enter the code. If you fail to enter the correct code on the third attempt, the sender will be notified and must resend the document. If you have not received the code or lost it, click I never received an access code to prompt the sender to resend it.

 

Blog Category:

Blog Image: 
Blog Banner Image: 

Read the original blog entry...

More Stories By An Bui

Social Media Professional with substantial experience identifying, characterizing and connecting online communities and authors. Strong orientation on actionable recommendations that provide mutually beneficial value for communities and organizations for stakeholders.

Currently, I serve as the social media manager for DocuSign, Inc., the market leader and global standard for electronic signature. DocuSign provides the world’s largest and fastest growing electronic signature platform, empowering businesses to complete transactions online quickly and securely while improving compliance and dramatically reducing costs.

DocuSign is the only cloud computing-based electronic signature platform that entirely replaces slow, expensive paper transactions with a fast, efficient and completely digital solution. Accessible from any Internet-connected device, DocuSign supports virtually any document and form type in simple and complex workflows, and provides broad user authentication options, data collection, secure document/data storage and retrieval, as well as real-time negotiation and collaboration tools.

Latest Stories
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mo...
Chuck Piluso will present a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Speaker Bio: Prior to Data Storage Corporation (DSC), Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of ...
While Docker continues to be the darling of startups, enterprises and IT innovators around the world, networking continues to be a real mess. Indeed, managing the interaction between Docker containers and networks has always been fraught with complications. Without automation in networking, the vision of running Docker at scale and letting IT run the same apps unchanged on the laptop and in the data center or for any cloud cannot be realized.
ScriptRock has been included in the list of "Cool Vendors" in the "Cool Vendors in DevOps 2015" report by Gartner, Inc.* ScriptRock provides visibility into the configuration state of an organization's IT environments, enabling the continuous delivery of mission critical services. For enterprises where downtime is not an option, ScriptRock's system-wide overwatch offers the assurance that misconfigurations and anomalies are caught before they affect the business. By satisfying this fundamental ...
To manage complex web services with lots of calls to the cloud, many businesses have invested in Application Performance Management (APM) and Network Performance Management (NPM) tools. Together APM and NPM tools are essential aids in improving a business's infrastructure required to support an effective web experience... but they are missing a critical component - Internet visibility. Internet connectivity has always played a role in customer access to web presence, but in the past few years u...
SYS-CON Events announced today Isomorphic Software, the global leader in high-end, web-based business applications, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software ...
Working with Big Data is challenging, especially when decision makers depend on market insights and intelligence from your data but don't have quick access to it or find it unusable. In their session at 6th Big Data Expo, Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia; Zel Bianco, President, CEO and Co-Founder of Interactive Edge of Solgenia; and Ermanno Bonifazi, CEO & Founder at Solgenia, discussed how a revolutionary cloud-based BI along with mobile analytics is already c...
"SOASTA built the concept of cloud testing in 2008. It's grown from rather meager beginnings to where now we are provisioning hundreds of thousands of servers on a daily basis on behalf of customers around the world to test their applications," explained Tom Lounibos, CEO of SOASTA, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
Recent technology advances in miniaturization has positioned the wearables as the pinnacle of technology convergence with the human body. We inquire if wearables are mere standard miniaturized devices extended with the connectivity and present our views on considerations like design, applications, performance, efficiency, interoperability, usage scenarios, human device interaction and consequent trade-offs enabling wearables to impart optimal value.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading in...
In his session at 16th Cloud Expo, Simone Brunozzi, VP and Chief Technologist of Cloud Services at VMware, will review the changes that the cloud computing industry has gone through over the last five years and share insights into what the next five will bring. He will chronicle the challenges enterprise companies are facing as they move to the public cloud. He will delve into the “Hybrid Cloud” space and explain why every CIO should consider ‘hybrid cloud’ as part of their future strategy to a...
“This win means a great deal to us because it is decided by the readers – the people who understand how use of our technology enables new insights that drive the business,” said Matt Davies, senior director, EMEA marketing, Splunk. “Splunk Enterprise enables organizations to improve service levels, reduce operations costs, mitigate security risks, enhance DevOps collaboration, create new product and service offerings and obtain deeper insight into customer behavior. Being named Best Business App...
In his session at DevOps Summit, Andrei Yurkevich, CTO at Altoros, provided an overview of all the benefits and opportunities, as well as drawbacks of deploying Cloud Foundry PaaS with Juju and compared it to BOSH. Discover the features that overlap, and understand what Juju Charm is, what it is not, where you use one or the other or where you use both BOSH and Juju Charms together. Andrei Yurkevich is Cloud Foundry protagonist and CTO at Altoros. Under his supervision, the Altoros engineering ...
Enterprise IoT is an exciting and chaotic space with a lot of potential to transform how the enterprise resources are managed. In his session at @ThingsExpo, Hari Srinivasan, Sr Product Manager at Cisco, will describe the challenges in enabling mass adoption of IoT, and share perspectives and insights on architectures/standards/protocols that are necessary to build a healthy ecosystem and lay the foundation to for a wide variety of exciting IoT use cases in the years to come.