CSC signing
Introduction
The Cloud Signature Consortium (CSC) is a standard protocol for cloud-based digital signatures that supports web and mobile applications and complies with the most demanding electronic signature regulations in the world. The goal is to provide a common technical specification that will make solutions interoperable and suitable for uniform adoption in the global market, and to meet the highest level requirements of the European Union’s regulation on Identification and Trust Services (eIDAS). SigningHub supports the Cloud Signature Consortium (CSC) API protocol, this enables customers to leverage Remote Signing Service Providers (RSSP) for signing documents. Support for CSC within SigningHub now means customers can not only use SigningHub with Ascertia ADSS Signing Server but also independently with a CSC compliant RSSP.
SigningHub supports Cloud Signature Consortium (CSC) signing via the following two flows:
CSC Signing - Client Credentials Flow
CSC Signing - Authorisation Code Flow
CSC Signing - Client Credentials Flow
How it works?
Configure a Connector in SigningHub Admin
Configure a Signing Profile in SigningHub Admin
Add Signing Profile to a Service Plan in SigningHub Admin
Add Signing Server to a User Role in SigningHub Web
Specify the CSC User ID against your profile in SigningHub Web
CSC Signing
How it works?
To perform CSC signing, you must configure a CSC connector, in SigningHub Admin.
Configure a signing profile using the connector, in SigningHub Admin.
Configure the signing profile to the service plan, in SigningHub Admin.
Add Signing Server to your enterprise user role that you want to use for CSC signing.
Specify your CSC User ID against your profile.
Sign the document using the CSC Signing Server via SigningHub Web or API.
Configure a Connector in SigningHub Admin
Make the following configurations to a connector in SigningHub Admin:
In the "Basic Information" section, choose "CSC" as the "Provider".

In the "Details" section, choose "Client Credentials" as the "Auth Type".

Configure a Signing Profile in SigningHub Admin
Make the following configurations to a signing profile in SigningHub Admin:
Select the CSC Connector created earlier, in the highlighted field below:

Add Signing Profile to a Service Plan in SigningHub Admin
Make the following configurations to the service plan in SigningHub Admin:
In the "Signature" section of the service plan, select and add the earlier configured signing profile, as shown below:

Add Signing Server to a User Role in SigningHub Web
Make the following configurations to a user role in SigningHub Web:
Against your user role, in the "Signing Server Preferences" tab, add the signing server.

Specify the CSC User ID against your profile in SigningHub Web
Make the following configurations to your profile in SigningHub Web:
In your "Profile Information" tab, specify the "Cloud Signature Consortium (CSC) User ID".

Signing
Sign the document using the CSC Signing Server via SigningHub Web or API.
Signing via SigningHub Web
To perform CSC signatures via SigningHub Web, follow the below-mentioned steps:
From the document listing, open a document having the signature field that you want to sign.
Double-click on the signature field and select the CSC Signing Server.

