Uncompromising Product Security

Fortifying every update with secure development and rigorous security assessments

Product Security

Authentication Security

Authentication Modes

Authentication Modes

emSigner supports native authentication, SSO (SAML 2.0, OpenID Connect), and multi-factor integration with services like Office 365 and Google.

Password Policy

Password Policy

Administrators can enforce customizable password policies, including complexity, expiration, and login attempt limits for enhanced security.

Two-factor Authentication (2FA)

Two-factor Authentication (2FA)

emSigner supports 2FA via OTPs or Google, Microsoft, or emSigner Authenticator apps for enhanced security.

Credential Security

Credential Security

All credentials are securely stored by following industry best practices, including hashing passwords to prevent them from being stored in a readable format.

Additional Product Security

RBAC

Role Based Access Controls (RBAC)

emSigner enforces Role-Based Access Controls (RBAC) to manage user permissions at granular levels, including user, department, and document-specific roles. This ensures that access to workflows, documents, and sensitive information is securely regulated.

Audit Logs

Detailed Audit Logs capture account and user changes, as well as actions performed on documents. These logs can be exported for analysis and provide full visibility into document activity.

Document Log

Document Log

emSigner captures various actions performed by the users on a document, which includes the Sent, Viewed, and Signed/Reviewed data along with the timestamp. It also captures the Operating System, browser, and IP address used by the user while performing the action (s) assigned to the participant.

Disaster Recovery

Disaster Recovery

Through our robust Disaster Recovery (DR) program, emSigner conducts regular business impact assessments to ensure quick recovery of critical services. DR plans are continuously tested for effectiveness.

2FA

Attachment Authentication (2FA)

Administrators can configure attachment visibility for workflows, ensuring that sensitive attachments are accessible only to authorized users.