BrandKwikID Documentation
API SuiteDocument Signing

Custom E-Sign (Self-Signing)

Upload a PDF for self-service e-sign. Server-side multipart POST with Bearer auth; returns base64 signed PDF and audit trail.

API reference

Try itLoading playground…
Loading…
AuthorizationBearer <token>

JWT Bearer token authentication. Obtain a token from the KwikID dashboard.

In: header

pdf_filestring

Response Body

curl -X POST "https://__mock__/doc-service/v1/esign/esign-custom" \  -F pdf_file="string"
{
  "audit_trail_pdf_base64": "string",
  "signed_pdf_base64": "string",
  "credits_consumed": "string"
}
{
  "detail": {},
  "message": "string"
}
{
  "detail": {},
  "message": "string"
}

Overview

Call POST /doc-service/v1/esign/esign-custom from your backend with Authorization: Bearer <token> and multipart/form-data containing pdf_file (binary PDF). On 200 OK, decode signed_pdf_base64 and audit_trail_pdf_base64 on the server and store under your document vault policy.

Key features

  • Self-sign path: No hosted redirect; you supply the PDF bytes.
  • Audit artifact: audit_trail_pdf_base64 supports compliance evidence packs.

Implementation

Step 1: Call from your backend

Use your HTTP client library to attach the PDF as pdf_file.

POST /doc-service/v1/esign/esign-custom HTTP/1.1
Host: <verification-api-base-url>
Authorization: Bearer <token>
Content-Type: multipart/form-data; boundary=----boundary

------boundary
Content-Disposition: form-data; name="pdf_file"; filename="document.pdf"
Content-Type: application/pdf

<binary pdf bytes>
------boundary--

Step 2: Store outputs

Persist decoded PDFs in encrypted storage; do not paste base64 into support tickets.

Error handling

HTTP statusWhen
400Bad PDF or validation error.
401Invalid token.

Security notes

  • Bearer token must never ship to browser clients.

Benefits

  • Fits backend-only signing jobs where a redirect flow is not desired.

Next steps