PDFSign Component
Properties Methods Events Config Settings Errors
The PDFSign component signs PDF documents.
Syntax
TispPDFSign
Remarks
The PDFSign component can sign PDF documents in accordance with a selection of PDF and PAdES signature standards, including basic Adobe signatures (ISO 32000) and PAdES signatures (ETSI EN 319 142-1).
Preparing the Signature
To configure PDFSign to produce the desired signature, first provide the input document as a file (InputFile), byte array (InputData), or stream (SetInputStream) and assign your signing certificate to the SigningCert property. Then indicate where to save the output document by setting OutputFile or calling SetOutputStream.Optionally specify the Signature* properties and the TimestampServer property, and adjust any chain validation parameters as necessary (please see the Chain Validation Setup section for more details). Finally, call the Sign method.
PDFSign also provides means to customize the appearance of the signature widget to be shown on the document page. You can create your very own signatures (e.g., in the form of your company's logo) by adjusting the widget properties available in the SetWidgetProperty method. Alternatively, you can choose not to associate any widget with your signature by setting the Invisible widget property to True.
The Signing Process
Depending on the configuration, the signing process may be as straightforward as calculating the document hash and signing it with the private key, or it may involve the advanced chain validation routine. During the latter, the component may contact external revocation (i.e., CRL and OCSP endpoints) and trust sources to establish the validity of the signing certificate.If an external TSA server was provided via the TimestampServer property, the component will also contact it to timestamp the new signature.
During signing, PDFSign may fire events to notify your code about certain conditions. For example, if the input document is encrypted but no decryption parameters were found in the Password or DecryptionCert properties, the component will fire either the Password or RecipientInfo event to tell your code that it needs decryption information to be able to continue with the signing. Additionally, the SSLServerAuthentication event will fire if one of the HTTP endpoints involved during the operation (which may be a TSA, CRL, OCSP, or Trusted List service) operates over TLS and needs its certificate to be validated.
Basic Adobe Signatures
A basic (also known as legacy) Adobe signature is an original Adobe Acrobat document signature. This is an outdated form of PDF signature - while PAdES is loosely built on it, this signature type does not support extended features and is not compliant with PAdES. Unless the recipient of your signed documents expects you to specifically use this kind of signature, it is unlikely that you will ever need it.PAdES Signatures and Profiles
In PAdES, a given signature's profile describes the level of "completeness" of the validation material (i.e., certificates, CRLs, and OCSP responses) included in the signature. For example, signatures compliant with the PAdES B-B or PAdES B-T profiles do not require any validation material at all, whereas signatures compliant with the PAdES B-LTA profile must contain complete validation material.PAdES B-B
The PAdES B-B profile is the baseline profile that uses the PAdES-BES signature level by default, meaning the signature only contains the signing time and signer information.
Use the following code to create a B-B signature:
pdfsign.InputFile = "input.pdf";
pdfsign.OutputFile = "signed.pdf";
pdfsign.SigningCert = new Certificate(CertStoreTypes.cstPFXFile, "cert.pfx", "password", "*");
pdfsign.SignatureProfile = PDFSignSignatureProfiles.pfBaselineB;
pdfsign.ValidationPolicy = PDFSignValidationPolicies.vpNone;
pdfsign.Sign();
PAdES-EPES
To instead create a PAdES-EPES signature that includes the signature-policy-identifier attribute, set the PolicyHash, PolicyHashAlgorithm, and PolicyId configuration settings before calling the Sign method.
This profile, in both the BES and EPES settings, creates a basic signature that remains valid as long as the signing certificate has not expired or been revoked. Signatures at this level need not contain any validation material.
PAdES B-T
The PAdES B-T profile extends the basic BES or EPES signature by adding a signature timestamp. This timestamp certifies that the signature was created at a specific moment in time. Similar to the B-B profile, signatures at this level need not contain any validation material.
Use the following code to create a B-T signature:
pdfsign.InputFile = "input.pdf";
pdfsign.OutputFile = "signed.pdf";
pdfsign.SigningCert = new Certificate(CertStoreTypes.cstPFXFile, "cert.pfx", "password", "*");
pdfsign.SignatureProfile = PDFSignSignatureProfiles.pfBaselineT;
pdfsign.TimestampServer = "http://time.certum.pl";
pdfsign.ValidationPolicy = PDFSignValidationPolicies.vpNone;
pdfsign.Sign();
PAdES B-LTA
The PAdES B-LTA profile is used to achieve signatures that are equipped with long-term archival (LTA) or long-term validation (LTV) capabilities. It incorporates into the signature all the material required to validate the signature, including signing certificates, timestamping certificates, and revocation information. It also adds a document timestamp, which certifies the integrity of both the document and the complete validation material at a specific moment in time. This guarantees that no relevant certificates were expired or revoked at the signature creation time, and enables the signature to be verified offline.
Creating a B-LTA signature with PDFSign is a two-step process. First Sign the document and add a signature
timestamp, setting SignatureProfile appropriately. Then Update the signature to take care of the rest
(collect and embed the validation material, and add a document timestamp):
pdfsign.InputFile = "input.pdf";
pdfsign.OutputFile = "signed.pdf";
pdfsign.SigningCert = new Certificate(CertStoreTypes.cstPFXFile, "cert.pfx", "password", "*");
pdfsign.SignatureProfile = PDFSignSignatureProfiles.pfBaselineT;
pdfsign.TimestampServer = "http://time.certum.pl";
pdfsign.ValidationPolicy = PDFSignValidationPolicies.vpNone;
pdfsign.Sign();
// Update the signature to LTV - this will retrieve the necessary revocation
// elements, embed them into the document, and add a document timestamp
pdfsign.Reset();
pdfsign.InputFile = "signed.pdf";
pdfsign.OutputFile = "updated.pdf";
pdfsign.TimestampServer = "http://time.certum.pl";
pdfsign.Update();
Note that validation material "completeness" can be subjective and depends on several factors, including:
- The working environment. For example, your organization may explicitly trust its own self-signed TSA certificate. Signatures timestamped with this certificate will be considered B-LTA by your organization, but for any external bodies, those signatures would be rendered as B-LT or even B-B, as they do not know or trust the custom TSA certificate.
- The time that has passed since the last document timestamp. If an archived (B-LTA) document is not re-timestamped before its last timestamp expires, it will drop back to a lower signature level.
Chain Validation Setup
Chain validation is a sophisticated, multi-faceted procedure that involves a lot of variables. Depending on the configuration of your operating environment, the specifics of the PKI framework being used, and the validation policy you need to follow, you may want to adjust your chain validation parameters to best fit your requirements. A summary of these parameters is given below.Note that these parameters apply to the Sign and Update methods in PDFSign as well as the Verify method in PDFVerify, as all three methods execute the chain validation procedure (if it is enabled).
Validation Policy
The ValidationPolicy property dictates how thoroughly the chain will be validated. It includes options to control which checks the component will perform, allowing you to tailor the validation process to meet your specific security needs. For example, if it is not essential to check each certificate's revocation status, set this property to vpFullNoRevocation.
Revocation
The revocation aspect of chain validation is controlled by the RevocationCheck property, which allows you to choose between and prioritize revocation origins. Note that OCSP sources are often preferred to CRL endpoints because of their real-time capability and the smaller size of the responses they produce.
