BrandKwikID Documentation
API SuiteDocument Signing

Get Signed File

Fetch a time-limited HTTPS URL for the signed PDF after e-sign. Server-side GET with Bearer auth; txn_id in path.

API reference

Try itLoading playground…
Loading…
AuthorizationBearer <token>

JWT Bearer token authentication. Obtain a token from the KwikID dashboard.

In: header

Path Parameters

txn_idunknown

The txn_id of the received in send-request API.

Default""
Formatstring

Response Body

curl -X GET "https://__mock__/esign/v1/esign/get/signed-file/"
{
  "s3_url": "string",
  "success": true
}
{
  "detail": {},
  "message": "string"
}
{
  "detail": {},
  "message": "string"
}
{
  "error": "string"
}

Overview

Call GET /esign/v1/esign/get/signed-file/{txn_id} from your backend with Authorization: Bearer <token> after the user has finished the flow started from Send Request. Replace {txn_id} with the transaction id your integration receives for that signing job.

On 200 OK, read s3_url (HTTPS URL string) and success. Treat s3_url as opaque and sensitive; download server-side and stream to your vault.

Key features

  • Artifact retrieval without embedding long-lived public URLs in clients.
  • Boolean success flag for quick branching.

Implementation

Step 1: Call from your backend

GET /esign/v1/esign/get/signed-file/<txn_id> HTTP/1.1
Host: <verification-api-base-url>
Authorization: Bearer <token>

Step 2: Download the PDF

Fetch s3_url immediately; URLs may expire.

Error handling

HTTP statusWhen
400Unknown txn_id or not ready.
401Invalid token.

Security notes

  • Do not return s3_url to anonymous users; bind to your authenticated session.

Benefits

  • Clean handoff from hosted signing to durable storage.

Next steps