Settings
Configure Sign preferences for your organization. Changes apply immediately to new agreements unless noted otherwise.
Go to Settings from the navigation to access all configuration options described here.
Signing options
Control the default behavior when recipients sign documents.
Document behavior
| Setting | Description |
|---|---|
| Auto-navigation | Automatically moves the signer between required tags so nothing is missed |
| Allow reassignment | Recipients can delegate signing to another person |
| Allow markup | Recipients can add highlights and text annotations before signing |
| Agreement ID stamping | Adds the agreement's unique ID to each page of the document |
| Signer visibility | Recipients see only the tags assigned to them, not tags for other signers |
Auto-navigation is recommended for documents with many tags — it significantly reduces incomplete submissions.
Authentication defaults
Set the default authentication method applied to new agreements. This can be overridden on a per-recipient basis when creating an agreement.
Available authentication methods:
| Method | How it works |
|---|---|
| None (email link) | Anyone with the signing link can access — simplest, no extra step for the recipient |
| Email OTP | One-time code sent to the recipient's email address |
| SMS OTP | One-time code sent via text message to the recipient's mobile number |
| Access code | Sender provides a code that the recipient must enter — shared through a separate channel |
| TOTP | Time-based code from an authenticator app |
| Identity provider | Third-party identity verification (OneID, ID.me, Clear) |
See Authentication for a detailed comparison and setup instructions for each method.
Use email link authentication for routine agreements. Enable SMS OTP or access code for sensitive documents, high-value contracts, or any agreement where stronger signer verification is important.
Branding
Customize the signing experience with your organization's logo and colors. Your brand appears in invitation emails, the signing page, and completion certificates.
Logo
| Requirement | Detail |
|---|---|
| Supported formats | PNG, JPG, SVG |
| Maximum file size | 2 MB |
| Recommended dimensions | 200 × 60 px |
Custom branding availability depends on your account plan.
Colors
- Primary color — buttons, links, and interactive elements
- Background color — signing page background
- Text color — headers and body text
Ensure sufficient contrast between foreground and background colors for accessibility. Test your branding on both desktop and mobile before sending to recipients.
For detailed branding configuration including logo, colors, and email templates, see Custom Branding.
Screenshot: Branding settings panel showing logo upload and color configuration
API access
API keys
Generate API keys to use the Sign API for programmatic agreement creation, status polling, and webhooks.
- Click Generate New API Key.
- Give the key a descriptive name (for example, "Production" or "CRM Integration").
- Copy the key immediately — it is shown only once.
- Store it in an environment variable or a secrets manager.
Never commit API keys to version control. Rotate keys regularly and revoke any key that may have been exposed.
See the Sign API documentation for available endpoints, request formats, and response examples.
Webhooks
Webhooks deliver real-time notifications to your system when agreement events occur.
Setup:
- Enter your webhook endpoint URL (must be HTTPS).
- Select the events you want to receive.
- Click Save.
Available events:
| Event | When it fires |
|---|---|
agreement.sent | Agreement is dispatched to recipients |
agreement.viewed | A recipient opens the agreement |
agreement.signed | A recipient completes signing |
agreement.completed | All recipients have signed |
agreement.declined | A recipient declines to sign |
agreement.voided | The agreement is voided by the sender |
agreement.expired | The agreement expires before all parties sign |
Delivery behavior:
- Propper retries failed webhook deliveries with exponential backoff
- Each request includes an
X-Propper-Signatureheader for payload verification - Webhook endpoints must respond with a 2xx status within the timeout window
Use webhook.site to inspect webhook payloads during development before pointing to your production endpoint.
The specific payload structure for webhook events is documented in the Sign API reference. Refer to the API documentation for the authoritative payload schema.
Roles and permissions
Roles and permissions for Sign are configured at the organization level through platform settings, not within Sign itself.
To manage team member access:
- Go to Organization > Members.
- Select a member to adjust their role and permissions.
Access levels control which agreements and templates a member can create, view, and manage. Contact your organization administrator to update permissions.
Advanced settings
In-person signing
Enable in-person signing to facilitate face-to-face signing sessions where the sender and recipient are physically present together. The sender manages the device and the recipient signs directly. The full audit trail is maintained.
Useful for retail, branch office, and event scenarios. See In-Person Signing for setup details.
Completion certificate
A completion certificate is automatically generated for every completed agreement. It includes:
- Full signing timeline with timestamps
- All recipients listed with authentication method used
- SHA-256 document hashes for tamper-evidence verification
- Cryptographic proof of integrity
The completion certificate is always generated — there is no setting to disable it. See Completion Certificate for details on what it contains and how to download it.
Audit trail
A tamper-evident audit trail is recorded for every agreement regardless of account type. The audit trail captures all participant actions, IP addresses, authentication events, and document hashes.
To view the audit trail: open an agreement > Audit tab.
See Audit Trail for a full explanation of what is tracked and how the hash-chaining works.
Data retention
How long signed agreements and audit records are retained is an organizational policy decision. Your legal or compliance team should define retention schedules based on applicable regulations, industry requirements, and document type.
Ensure your document management and storage practices align with your legal team's retention requirements.
Some industries — healthcare, financial services, legal — have mandatory minimum retention periods defined by regulation. Consult your legal counsel to determine the correct retention schedule for your documents and jurisdiction.
Saving changes
Click Save Settings after making changes. Settings apply immediately to new agreements.
Branding updates may take up to 5 minutes to propagate across all signing sessions.
Related topics
- Custom Branding — Logo, colors, and brand profiles
- Authentication — Signer verification methods
- Notifications — Reminder and expiration email configuration
- Completion Certificate — The audit document for completed agreements
- Sign API — Programmatic access and webhook integration
- Sending Agreements — Apply settings when sending