Recent Articles
Authentication Certificates
In order to use authentication certificates, you must first request an authentication certificate. An authentication certificate allows you to log in to your account securely. These instructions will guide you through the entire process – from ...
EUDI Wallet (Lissi Test Version)
To verify your identity with the EUDI Wallet, you will need your smartphone with the EUDI Wallet app installed, as well as a valid digital ID document stored in the wallet. Identification procedure
Development Guide CSC API
Introduction The SIGN8 API can be used to sign hashes and documents. The Rest API functions are based on the Cloud Signature Consortium specifications v2. As a trust service provider, we have implemented the Cloud Signature Consortium (CSC) API to ...
Enable logging in the SafeNet Authentication Client
This guide describes how users can enable logging in the SafeNet Authentication Client. The goal is to save log files and, if necessary, forward them to support for troubleshooting purposes. Logging means that the client generates log files ...
Overview of Supported Signature Formats
Signature formats define how digital signatures are technically stored and represented. They ensure that electronic signatures can be securely, verifiably, and legally embedded in digital documents. Depending on the area of application, different ...