Trust
The trust aspect of chain validation is controlled by the TrustSources property, which allows you to specify the locations in which the component will search for trust anchors. Local system stores, your own trusted root certificates (via the TrustedCerts property), and Trusted Lists (via the TrustedLists property) are all supported.
Offline Mode
The OfflineMode property provides the ability to sign or verify the document without contacting online sources. If this property is enabled, the component will only use KnownCerts, TrustedCerts, data structures within the document itself, and revocation and Trusted List data that it previously saved to its internal cache when looking for missing validation material.
Property List
The following is the full list of the properties of the component with short descriptions. Click on the links for further details.
Attachments | A collection of all attached files found in the PDF document. |
BlockedCerts | The certificates that must be rejected as trust anchors. |
DecryptionCert | The decryption certificate. |
DocumentCerts | A collection of certificates read from the document during processing. |
Firewall | A set of properties related to firewall access. |
InputData | A byte array containing the PDF document to process. |
InputFile | The PDF file to process. |
KnownCerts | A collection of additional certificates for chain validation. |
OfflineMode | Whether the component is operating in offline mode. |
OutputData | A byte array containing the PDF document after processing. |
OutputFile | The path to a local file where the output will be written. |
Overwrite | Whether or not the component should overwrite files. |
Password | The password to decrypt the document with. |
Proxy | A set of properties related to proxy access. |
RevocationCheck | The kind(s) of revocation check to perform for all chain certificates. |
SignatureAuthorName | The human-readable name of the signer. |
SignatureClaimedSigningTime | The signature's creation time. |
SignatureField | The index of the empty signature field to sign. |
SignatureHashAlgorithm | The hash algorithm to be used for signing. |
SignatureProfile | The PAdES profile to apply when creating the signature. |
SignatureReason | The reason for signing. |
Signatures | A collection of all the signatures and empty fields found in the PDF document. |
SignatureType | The type of signature to create. |
SignatureWidgetHeight | The height of the signature widget. |
SignatureWidgetOffsetX | The signature widget offset from the left-hand page border. |
SignatureWidgetOffsetY | The signature widget offset from the bottom page border. |
SignatureWidgetPages | The pages to place the signature and its widget on. |
SignatureWidgetWidth | The width of the signature widget. |
SigningCert | The certificate to be used for signing. |
TimestampServer | The address of the timestamping server. |
TrustedCerts | A collection of trusted certificates for chain validation. |
TrustedLists | A list of known Trusted Lists for chain validation. |
TrustSources | The trust sources to use during chain validation. |
ValidationFlags | Additional chain validation settings. |
ValidationPolicy | The level at which to perform chain validation. |
ValidationTime | The time point at which the signature should be validated. |
Method List
The following is the full list of the methods of the component with short descriptions. Click on the links for further details.
AddAttachment | Adds an attachment to a PDF document. |
AddTimestamp | Adds a document timestamp to a PDF document. |
Close | Closes an opened PDF document. |
Config | Sets or retrieves a configuration setting. |
Encrypted | Checks whether a PDF document is encrypted. |
GetPageProperty | Retrieves the value of a page property. |
GetWidgetProperty | Retrieves the value of a signature widget property. |
Interrupt | Interrupts the current action. |
Open | Opens a PDF document for processing. |
RemoveAttachment | Removes an attachment from a PDF document. |
Reset | Resets the component. |
SaveAttachment | Saves a PDF attachment to a file. |
SetInputStream | Sets the stream containing the PDF document to process. |
SetOutputStream | Sets the stream to write the processed document to. |
SetWidgetProperty | Sets the value of a signature widget property. |
Sign | Signs a PDF document. |
Signed | Checks whether a PDF document is signed. |
Update | Updates the most recent signature. |
Event List
The following is the full list of the events fired by the component with short descriptions. Click on the links for further details.
ChainCert | Fired when the component encounters a chain certificate. |
DocumentInfo | Fired when the document has been loaded into memory. |
Error | Fired when information is available about errors during data delivery. |
Log | Fired once for each log message. |
Password | Fired when the component detects that the PDF document is encrypted with a password. |
RecipientInfo | Fired for each recipient certificate of the encrypted PDF document. |
SignatureInfo | Fired when the component finds a signature in the document. |
SignatureProcessed | Fired after a signature has been processed. |
SSLServerAuthentication | Fired after the server presents its certificate to the client. |
SSLStatus | Fired when secure connection progress messages are available. |
Config Settings
The following is a list of config settings for the component with short descriptions. Click on the links for further details.
CacheRevocationInfo | Whether to cache revocation information. |
CloseInputStreamAfterProcessing | Whether to close the input stream after processing. |
CloseOutputStreamAfterProcessing | Whether to close the output stream after processing. |
CompressDSS | Whether to compress content in the DSS dictionary. |
ContactInfo[Index] | The signer's contact information. |
CustomProfile | A pre-defined custom profile to apply when creating the signature. |
ExtraSpace | The number of extra 0 bytes to allocate in the document behind the signature. |
FilterName[Index] | The signature filter name. |
FontPaths | The font search paths. |
FullSignatureName[Index] | The full name of the signature field. |
HTTPRetryCount | The number of HTTP request retries. |
HTTPRetryInterval | A time interval to apply between HTTP request retries. |
IncludeRevocationInfo | Whether to include revocation information in the document. |
IncludeSigningChain | Whether to include the full signing chain in the signature. |
LogLevel | The level of detail that is logged. |
OwnerPassword | The owner password to decrypt the document with. |
Permissions | The document permissions associated with the encryption. |
PolicyHash | The signature policy hash value. |
PolicyHashAlgorithm | The algorithm that was used to calculate the signature policy hash. |
PolicyId | The policy Id to be included in the signature. |
PreferEmbeddedRevocationInfo | Whether to prioritize revocation information that is embedded into the document. |
SaveChanges | Whether to save changes made to the PDF document. |
SignatureData[Index] | The hex-encoded representation of the underlying PKCS#7 signature blob. |
SystemFontNames | The system font names. |
TempPath | The location where temporary files are stored. |
TimestampHashAlgorithm | A specific hash algorithm for use with the timestamping service. |
TSATLSClientCertStore | The TLS client certificate store to search. |
TSATLSClientCertStorePassword | The password needed to open the TLS client certificate store. |
TSATLSClientCertStoreType | The type of the TLS client certificate store. |
TSATLSClientCertSubject | The subject of the TLS client certificate. |
UpdateIndex | The index of the signature to update. |
UsePSS | Whether to use RSA-PSS during signing and verification. |
BuildInfo | Information about the product's build. |
CodePage | The system code page used for Unicode to Multibyte translations. |
LicenseInfo | Information about the current license. |
MaskSensitiveData | Whether sensitive data is masked in log messages. |
UseInternalSecurityAPI | Whether or not to use the system security libraries or an internal implementation. |
Attachments Property (PDFSign Component)
A collection of all attached files found in the PDF document.
Syntax
property Attachments: TispPDFAttachmentList read get_Attachments write set_Attachments;
Remarks
This property is used to access the details of all the attached files identified in the document. Use the AddAttachment, RemoveAttachment, and SaveAttachment methods to add, remove, and save attachments to/from this properties respectively.
This property is not available at design time.
Please refer to the PDFAttachment type for a complete list of fields.BlockedCerts Property (PDFSign Component)
The certificates that must be rejected as trust anchors.
Syntax
property BlockedCerts: TispCertificateList read get_BlockedCerts write set_BlockedCerts;
Remarks
This property is used to supply a list of compromised or blocked certificates to the component. Note that any chain containing a blocked certificate will fail validation.
This property is not available at design time.
Please refer to the Certificate type for a complete list of fields.DecryptionCert Property (PDFSign Component)
The decryption certificate.
Syntax
property DecryptionCert: TispCertificate read get_DecryptionCert write set_DecryptionCert;
Remarks
This property is used to provide the certificate used for decryption. Note that this certificate must have a private key associated with it.
This property is not available at design time.
Please refer to the Certificate type for a complete list of fields.DocumentCerts Property (PDFSign Component)
A collection of certificates read from the document during processing.
Syntax
property DocumentCerts: TispCertificateList read get_DocumentCerts;
Remarks
This property is used to access all certificates encountered during document processing and embedded into the signature(s). When signing or verifying, this properties will be populated automatically during chain validation.
This property is read-only and not available at design time.
Please refer to the Certificate type for a complete list of fields.Firewall Property (PDFSign Component)
A set of properties related to firewall access.
Syntax
property Firewall: TispFirewall read get_Firewall write set_Firewall;
Remarks
This is a Firewall-type property, which contains fields describing the firewall through which the component will attempt to connect.
Please refer to the Firewall type for a complete list of fields.InputData Property (PDFSign Component)
A byte array containing the PDF document to process.
Syntax
property InputData: TBytes read get_InputData write set_InputData;
Remarks
This property is used to assign a byte array containing the PDF document to be processed.
This property is not available at design time.
InputFile Property (PDFSign Component)
The PDF file to process.
Syntax
property InputFile: String read get_InputFile write set_InputFile;
Default Value
''
Remarks
This property is used to provide a path to the PDF document to be processed.
KnownCerts Property (PDFSign Component)
A collection of additional certificates for chain validation.
Syntax
property KnownCerts: TispCertificateList read get_KnownCerts write set_KnownCerts;
Remarks
This property is used to supply a list of additional certificates to the component that might be needed for chain validation. For instance, intermediary CA certificates may be absent from the standard system locations (or there may be no standard system locations) and therefore should be supplied to the component manually.
The purpose of this certificate properties is roughly equivalent to that of the Intermediate Certification Authorities system store in Windows.
Note: Do not add trust anchors or root certificates to this properties; add them to TrustedCerts instead.
This property is not available at design time.
Please refer to the Certificate type for a complete list of fields.OfflineMode Property (PDFSign Component)
Whether the component is operating in offline mode.
Syntax
property OfflineMode: Boolean read get_OfflineMode write set_OfflineMode;
Default Value
false
Remarks
This property indicates whether the component should operate in offline mode.
In offline mode, the component restricts itself from accessing online Trusted Lists and revocation information sources such as CRLs or OCSP responders. It may be useful to set this property to True if there is a need to verify the completeness of the validation information included within the signature or provided via KnownCerts.
OutputData Property (PDFSign Component)
A byte array containing the PDF document after processing.
Syntax
property OutputData: TBytes read get_OutputData;
Remarks
This property is used to read the byte array containing the produced output after the operation has completed. It will only be set if an output file and output stream have not been assigned via OutputFile and SetOutputStream respectively.
This property is read-only and not available at design time.
OutputFile Property (PDFSign Component)
The path to a local file where the output will be written.
Syntax
property OutputFile: String read get_OutputFile write set_OutputFile;
Default Value
''
Remarks
This property is used to provide a path where the resulting PDF document will be saved after the operation has completed.
Overwrite Property (PDFSign Component)
Whether or not the component should overwrite files.
Syntax
property Overwrite: Boolean read get_Overwrite write set_Overwrite;
Default Value
false
Remarks
This property indicates whether or not the component will overwrite OutputFile, OutputData, or the stream set in SetOutputStream. If set to False, an error will be thrown whenever OutputFile, OutputData, or the stream set in SetOutputStream exists before an operation.
Password Property (PDFSign Component)
The password to decrypt the document with.
Syntax
property Password: String read get_Password write set_Password;
Default Value
''
Remarks
This property is used to provide the user password for decryption. Though it may be different from OwnerPassword, most implementations use the same value for both.
Proxy Property (PDFSign Component)
A set of properties related to proxy access.
Syntax
property Proxy: TispProxy read get_Proxy write set_Proxy;
Remarks
This property contains fields describing the proxy through which the component will attempt to connect.
Please refer to the Proxy type for a complete list of fields.RevocationCheck Property (PDFSign Component)
The kind(s) of revocation check to perform for all chain certificates.
Syntax
property RevocationCheck: TispRevocationChecks read get_RevocationCheck write set_RevocationCheck;
TispRevocationChecks = ( rcAllCRL, rcAllOCSP, rcAllCRLAndOCSP, rcAnyCRL, rcAnyOCSP, rcAnyCRLOrOCSP, rcAnyOCSPOrCRL );
Default Value
rcAnyOCSPOrCRL
Remarks
This property is used to specify the revocation sources and preferences the component will use during chain validation. Revocation checking is necessary to ensure the integrity of the chain and to obtain up-to-date certificate validity and trust information.
Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP) responses serve the same purpose of ensuring that the certificate has not been revoked by the Certificate Authority (CA) at the time of use. Depending on the circumstances and security policy requirements, either one or both of the revocation information source types may be used.
Possible values are:
0 (rcAllCRL) | All provided CRL endpoints will be checked, and all checks must succeed. |
1 (rcAllOCSP) | All provided OCSP endpoints will be checked, and all checks must succeed. |
2 (rcAllCRLAndOCSP) | All provided CRL and OCSP endpoints will be checked, and all checks must succeed. |
3 (rcAnyCRL) | All provided CRL endpoints will be checked, and at least one check must succeed. |
4 (rcAnyOCSP) | All provided OCSP endpoints will be checked, and at least one check must succeed. |
5 (rcAnyCRLOrOCSP) | All provided CRL and OCSP endpoints will be checked, and at least one check must succeed. CRL endpoints are checked first. |
6 (rcAnyOCSPOrCRL - default) | All provided CRL and OCSP endpoints will be checked, and at least one check must succeed. OCSP endpoints are checked first. |
This property controls the way revocation checks are performed for every certificate in the chain. Typically, certificates come with two types of revocation information sources: CRLs (Certificate Revocation Lists) and OCSP responses. CRLs are static objects periodically published by the CA at some online location. OCSP responders are active online services maintained by the CA that can provide up-to-date information on certificate statuses in near real time.
There are some conceptual differences between the two. CRLs are normally larger in size. Their use involves some latency because there is normally a delay between the time at which a certificate was revoked and the time at which the subsequent CRL mentioning that revocation is published. The benefits of CRLs are that the same object can provide statuses for all certificates issued by a particular CA, and that the whole technology is much simpler than OCSP (and thus is supported by more CAs).
This property allows the validation course to be adjusted by including or excluding certain types of revocation sources from the validation process. The rcAnyOCSPOrCRL setting (give preference to the faster OCSP route and only demand one source to succeed) is a good choice for most typical validation environments. The rcAll* modes are much stricter, and may be used in scenarios where bulletproof validity information is essential.
Note: If no CRL or OCSP endpoints are provided by the CA, the revocation check will be considered successful. This is because the CA chose not to supply revocation information for its certificates, meaning they are considered irrevocable.
Note: Within each of the above settings, if any retrieved CRL or OCSP response indicates that the certificate has been revoked, the revocation check fails.
SignatureAuthorName Property (PDFSign Component)
The human-readable name of the signer.
Syntax
property SignatureAuthorName: String read get_SignatureAuthorName write set_SignatureAuthorName;
Default Value
''
Remarks
This property is used to specify the human-readable name of the signer.
Note: This property only applies when creating a new signature.
SignatureClaimedSigningTime Property (PDFSign Component)
The signature's creation time.
Syntax
property SignatureClaimedSigningTime: String read get_SignatureClaimedSigningTime write set_SignatureClaimedSigningTime;
Default Value
''
Remarks
This property is used to specify the signature creation time from the signer's computer. The time should be provided in UTC in yyyyMMddHHmmssZ format.
Note: This property only applies when creating a new signature.
SignatureField Property (PDFSign Component)
The index of the empty signature field to sign.
Syntax
property SignatureField: Integer read get_SignatureField write set_SignatureField;
Default Value
-1
Remarks
This property is used to specify the empty signature field that should be signed. If the default value of -1 is assigned to this property, a new signature field will be created.
Example:
pdfsign.InputFile = "input.pdf";
pdfsign.OutputFile = "emptyfield.pdf";
pdfsign.SignatureType = PDFSignSignatureTypes.stEmptyField;
pdfsign.Sign();
// Later
pdfsign.Reset();
pdfsign.InputFile = "emptyfield.pdf";
pdfsign.OutputFile = "signed.pdf";
pdfsign.SigningCert = new Certificate(CertStoreTypes.cstPFXFile, "cert.pfx", "password", "*");
pdfsign.SignatureField = 0;
// Configure signature properties as desired
pdfsign.Sign();
SignatureHashAlgorithm Property (PDFSign Component)
The hash algorithm to be used for signing.
Syntax
property SignatureHashAlgorithm: String read get_SignatureHashAlgorithm write set_SignatureHashAlgorithm;
Default Value
'SHA256'
Remarks
This property is used to specify the hash algorithm to be used for signing.
Possible values are:
- SHA1
- SHA224
- SHA256
- SHA384
- SHA512
- MD5
SignatureProfile Property (PDFSign Component)
The PAdES profile to apply when creating the signature.
Syntax
property SignatureProfile: TispPDFSignatureProfiles read get_SignatureProfile write set_SignatureProfile;
TispPDFSignatureProfiles = ( pfNone, pfBaselineB, pfBaselineT, pfBaselineLT, pfBaselineLTA );
Default Value
pfNone
Remarks
This property is used to specify a pre-defined PAdES profile to apply when creating the signature, as defined by ETSI.
Advanced signatures come in many variants, and they are often defined by parties that need to process them or by local standards. Profiles are sets of pre-defined configurations that correspond to particular signature variants. Specifying a profile pre-configures the component to make it produce the signature that matches the configuration corresponding to that profile.
Possible values are:
0 (pfNone - default) | No profile |
1 (pfBaselineB) | PAdES B-B profile |
2 (pfBaselineT) | PAdES B-T profile |
3 (pfBaselineLT) | PAdES B-LT profile |
4 (pfBaselineLTA) | PAdES B-LTA profile |
To apply a custom profile that is not defined by ETSI, set the CustomProfile configuration setting.
Note: This property only applies when creating a new signature.
SignatureReason Property (PDFSign Component)
The reason for signing.
Syntax
property SignatureReason: String read get_SignatureReason write set_SignatureReason;
Default Value
''
Remarks
This property is used to specify the reason for signing.
Note: This property only applies when creating a new signature.
Signatures Property (PDFSign Component)
A collection of all the signatures and empty fields found in the PDF document.
Syntax
property Signatures: TispPDFSignatureList read get_Signatures;
Remarks
This property is used to access the details of all the signatures and empty signature fields identified in the document.
This property is read-only and not available at design time.
Please refer to the PDFSignature type for a complete list of fields.SignatureType Property (PDFSign Component)
The type of signature to create.
Syntax
property SignatureType: TispPDFSignatureTypes read get_SignatureType write set_SignatureType;
TispPDFSignatureTypes = ( stLegacy, stAdvanced, stDTS, stEmptyField );
Default Value
stLegacy
Remarks
This property is used to specify the type of the signature.
Possible values are:
0 (stLegacy - default) | Legacy Adobe signature (adbe.pkcs7.detached) |
1 (stAdvanced) | PAdES-compliant signature (ETSI.CAdES.detached) |
2 (stDTS) | Document timestamp (ETSI.RFC3161) |
3 (stEmptyField) | Empty signature field (signature placeholder) |
Note: This property only applies when creating a new signature.
SignatureWidgetHeight Property (PDFSign Component)
The height of the signature widget.
Syntax
property SignatureWidgetHeight: String read get_SignatureWidgetHeight write set_SignatureWidgetHeight;
Default Value
'70'
Remarks
This property is used to specify the height of the signature widget in points. Both integer and decimal values are supported.
Note: This property only applies when creating a new signature.
SignatureWidgetOffsetX Property (PDFSign Component)
The signature widget offset from the left-hand page border.
Syntax
property SignatureWidgetOffsetX: String read get_SignatureWidgetOffsetX write set_SignatureWidgetOffsetX;
Default Value
'0'
Remarks
This property is used to specify the signature widget offset from the left-hand page border in points. Both integer and decimal values are supported.
Note: This property only applies when creating a new signature.
SignatureWidgetOffsetY Property (PDFSign Component)
The signature widget offset from the bottom page border.
Syntax
property SignatureWidgetOffsetY: String read get_SignatureWidgetOffsetY write set_SignatureWidgetOffsetY;
Default Value
'0'
Remarks
This property is used to specify the signature widget offset from the bottom page border in points. Both integer and decimal values are supported.
Note: This property only applies when creating a new signature.
SignatureWidgetPages Property (PDFSign Component)
The pages to place the signature and its widget on.
Syntax
property SignatureWidgetPages: String read get_SignatureWidgetPages write set_SignatureWidgetPages;
Default Value
''
Remarks
This property is used to specify the pages on which the signature and its widget will be placed.
A variety of syntaxes are supported:
- A single page number: 3
- A comma-separated list of page numbers: 1,2,5,7
- The asterisk character (*) indicates that the widget should be placed on all pages in the document.
- The first and last placeholders specify that the signature should be placed on the respective page, independently of its number.
SignatureWidgetWidth Property (PDFSign Component)
The width of the signature widget.
Syntax
property SignatureWidgetWidth: String read get_SignatureWidgetWidth write set_SignatureWidgetWidth;
Default Value
'70'
Remarks
This property is used to specify the width of the signature widget in points. Both integer and decimal values are supported.
Note: This property only applies when creating a new signature.
SigningCert Property (PDFSign Component)
The certificate to be used for signing.
Syntax
property SigningCert: TispCertificate read get_SigningCert write set_SigningCert;
Remarks
This property is used to provide the certificate used for signing the document. Note that this certificate must have a private key associated with it.
This property is not available at design time.
Please refer to the Certificate type for a complete list of fields.TimestampServer Property (PDFSign Component)
The address of the timestamping server.
Syntax
property TimestampServer: String read get_TimestampServer write set_TimestampServer;
Default Value
''
Remarks
This property is used to specify the address of the TSA (Timestamping Authority) server to use for timestamping the signature (normal signing) or the document (LTV update).
If the timestamping service enforces credential-based user authentication (basic or digest), the credentials can
be provided in the same URL. For example:
pdfsign.TimestampServer = "http://user:password@timestamp.server.com/TsaService";
If the TSA requires TLS client authentication, provide the client certificate via the
TSATLSClientCertStoreType, TSATLSClientCertStore, TSATLSClientCertSubject, and
TSATLSClientCertStorePassword configuration settings.
TrustedCerts Property (PDFSign Component)
A collection of trusted certificates for chain validation.
Syntax
property TrustedCerts: TispCertificateList read get_TrustedCerts write set_TrustedCerts;
Remarks
This property is used to supply a list of trusted certificates to the component that might be needed for chain validation. For instance, root CA certificates may be absent from the standard system locations (or there may be no standard system locations) and therefore should be supplied to the component manually.
The purpose of this certificate properties is largely the same as that of the Windows Trusted Root Certification Authorities system store.
Use this property with extreme care as it directly affects chain verifiability; a wrong certificate added to the list of trusted certificates may result in bad chains being accepted and forfeited signatures being recognized as genuine. Only add certificates that originate from parties that are known and trusted.
This property is not available at design time.
Please refer to the Certificate type for a complete list of fields.TrustedLists Property (PDFSign Component)
A list of known Trusted Lists for chain validation.
Syntax
property TrustedLists: String read get_TrustedLists write set_TrustedLists;
Default Value
'%EUTL%'
Remarks
This property is used to supply a semicolon-separated list of URLs or paths of known Trusted Lists to the component for chain validation.
A Trusted List is an XML document that contains a government-issued list of CAs that have passed regulated compliance checks. When validating the chain, the component will consult the Trusted List to establish certificate trust, ensuring that the CA is legitimate and entitled to issue certificates of the kind being checked.
The default value is the special %EUTL% macro, which, if applicable, instructs the component to
check the root certificate against up-to-date versions of the primary EU Trusted Lists from the EU LOTL. Custom values can be appended:
component.TrustedLists = "%EUTL%;http://my.company/tsl;c:\tsls\mytsl.xml";
Note: The component will cache all Trusted Lists it downloads and uses during chain validation. This
cache is shared between component instances within the same process. If this property contains a URL that is
also present in the cache, the component will retrieve the cached data and reuse them in the current
validation. If the data are invalid, the component will download a fresh Trusted List and add it to the cache.
TrustSources Property (PDFSign Component)
The trust sources to use during chain validation.
Syntax
property TrustSources: TispTrustSources read get_TrustSources write set_TrustSources;
TispTrustSources = ( tsManual, tsLocal, tsTrustedLists, tsLocalAndTrustedLists );
Default Value
tsLocalAndTrustedLists
Remarks
This property is used to specify the sources the component will use to establish certificate trust during chain validation.
Establishing trust for a particular certificate, when either signing or verifying, involves building a chain up to a valid trust anchor. This trust anchor is a root certificate that typically resides on the local system. If the certificate does not eventually chain up to a valid trust anchor, the chain is considered untrusted and therefore invalid.
Possible values are:
0 (tsManual) | The component will consult the TrustedCerts property only. |
1 (tsLocal) | The component will consult local system stores (e.g., Windows Trusted Root Certification Authorities) as well as TrustedCerts. |
2 (tsTrustedLists) | The component will consult TrustedLists only. |
3 (tsLocalAndTrustedLists - default) | The component will consult local system stores, TrustedCerts, and TrustedLists. |
ValidationFlags Property (PDFSign Component)
Additional chain validation settings.
Syntax
property ValidationFlags: Integer read get_ValidationFlags write set_ValidationFlags;
Default Value
0
Remarks
This property is used to specify additional settings that affect the overall flow of the chain validation.
Its value should be provided as a bitmask of the following flags:
0x001 (cvfForceCompleteChainValidationForTrusted) | Perform full chain validation for explicitly trusted intermediary or end-entity certificates. This may be useful when creating signatures to enforce the completeness of the collected revocation information. It often makes sense to omit this flag when validating signatures to reduce validation time and avoid issues with poorly configured environments. |
0x002 (cvfIgnoreChainLoops) | Currently unsupported. |
0x004 (cvfIgnoreOCSPNoCheckExtension) | Currently unsupported. |
0x008 (cvfTolerateMinorChainIssues) | Currently unsupported. |
ValidationPolicy Property (PDFSign Component)
The level at which to perform chain validation.
Syntax
property ValidationPolicy: TispValidationPolicies read get_ValidationPolicy write set_ValidationPolicy;
TispValidationPolicies = ( vpNone, vpFull, vpFullNoTrust, vpFullNoRevocation, vpBestEffort );
Default Value
vpFull
Remarks
This property is used to specify the overall validation policy the component will follow.
Possible values are:
0 (vpNone) | No chain validation is attempted at all. |
1 (vpFull - default) | Revocation and trust checks must succeed for all chains. |
2 (vpFullNoTrust) | Revocation checks must succeed, but trust checks will not occur. |
3 (vpFullNoRevocation) | Trust checks must succeed, but revocation checks will not occur. |
4 (vpBestEffort) | Currently unsupported. |
Validation Policy Heuristics
The choice of validation policy will depend on the scenario for which the chain is validated.Creating a new signature:
- For a basic signature with or without a timestamp, chain validation is not required, so it is recommended to use vpNone. This policy may also be used in test environments or on offline systems.
- For an LTV signature, use vpFull or vpFullNoTrust depending on whether trust checks are necessary in the current environment. If the signature is being created in an environment that does not match the prospective validation environment, consider vpFullNoTrust to validate the chain properly and fully without expecting good trust.
Updating or extending an existing signature:
- When updating a basic signature to LTV, similarly use vpFull or vpFullNoTrust as above.
- When extending an LTV signature, similarly use vpFull or vpFullNoTrust as above.
Validating an existing signature:
- For basic signature validation, use vpFullNoRevocation if trust checks, but not revocation checks, are necessary in the current environment. This policy may also be used on offline systems if the trust anchor is already available to the component.
- For archival validation, use vpFull to validate the chain properly and fully. This policy expects the trust anchor and all the revocation material to be available.
ValidationTime Property (PDFSign Component)
The time point at which the signature should be validated.
Syntax
property ValidationTime: String read get_ValidationTime write set_ValidationTime;
Default Value
''
Remarks
This property is used to specify the moment in time at which the signature validity should be established. The time should be provided in UTC in yyyyMMddHHmmssZ format.
Leave this property empty to stick to the default time point. The component will then prioritize:
- The signature creation time if the signature contains a signature timestamp (ValidatedSigningTime), or
- The local time included in the signature by the signer (ClaimedSigningTime).
AddAttachment Method (PDFSign Component)
Adds an attachment to a PDF document.
Syntax
procedure AddAttachment(FileName: String; Description: String);
Remarks
This method is used to add an attachment (embedded file) to the document specified in InputFile, InputData, or SetInputStream and to the Attachments properties.
The document containing the newly added attachment will be saved to OutputFile, OutputData, or the stream set in SetOutputStream.
The FileName and Description parameters specify the filename and description of the attachment respectively.
Example:
pdfsign.InputFile = "input.pdf";
pdfsign.OutputFile = "input_with_attachment.pdf";
pdfsign.Open();
pdfsign.AddAttachment("foo.txt", "desc");
// Alternatively, create a PDFAttachment object and add it to Attachments manually:
PDFAttachment attachment = new PDFAttachment();
attachment.FileName = "foo.txt";
// or attachment.DataB = new byte[] { ... };
// or attachment.InputStream = new FileStream(...);
attachment.Description = "desc";
pdfsign.Attachments.Add(attachment);
// Or using one of the constructors:
pdfsign.Attachments.Add(new PDFAttachment("foo.txt", "desc"));
pdfsign.Close();
The full list of attachments is contained in the Attachments property.
Note: If the document is not already opened, this method will open it, perform the operation, then close it.
AddTimestamp Method (PDFSign Component)
Adds a document timestamp to a PDF document.
Syntax
procedure AddTimestamp();
Remarks
This method is used to obtain a document timestamp and embed it into the document specified in InputFile, InputData, or SetInputStream. The document containing the newly added document timestamp will be saved to OutputFile, OutputData, or the stream set in SetOutputStream.
A document timestamp is a fully independent signature that is added to the PDF document after the initial signature. Unlike the main signature, the document timestamp is made by a TSA, and its purpose is to preserve the document's long-term validity. Typically, adding a document timestamp is done close to the expiration date of the certificate that produced the last timestamp (which is either embedded in the main signature, or is a previous document timestamp). An LTV document therefore contains a chain of document timestamps updated periodically to keep its long-term status.
Example:
pdfsign.InputFile = "signed.pdf";
pdfsign.OutputFile = "signed_with_dts.pdf";
pdfsign.TimestampServer = "http://time.certum.pl";
pdfsign.AddTimestamp();
Note: If the document is not already opened, this method will open it, perform the operation, then close it.
Close Method (PDFSign Component)
Closes an opened PDF document.
Syntax
procedure Close();
Remarks
This method is used to close the previously opened document specified in InputFile, InputData, or SetInputStream. It should always be preceded by a call to the Open method.
Example:
component.InputFile = "input.pdf";
component.Open();
// Some operation
component.Close();
If any changes are made to the document, they will be saved automatically to OutputFile, OutputData, or the stream set in SetOutputStream when this method is called. To configure this saving behavior, set the SaveChanges configuration setting.
Config Method (PDFSign Component)
Sets or retrieves a configuration setting.
Syntax
function Config(ConfigurationString: String): String;
Remarks
Config is a generic method available in every component. It is used to set and retrieve configuration settings for the component.
These settings are similar in functionality to properties, but they are rarely used. In order to avoid "polluting" the property namespace of the component, access to these internal properties is provided through the Config method.
To set a configuration setting named PROPERTY, you must call Config("PROPERTY=VALUE"), where VALUE is the value of the setting expressed as a string. For boolean values, use the strings "True", "False", "0", "1", "Yes", or "No" (case does not matter).
To read (query) the value of a configuration setting, you must call Config("PROPERTY"). The value will be returned as a string.
Encrypted Method (PDFSign Component)
Checks whether a PDF document is encrypted.
Syntax
function Encrypted(): Boolean;
Remarks
This method is used to determine whether or not the document specified in InputFile, InputData, or SetInputStream is encrypted. It will return False if the document is pseudo-encrypted with an empty password.
Example:
component.InputFile = "input.pdf";
if (component.Encrypted())
{
// Set Password or DecryptionCert
}
component.Open();
// Some operation
component.Close();
Note: If the document is not already opened, this method will open it, perform the operation, then close it.
GetPageProperty Method (PDFSign Component)
Retrieves the value of a page property.
Syntax
function GetPageProperty(Page: Integer; PageProperty: String): String;
Remarks
This method is used to read general information about the pages of the document specified in InputFile, InputData, or SetInputStream, such as their dimensions and content positioning details.
The Page parameter specifies the page to read information about (with a valid range from 1 to PageCount), and the PageProperty parameter specifies the page property to read. The latter can take one of the following values:
Page property | Default value | Description |
CropLowerLeftX | 0 | The lower-left X coordinate of the page crop area in points. |
CropLowerLeftY | 0 | The lower-left Y coordinate of the page crop area in points. |
CropUpperRightX | 0 | The upper-right X coordinate of the page crop area in points. |
CropUpperRightY | 0 | The upper-right Y coordinate of the page crop area in points. |
Height | 0 | The height of the page in points. Both integer and decimal values are supported. |
MediaLowerLeftX | 0 | The lower-left X coordinate of the page media area in points. |
MediaLowerLeftY | 0 | The lower-left Y coordinate of the page media area in points. |
MediaUpperRightX | 0 | The upper-right X coordinate of the page media area in points. |
MediaUpperRightY | 0 | The upper-right Y coordinate of the page media area in points. |
Rotation | 0 | The rotation angle of the page in degrees. Possible values: 0, 90, 180, 270. |
Width | 0 | The width of the page in points. Both integer and decimal values are supported. |
Note: Each page property is only populated once the document has been loaded, which is reported by the DocumentInfo event.
Example:
int pageCount = 0;
component.OnDocumentInfo += (s, e) => { pageCount = e.PageCount; };
component.InputFile = "input.pdf";
component.Open();
for (int i = 1; i <= pageCount; i++) component.GetPageProperty(i, "Height");
component.Close();
The page properties can be used to adjust the position of the signature widget based on the page dimensions. For
example:
int x = int.Parse(pdfsign.GetPageProperty(1, "Width")) - 100;
int y = int.Parse(pdfsign.GetPageProperty(1, "Height")) - 100;
pdfsign.SetWidgetProperty("OffsetX", x.ToString());
pdfsign.SetWidgetProperty("OffsetY", y.ToString());
Note: If the document is not already opened, this method will open it, perform the operation, then close it.
GetWidgetProperty Method (PDFSign Component)
Retrieves the value of a signature widget property.
Syntax
function GetWidgetProperty(SignatureIndex: Integer; WidgetProperty: String): String;
Remarks
This method is used to retrieve the value of a signature widget property. Together with SetWidgetProperty, this method provides an extensible way of managing the widget settings that are not available through the primary properties of the component. The list of settings below may be extended in the future.
The SignatureIndex parameter is the index of the signature of interest in the Signatures properties, and the WidgetProperty parameter specifies the widget property to read. The latter can take one of the following values:
Widget property | Default value | Description |
BackgroundHeight | 0 | The size of the stretched background image in the vertical direction. |
BackgroundWidth | 0 | The size of the stretched background image in the horizontal direction. |
CompressWidgetData | False | Whether to compress the signature widget data before saving. |
CustomBackgroundContentStream | "" | A custom background content stream to use when BackgroundStyle is set to Custom. |
CustomTextCount | 0 | The number of custom text blocks on the signature widget. |
CustomTextFontResourceName[Index] | "" | The font resource name used for the custom text block. |
CustomTextFontSizeX[Index] | 0 | The horizontal font size scale used for the custom text. |
CustomTextFontSizeY[Index] | 0 | The vertical font size scale used for the custom text. |
CustomTextX[Index] | 0 | The horizontal offset of the custom text block on the widget. |
CustomTextY[Index] | 0 | The vertical offset of the custom text block on the widget. |
CustomText[Index] | "" | The text shown on a custom signature
widget text block.
