Embedded Signing Walkthrough
Give your users the ability to sign documents directly on your app or website using Dropbox Sign’s embedded signing feature. The hellosign-embedded library adds the signing experience to your site using an iFrame. The documentation below describes requirements and setup steps for the embedded signing flow. Take a look at our premium branding guide to learn more about customizing your app’s embedded signing.
Preliminary
- Create an API app (login required)
Important
The API app’s domain name controls where the embedded iFrame can be opened. Embedded signing will only be possible on this and it’s subdomains. However, you can use skipDomainVerification to embed requests created using test_mode.
- Save your API app’s Client ID and API Key, which you’ll need to use this feature.
Try Dropbox Sign Embedded
To get a feel for how our library works, you can use our Embedded Testing Tool to quickly test any of our Embedded flows without having to write a single line of JavaScript.
You can request a sample document, or use the custom sign_url that you’ll generate in the Server Side section below.
Server Side
The very first step is to create an embedded signature request from your backend using our API and then fetch the associated url that will be used in the iFrame. Note that embedded signature requests use a different endpoint than non-embedded signature requests. Endpoint: /signature_request/create_embedded
Creating an Embedded Signature Request
Payload
Code
You just created an embedded signature request with two signers (Jack and Jill). In the response object, you will notice both signers have been assigned a unique signature_id. When one of these users visits your site, you will need to use the Dropbox Sign API generate a temporary sign_url using the signer’s unique signature ID.
Important
In order to generate a sign_url the unique signature_id (per signer) will be needed and not the signature_request_id.
Generating a sign_url
Endpoint: /embedded/sign_url/{signature_id}
Important
This call will return HTTP 409 if the signature request has already been signed by this signer or—in the case of ordered signing—the request cannot be signed yet because it’s not their turn. A successful response will return an object which contains a sign_url property. The sign_url is used to load the iFrame on your site using the hellosign-embedded.
Client Side
We provide a client-side library that handles the authorization and display of the embedded request using an iFrame. You can use this feature by adding a few lines of JavaScript code.
If you are using a modern module bundler with npm, simply install hellosign-embedded.
If you are not using a modern module bundler like npm, our library can be downloaded manually, compiled from source, or imported from our CDN.
In your app, import the hellosign-embedded module, instantiate a new client, then invoke open() with your sign_url and API client ID. Note that we’re using skipDomainVerification when calling this method. You can learn more about that in the Domain Restriction section below.
Note
It’s recommended that you add the following to your document’s <head> to avoid unexpected behavior on small screens. <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0">
There are a number of options you can define as part of the second argument when calling open():
Additional notes
App Approval
In order to ensure that integrations adhere to eSignature regulations and best practices, an app approval is needed prior to moving into production for all customers implementing embedded signing, embedded requesting, embedded templates, and OAuth workflows.
Important
You will still be able to use your app in test mode until it gets approved. Only live/production activity requires approval.
Please refer to the App Approval Section for more detailed information about getting your app approved.
Domain Restriction
When the iFrame is loaded, it will verify the domain of the parent window and ensure it matches the domain name of the API app specified by the client ID. If the domain does not match, the page won’t be loaded.
You can disable domain restriction for easier development:
This will allow you to use development domains, like localhost. See the documentation for open() method in the section above.
HTTPS Required
The host page must be served over HTTPS. The iFrame is also loaded over HTTPS, and due to browser security restrictions it will not be able to communicate with the parent window if it is not HTTPS. This communication is required to enable features such as iFrame callbacks and closing the iFrame.
To make development easier, the page will still load if the parent window is served over HTTP, however an alert will be displayed to notify you of this requirement. Switch to HTTPS to prevent this alert from being displayed.
Redirection
If a redirect url is specified, the iFrame will redirect users to it after they send the document(s). Data from the sign event will be appended to the url query string.
Signature Links
Signature URLs are only valid for 60 minutes after /embedded/sign_url has been called and expire as soon as they’re accessed.
It is best practice to wait until your signer hits the page before generating the sign_url so the link doesn’t expire before the signer is ready. However, since the signature_id itself does not expire, a fresh sign_url can always be generated.
Text Tags
The embedded functionality can be used in conjunction with Dropbox Sign Text Tags.
Client Side Events
There are a number of events that the client may emit. To listen to these events, pass the event name and a callback function to on(). An string enumeration of available events can also be found under HelloSign.events.
Here are a list of possible events: