Qualified Electronic Seal
This guide helps you perform qualified electronic sealing in testing and production environments.
Step 1: Upload a Document
Upload the Document to Seal. The Document must be a PDF. All constraints that apply to Signature Documents also apply to Electronic Seal Documents. Note that your Document can also be password-protected, like Signature Documents.
Upload your Document with the Electronic Seal Document upload endpoint:
curl --request POST \
--url https://{baseUrl}/electronic_seal_documents \
--header 'Authorization: Bearer {apiKey}' \
--header 'accept: application/json' \
--header 'content-type: multipart/form-data' \
--form 'file=@"/Users/user/document.pdf"'
{
"id": "{{documentId}}",
"total_pages": 2,
"created_at": "2024-01-18T22:59:00+00:00"
}
Note the response id
, so you will be able to reuse it for the actual Sealing.
Step 2: Create your secret
In order to ensure the integrity and authenticity of your requests to activate the Qualified Electronic Seal, you have to create a secret corresponding to a JWS (JSON Web Signature). A JWS corresponds to a signed JWT (JSON Web Token).
The creation of this JWS requires the following information:
- Header
- Payload
- Private key, corresponding to the private key created during the Qualified Seal Certificate generation following this process, that will be used for the JWT encryption.
Sandbox use
As a first step, please reach out to your customer representative so you are allowed to use this feature in Sandbox.
For Sandbox use, the following shared private key must be used:
-----BEGIN EC PARAMETERS----- BggqhkjOPQMBBw== -----END EC PARAMETERS----- -----BEGIN EC PRIVATE KEY----- MHcCAQEEIJSo3MhRNE8/DCFSAqNNJsAVuVJFOJJ5z4NwOmMlZCo/oAoGCCqGSM49 AwEHoUQDQgAELgdwOSjPeGOlUAdEZ6mbQFFA4VN+WAsA80RpEYMug2+mhEpNXPe1 K4yBYoi0gisHiceykyCeSIOXn9llf5VsYw== -----END EC PRIVATE KEY-----
⚠️ This private key is dedicated to Sandbox use and integration testing purposes. It does not allow to perform sealing operations with legal value.
Header
The header is an object containing the parameters describing the cryptographic operations and parameters used. It must include the following parameters:
alg
: identifies the cryptographic algorithm used to secure the JWS. OnlyES256
algorithm is supported for now.typ
: declares the encoded object type of the JWS. OnlyJWT
is supported for now.
Example:
{
"alg": "ES256",
"typ": "JWT"
}
Payload
The payload is an object containing information to be secured and some JWT Claims. It must include the following information:
iat
: identifies the time at which the JWT was issued. Its value must be a UNIX timestamp, UTC format.exp
: identifies the expiration time on or after which the JWT must not be accepted for processing. Its value must be a UNIX timestamp, UTC format.nbf
: identifies the time before which the JWT MUST NOT be accepted for processing.document_hash
: hash of the Document to Seal that you uploaded in Upload a Document step.
Example:
{
"iat": 1740669749,
"exp": 1740669809,
"nbf": 1740669749,
"document_hash": "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9..."
}
Document hash
A Document hash is a unique signature that helps to identify the document in a verifiable way. This information is requested in order to ensure that the Sealed Document is the one you uploaded initially.
SHA-256
hash function must be used.
To compute this hash, some libraries are provided by several programming languages or command line tools on Unix or Windows systems.
Secret (JWS) generation
Like Document hash computation, the generation of your JWS can be performed with programming languages such as Python, PHP or Java for example, for which libraries are available (see PyJWT
for Python orfirebase/php-jwt
for PHP or jjwt
for JAVA) or in command line on Unix or Windows systems.
Example of JWS:
eyJ0eXAiOiJKV1QiLCJhbGciOiJFUzI1NiJ9.eyJpYXQiOjE3NDA0MTgyNTcsImV4cCI6MTc0MDQxOTQ1NywiZG9jdW1lbnRfaGFzaCI6IjNkZjc5ZDM0YWJiY2E5OTMwOGU3OWNiOTQ0NjFjMTg5MzU4MjYwNGQ2ODMyOWE0MWZkNGJlYzE4ODVlNmFkYjQifQ.OwQLhDIN4FYa3chapBLhmRSzYDzc7Vtg3rccJcAjdNSBObJdOxBuFc4c-2nRPFWbMw5e6TYteV6rkvo5gIphL
If you have trouble with this secret generation step, just ask your customer representative for help.
Step 3: Seal the Document
You can now proceed with the actual Sealing of the Document. A typical Seal payload for Qualified Electronic Seal consists of 4 items:
- The
secret
generated in the previous step; - The
document_id
for the Document to Seal (retrieved in step one); - The
signature_level
set toqualified_electronic_signature
to specify you want to create a Qualified Electronic Seal; - One or more
fields
, of which at least 1 field of typeseal
(see Add Fields to your Electronic Seal for more details on fields and how to use them);- To be noted that the Qualified Seal payload only accepts one
seal
field.
- To be noted that the Qualified Seal payload only accepts one
- For other properties, please refer to Create an Electronic Seal
For now, let us create a Qualified Seal with the Electronic Seal creation endpoint:
curl --request POST \
--url https://{baseUrl}/electronic_seals \
--header 'Authorization: Bearer {apiKey}' \
--header 'accept: application/json' \
--header 'content-type: application/json' \
--data '
{
"secret": "{{yourSecret}}",
"document_id": "{{documentId}}",
"signature_level": "qualified_electronic_signature",
"fields": [
{
"type": "seal",
"page": 1,
"height": 100,
"width": 100,
"x": 0,
"y": 0
}
]
}
'
{
"id": "1365283d-0ba5-4a08-9a58-9818ef428320",
"status": "pending",
"signature_level": "advanced_electronic_signature",
"created_at": "2024-01-18T22:59:00+00:00",
"document_id": "{{documentId}",
"timestamp": true,
"image_id": null,
"external_id": null
}
Don't forget to replace secret
and documentId
with the actual values retrieved from previous steps.
After creation, your Seal will have a status of pending
. This means that it is will soon be processed (see the different statuses here).
Step 4: Download your Sealed Document
Once the Seal has been processed (see the dedicated guide for that purpose), you can download the Sealed Document using Document download endpoint:
curl --request GET \
--url https://{baseUrl}/electronic_seal_documents/{documentId}/download \
--header 'Authorization: Bearer {apiKey}' \
--header 'accept: application/pdf' \
--output 'document.pdf'
The signature panel in a PDF viewer will show you that the Document has been Sealed using your certificate.
Updated 1 day ago