This indexed property provides access to the text placed on a specific signature widget text block. CustomText[0] specifies the text on the first block, CustomText[1] on the second block, and so on. Use the CustomTextCount property to get the number of custom text blocks. |
Height | 70 | The height of the signature widget in points. This property is the same as WidgetHeight. |
Invisible | False | Whether the signature widget is invisible on the page. |
OffsetX | 0 | The signature widget offset from the left-hand page border in points. This property is the same as WidgetOffsetX. |
OffsetY | 0 | The signature widget offset from the bottom page border in points. This property is the same as WidgetOffsetY. |
Pages | "" | The page numbers on which the signature is shown. This property is the same as WidgetPages. |
Rotation | 0 | The rotation angle of the signature widget in degrees. Supported values: 0, 90, 180, 270. |
Width | 70 | The width of the signature widget in points. This property is the same as WidgetWidth. |
Example:
pdfsign.InputFile = "signed.pdf";
pdfsign.Open();
bool invisible = bool.Parse(pdfsign.GetWidgetProperty(0, "Invisible"));
pdfsign.Close();
Note: Each widget property is only populated after the document has been signed and the signature widget
has been generated.
Note: If the document is not already opened, this method will open it, perform the operation, then close it.
Interrupt Method (PDFSign Component)
Interrupts the current action.
Syntax
procedure Interrupt();
Remarks
This method interrupts the current action. It can be used, for example, within the ChainCert event to abort the chain validation procedure.
If there is no action in progress, this method simply returns, doing nothing.
Open Method (PDFSign Component)
Opens a PDF document for processing.
Syntax
procedure Open();
Remarks
This method is used to open the document specified in InputFile, InputData, or SetInputStream before performing some operation on it, such as signing or updating. When finished, call Close to complete or discard the operation.
It is recommended to use this method (alongside Close) when performing multiple operations on the document at once.
Note: This method will populate the Attachments, DocumentCerts, and Signatures collections with any corresponding objects found in the document.
Automatic Decryption Functionality
If this method is called on an encrypted document, the Password or RecipientInfo event will fire (depending on the encryption type) as a notification that the document must be decrypted before processing can continue.Once the correct decryption material is supplied, the component will then attempt to decrypt the document automatically within this method. When this occurs, the decrypted content is kept in memory so that the document's encrypted status is preserved when it is saved later. Use the Decrypt method to save a decrypted copy of the document instead.
RemoveAttachment Method (PDFSign Component)
Removes an attachment from a PDF document.
Syntax
procedure RemoveAttachment(Index: Integer);
Remarks
This method is used to remove an attachment from the document specified in InputFile, InputData, or SetInputStream and from the Attachments properties.
The document without the attachment will be saved to OutputFile, OutputData, or the stream set in SetOutputStream.
The Index parameter is the index of the attachment in the Attachments properties to be removed.
Example:
pdfsign.InputFile = "input_with_attachment.pdf";
pdfsign.OutputFile = "attachment_removed.pdf";
pdfsign.Open();
pdfsign.RemoveAttachment(0);
// Alternatively, remove an attachment from Attachments manually:
PDFAttachment attachment = pdfsign.Attachments[0];
pdfsign.Attachments.Remove(attachment);
pdfsign.Close();
Note: If the document is not already opened, this method will open it, perform the operation, then close it.
Reset Method (PDFSign Component)
Resets the component.
Syntax
procedure Reset();
Remarks
This method is used to reset the component's properties and configuration settings to their default values.
SaveAttachment Method (PDFSign Component)
Saves a PDF attachment to a file.
Syntax
procedure SaveAttachment(Index: Integer; FileName: String);
Remarks
This method is used to retrieve the contents of an attachment from the document specified in InputFile, InputData, or SetInputStream and save it to the file specified by FileName. It does not modify the existence of the Attachments properties's contents.
The Index parameter is the index of the attachment in the Attachments properties to be saved.
The FileName parameter specifies the filename that the attachment will be saved to.
Example:
component.InputFile = "input_with_attachment.pdf";
component.Open();
component.SaveAttachment(0, "a.dat");
component.Close();
Example (saving to a stream):
component.InputFile = "input_with_attachment.pdf";
component.Attachments[0].OutputStream = myStream;
component.SaveAttachment(0, null); // null means use the OutputStream property if it's set
Note: If the document is not already opened, this method will open it, perform the operation, then close it.
SetInputStream Method (PDFSign Component)
Sets the stream containing the PDF document to process.
Syntax
procedure SetInputStream(InputStream: TStream);
Remarks
This method is used to set the stream from which the component will read the PDF document to be processed. If an input stream is set before the component attempts to perform operations on the document, the component will read the data from the input stream instead of from the InputFile or InputData properties.
Note: It may be useful to additionally set the CloseInputStreamAfterProcessing configuration setting to True when using input streams.
SetOutputStream Method (PDFSign Component)
Sets the stream to write the processed document to.
Syntax
procedure SetOutputStream(OutputStream: TStream);
Remarks
This method is used to set the stream to which the component will write the resulting PDF document. If an output stream is set before the component attempts to perform operations on the document, the component will write the data to the output stream instead of writing to OutputFile or populating OutputData.
Note: It may be useful to additionally set the CloseOutputStreamAfterProcessing configuration setting to True when using output streams.
SetWidgetProperty Method (PDFSign Component)
Sets the value of a signature widget property.
Syntax
procedure SetWidgetProperty(WidgetProperty: String; Value: String);
Remarks
This method is used to adjust the look of the signature widget when creating a signature. Together with GetWidgetProperty, this method provides an extensible way of managing the widget settings that are not available through the primary properties of the component. The list of settings below may be extended in the future.
The WidgetProperty and Value parameters specify the widget property and value to set respectively. The former can take one of the following values:
Widget property | Default value | Description |
AlgorithmCaption | #auto | The caption of the signature widget field with information about the signature algorithm. |
AlgorithmInfo | #auto | Information about the algorithm to be displayed on the signature widget. Keep this property set to #auto to make the component generate the algorithm text automatically, in the form of Algorithm/Key size, for example RSA/1024 bits. |
BackgroundData | "" | The data of the signature widget background bitmap. Assign the widget background data (in the form of a filename or hex-encoded JPEG or JPEG2000 bytes) to this property. |
BackgroundHeight | 0 | The size of the stretched background image in the vertical direction. |
BackgroundImageColorSpace | "" | The background image color space. Supported values: none, RGB, CMYK, Gray. |
BackgroundImageHeight | 0 | The height of the background image in
pixels.
It is important that this property matches the exact size of the image when a custom background is used. The width and height of the background image have no direct relation to the dimensions of the signature widget on the document page, and are only used to indicate the parameters of the image to the PDF processor. Big images will ultimately be squeezed to fit into the widget, and smaller ones stretched. |
BackgroundImageType | JPEG2000 | The type of the image contained in BackgroundData. Supported values: JPEG2000, JPEG, Custom. |
BackgroundImageWidth | 0 | The width of the background image in pixels.
