Get Signed File
Fetch a time-limited HTTPS URL for the signed PDF after e-sign. Server-side GET with Bearer auth; txn_id in path.
API reference
JWT Bearer token authentication. Obtain a token from the KwikID dashboard.
In: header
Path Parameters
The txn_id of the received in send-request API.
""stringResponse Body
curl -X GET "https://__mock__/esign/v1/esign/get/signed-file/"{
"s3_url": "string",
"success": true
}{
"detail": {},
"message": "string"
}{
"detail": {},
"message": "string"
}{
"error": "string"
}Overview
Call GET /esign/v1/esign/get/signed-file/{txn_id} from your backend with Authorization: Bearer <token> after the user has finished the flow started from Send Request. Replace {txn_id} with the transaction id your integration receives for that signing job.
On 200 OK, read s3_url (HTTPS URL string) and success. Treat s3_url as opaque and sensitive; download server-side and stream to your vault.
Key features
- Artifact retrieval without embedding long-lived public URLs in clients.
- Boolean success flag for quick branching.
Implementation
Step 1: Call from your backend
GET /esign/v1/esign/get/signed-file/<txn_id> HTTP/1.1
Host: <verification-api-base-url>
Authorization: Bearer <token>Step 2: Download the PDF
Fetch s3_url immediately; URLs may expire.
Error handling
| HTTP status | When |
|---|---|
| 400 | Unknown txn_id or not ready. |
| 401 | Invalid token. |
Security notes
- Do not return
s3_urlto anonymous users; bind to your authenticated session.
Benefits
- Clean handoff from hosted signing to durable storage.
Next steps
Send Request (E-Sign) POST
Start the hosted e-sign flow and receive a redirection URL. Server-side multipart POST with Bearer auth; includes PDF and session metadata.
Custom E-Sign (Self-Signing) POST
Upload a PDF for self-service e-sign. Server-side multipart POST with Bearer auth; returns base64 signed PDF and audit trail.