Click the "Sign" button and based on your CSC Signing Server configurations, provide the authorization details for Explicit (PIN/OTP/Both), Implicit or OAuth 2.0 authorization. Once the authorization is complete the document will be signed.
Signing via API
To perform CSC signatures via API, follow the steps:
1. Use the "Authenticate" API to get the authentication token of the user who is performing the signatures.
2. The signature application uses the "Get RSSP Information" API to get the RSSP (Remote Signing Service Provider) information that is needed to perform CSC Signing.
3. The signature application uses the "Get RSSP Info" API, which returns the information about the RSSP (Remote Signing Service Provider) and the list of API methods it has implemented. This method shall be implemented by any RSSP conforming to this specification.
4. The signature application gets the access token using the "Get Access Token | SAD" API, Server will itself decide the grant_type (client_credentials / authorization_code) depending on its configurations.
5. The signature application gets the list of credentials associated with using the "Get Filtered Credential List" API. if the RUT filtration is required, this API will filter the credentials as per the RUT values. A user may have one or multiple credentials hosted by a single remote signing service provider.
6. The signature application gets the information on a signing credential, its associated certificate, and a description of the supported authorisation mechanism using the "Get Credentials Info" API.
7. If the "authorization_required" parameter is true, in response to the "Get RSSP Information" API, the "Get Account Token" API shall be used to get the account_token, which will be used to hit the "oauth2/authorize" CSC Server endpoint.
8. Use the "Get Document Hash" API to get the hash of the document.
7. The signature application can use any one of the following API for authorisation of the credential ID, based on the response of the "Get Credentials Info" API of the CSC server:
"Send OTP via RSSP" API to start the online OTP mechanism associated with a credential ID for Explicit (OTP) authorization.
"RSSP Credentials Authorization" API to authorize access to the credential ID for signing for Explicit (OTP/PIN) or Implicit authorization. The SAD received in response shall be used in the "Get Sign Hash from RSSP" API request.
"oauth2/authorize" API to initiate an OAuth 2.0 authorization flow for the OAuth 2.0 authorization. The authorization is returned in the form of an authorization code, which the signature application shall then use to obtain the SAD via "Get Access Token | SAD" API. The SAD received in response shall be used in the "Get Sign Hash from RSSP" API request.
8. Use the "Embed Signature" API to embed signatures in the document.
9. The signature application uses one of the following APIs of the CSC server for revoking access tokens, as per the requirement:
"Revoke Access Token" API to revoke the service access token or refresh token.
"Revoke OAuth2 Access Token" API to revoke an OAuth 2.0 access token or refresh token.
The CSC Signing process can be a one-step or two-step operation, depending on the SCAL value returned by the "Get Credentials Info" API response. The distinction lies in how the document hash is calculated and how the signature is embedded.
1-Step Sign:
Condition: If SCAL is 1 in the "Get Credentials Info" API response, the signature application does not need to call the "Get Document Hash" API to calculate the document hash.
Process: The application simply collects the necessary data to call the "Sign Document via RSSP Directly" API. This API will automatically calculate the document hash, sign it using the CSC server, and embed the signature directly into the document.
2-Step Sign:
Condition: If SCAL is 2 in the "Get Credentials Info" API response.
Process: Follow the below steps:
First, the signature application must call the "Get Document Hash" API to retrieve the document’s hash.
Next, the application must call the "Embed Signature" API to embed the signature into the document.
CSC Signing - Authorisation Code Flow
How it works?
Configure a Connector in SigningHub Admin
Configure a Signing Profile in SigningHub Admin
Add Signing Profile to a Service Plan in SigningHub Admin
Add Signing Server to a User Role in SigningHub Web
CSC Signing
How it works?
To perform CSC signatures, you must configure a CSC connector, in SigningHub Admin.
Configure a signing profile using the connector, in SigningHub Admin.
Configure the signing profile to the service plan, in SigningHub Admin.
Add Signing Server to your enterprise user role that you want to use for CSC signing.
Sign the document using the CSC Signing Server via SigningHub Web or API.
Configure a Connector in SigningHub Admin
Make the following configurations to a connector in SigningHub Admin:
In the "Basic Information" section, choose "CSC" as the "Provider".

In the "Details" section, choose "Authorization Code" as the "Auth Type".

Configure a Signing Profile in SigningHub Admin
Make the following configurations to a signing profile in SigningHub Admin:
Select the CSC Connector created earlier, in the highlighted field below:

Add Signing Profile to a Service Plan in SigningHub Admin
Make the following configurations to the service plan in SigningHub Admin:
In the "Signature" section of the service plan, select and add the earlier configured signing profile, as shown below:

Add Signing Server to a User Role in SigningHub Web
Make the following configurations to a user role in SigningHub Admin:
Against your user role, in the "Singing Server Preferences" tab, add the signing server.
Signing
Sign the document using the CSC Signing Server via SigningHub Web or API.
Signing via SigningHub Web
To perform CSC signatures via SigningHub Web, follow the below-mentioned steps:
From the document listing, open a the document having the signature field that you want to sign.
Click on the signature field, select the CSC Signing Server.

Input the CSC user credentials, provided by the CSC Signing Server.

Click the "Sign" button and based on your CSC Signing Server configurations, provide the authorization details for Explicit (PIN/OTP/Both), Implicit or OAuth 2.0 authorization. Once the authorization is complete the document will be signed.
Signing via API
To perform CSC signatures via API, follow the below-mentioned steps:
1. Use the "Authenticate" API to get the authentication token of the user who is performing the signatures.
2. The signature application uses the "Get RSSP Information" API to get the RSSP (Remote Signing Service Provider) information that is needed to perform CSC Signing.
3. The signature application uses the "Get RSSP Info" API which returns the information about the RSSP (Remote Signing Service Provider) and the list of API methods it has implemented. This method shall be implemented by any RSSP conforming to this specification.
4. If the "authorization_required" parameter is true, in response to the "Get RSSP Information" API, the "Get Account Token" API shall be used to get the account_token which will be used to hit the "oauth2/authorize" endpoint.
4. The signature application requests authorization for the user to access the RSSP resources using the "oauth2/authorize" API of the CSC server. The authorization is returned in the form of an authorization code, which the signature application shall then use to obtain an access token with "service" as scope. To get the access token call the "Get Access Token | SAD" SigningHub API to get the Bearer/SAD token.
5. The signature application gets the list of credentials associated using the "Get Filtered Credential List" API. if the RUT filtration is required this API will filter the credentials as per the RUT values. A user may have one or multiple credentials hosted by a single remote signing service provider.
6. The signature application gets the information on a signing credential, its associated certificate, and a description of the supported authorization mechanism using the "Get Credentials Info" API.
7. If the "authorization_required" parameter is true, in response to the "Get RSSP Information" API, the "Get Account Token" API shall be used to get the account_token which will be used to hit the "oauth2/authorize" CSC Server endpoint.
8. Use the "Get Document Hash" API to get the hash of the document.
7. The signature application can use any one of the following API for authorization of credential ID, based on the response of the "Get Credentials Info" API of the CSC server:
"Send OTP via RSSP" API to start the online OTP mechanism associated with a credential ID for Explicit (OTP) authorization.
"RSSP Credentials Authorization" API to authorize access to the credential ID for signing for Explicit (OTP/PIN) or Implicit authorization. The SAD received in response shall be used in the "Get Sign Hash from RSSP" API request.
"oauth2/authorize" API to initiate an OAuth 2.0 authorization flow for the OAuth 2.0 authorization. The authorization is returned in the form of an authorization code, which the signature application shall then use to obtain the SAD via "Get Access Token | SAD" API. The SAD received in response shall be used in the "Get Sign Hash from RSSP" API request.
8. Use the "Embed Signature" API to embed signatures in the document.
9. The signature application uses one of the following APIs of the CSC server for revoking access tokens, as per the requirement:
"Revoke Access Token" API to revoke the service access token or refresh token.
"Revoke OAuth2 Access Token" API to revoke an OAuth 2.0 access token or refresh token.
The CSC Signing process can be a one-step or two-step operation, depending on the SCAL value returned by the "Get Credentials Info" API response. The distinction lies in how the document hash is calculated and how the signature is embedded.
1-Step Sign:
Condition: If SCAL is 1 in the "Get Credentials Info" API response, the signature application does not need to call the "Get Document Hash" API to calculate the document hash.
Process: The application simply collects the necessary data to call the "Sign Document via RSSP Directly" API. This API will automatically calculate the document hash, sign it using the CSC server, and embed the signature directly into the document.
2-Step Sign:
Condition: If SCAL is 2 in the "Get Credentials Info" API response.
Process: Follow the below steps:
First, the signature application must call the "Get Document Hash" API to retrieve the document’s hash.
Next, the application must call the "Embed Signature" API to embed the signature into the document.
Last updated
Was this helpful?