It is important that this property matches the exact size of the image when a custom background is used. The width and height of the background image have no direct relation to the dimensions of the signature widget on the document page, and are only used to indicate the parameters of the image to the PDF processor. Big images will ultimately be squeezed to fit into the widget, and smaller ones stretched. |
BackgroundPosition | "" | The position of the widget background image. The value may be the keyword value center, which centers the image, or a pair of coordinates (e.g., 10 5.5) in which the first value defines X and the second defines Y starting from the bottom-left corner. |
BackgroundStyle | Default | The style of the signature widget background. Supported values: Default, None, Custom. |
BackgroundWidth | 0 | The size of the stretched background image in the horizontal direction. |
CompressWidgetData | False | Whether to compress the signature widget data before saving. |
CustomBackgroundContentStream | "" | A custom background content stream to use when BackgroundStyle is set to Custom. |
CustomTextCount | 0 | The number of custom text blocks on the signature widget. |
CustomTextFontResourceName[Index] | "" | The font resource name to use for the custom text block. |
CustomTextFontSizeX[Index] | 0 | The horizontal font size scale to use for the custom text. |
CustomTextFontSizeY[Index] | 0 | The vertical font size scale to use for the custom text. |
CustomTextX[Index] | 0 | The horizontal offset of the custom text block on the widget. |
CustomTextY[Index] | 0 | The vertical offset of the custom text block on the widget. |
CustomText[Index] | "" | The text to show on a custom signature
widget text block.
This indexed property provides access to the text to be placed on a specific signature widget text block. CustomText[0] specifies the text on the first block, CustomText[1] on the second block, and so on. Use the CustomTextCount property to set the number of custom text blocks. |
DateFontSize | 0 | The font size of the date and time text on the signature widget. |
DateFormat | "" | The format string used to display the
signing date and time in the signature widget.
Leave this property empty (default value) to use the default format. To convert UTC time to local time, set this property to L (default format) or use the L: prefix with a custom date time format string. |
FontName | "" | The font name for the signature widget text.
Use this property to specify the Type 1 or TrueType font name for the signature widget text. The PDF format supports 14 standard Type 1 fonts: Times-Roman, Helvetica, Courier, Symbol, Times-Bold, Helvetica-Bold, Courier-Bold, ZapfDingbats, Times-Italic, Helvetica-Oblique, Courier-Oblique, Times-BoldItalic, Helvetica-BoldOblique, Courier-BoldOblique. Note that Adobe no longer supports Type 1 fonts as of January 2023. For TrueType font names, the component supports full font names (e.g., Times New Roman, Arial Bold Italic), its filename (e.g., times.ttf, arialbi.ttf), or a full filename. If a TrueType font is used, then a font subset is embedded into the PDF document. |
Header | #auto | The header text to put on the signature widget. Keep this property set to #auto to make the component generate the header automatically. |
Height | 70 | The height of the signature widget in points. This property is the same as SignatureWidgetHeight. |
HideDefaultText | False | Whether default headers for the signature widget will be generated. |
IgnoreExistingAppearance | False | Whether to discard all existing widget parameters when signing empty signature fields. This property only makes sense for signatures created by signing existing empty signature fields with pre-defined widget descriptions. |
Invisible | False | Whether the signature widget is invisible on the page. |
OffsetX | 0 | The signature widget offset from the left-hand page border in points. This property is the same as SignatureWidgetOffsetX. |
OffsetY | 0 | The signature widget offset from the bottom page border in points. This property is the same as SignatureWidgetOffsetY. |
Pages | "" | The page numbers on which the signature is shown. This property is the same as SignatureWidgetPages. |
PositionAnchor | Default | The anchor to bind the position of the widget to. Supported values: Default, BottomLeft, BottomRight, TopLeft, TopRight, Center. |
RenderOptions | A comma-separated list of rendering options. Supported values: Unknown, NoRotate, NoView, NoZoom, Print, ReadOnly, ToggleNoView. | |
Rotation | 0 | The rotation angle of the signature widget in degrees. Supported values: 0, 90, 180, 270. |
SectionTextFontSize | 0 | The font size of general text on the signature widget. |
SectionTitleFontSize | 0 | The font size of the section title on the signature widget. |
ShowDate | True | Whether to display the signing date and time details on the widget. |
SignerCaption | #auto | The caption for the signer section on the signature widget. Keep this property set to #auto to make the component generate the default signer caption, which is Signer: . |
SignerInfo | #auto | Custom signer information to put on the signature widget. The standard signature widget allows for several short strings separated by carriage return line feed (CRLF). Keep this property set to #auto to make the component generate the signer text automatically. |
TitleFontSize | 0 | The font size of the main title on the signature widget. |
Width | 70 | The width of the signature widget in points. This property is the same as SignatureWidgetWidth. |
Example:
pdfsign.SetWidgetProperty("Width", "100");
pdfsign.SetWidgetProperty("Height", "100");
pdfsign.SetWidgetProperty("ShowDate", "false");
pdfsign.SetWidgetProperty("SignerInfo", "Hello\r\nworld!");
pdfsign.SetWidgetProperty("TitleFontSize", "11");
pdfsign.Sign();
Sign Method (PDFSign Component)
Signs a PDF document.
Syntax
procedure Sign();
Remarks
This method is used to sign the document specified in InputFile, InputData, or SetInputStream. The document will be signed with SigningCert and saved in OutputFile, OutputData, or the stream set in SetOutputStream.
Use the following properties to adjust new signature settings:
- SignatureAuthorName
- SignatureClaimedSigningTime
- SignatureHashAlgorithm
- SignatureProfile
- SignatureReason
- SignatureType
- SignatureWidgetHeight
- SignatureWidgetOffsetX
- SignatureWidgetOffsetY
- SignatureWidgetPages
- SignatureWidgetWidth
Use the following properties to adjust chain validation parameters:
- BlockedCerts
- KnownCerts
- OfflineMode
- RevocationCheck
- TrustedCerts
- TrustedLists
- TrustSources
- ValidationFlags
- ValidationPolicy
- ValidationTime
Note: If the document is not already opened, this method will open it, perform the operation, then close it.
Signed Method (PDFSign Component)
Checks whether a PDF document is signed.
Syntax
function Signed(): Boolean;
Remarks
This method is used to determine whether or not the document specified in InputFile, InputData, or SetInputStream is signed. It will return False if the document contains only empty signature fields.
Example:
pdfverify.InputFile = "input.pdf";
if (pdfverify.Signed())
{
// Configure validation-related properties as desired
pdfverify.Verify();
}
Note: If the document is not already opened, this method will open it, perform the operation, then close it.
Update Method (PDFSign Component)
Updates the most recent signature.
Syntax
procedure Update();
Remarks
This method is used to update the most recent signature by embedding newer or missing revocation information into the signed document specified in InputFile, InputData, or SetInputStream. The updated document will be saved to OutputFile, OutputData, or the stream set in SetOutputStream.
Updating a signature starts with its cryptographic validation. Before any new validation material is inserted, the signature's integrity must be validated. If the signature is found to be correct, the component will proceed with chain validation and the retrieval of any missing chain elements. If the signature is cryptographically wrong, the component will throw an exception.
The update approach is typically used to extend the validity of an LTV signature. For LTA signatures, updating is typically accompanied with a document timestamping operation. Set TimestampServer to have the component obtain and embed a document timestamp automatically.
Further validation material and document timestamps may be added to a document over time to maintain its authenticity and integrity.
Use the following properties to adjust chain validation parameters:
- BlockedCerts
- KnownCerts
- OfflineMode
- RevocationCheck
- TrustedCerts
- TrustedLists
- TrustSources
- ValidationFlags
- ValidationPolicy
- ValidationTime
Note: To choose a different signature to update, set the UpdateIndex configuration setting.
Note: If the document is not already opened, this method will open it, perform the operation, then close it.
ChainCert Event (PDFSign Component)
Fired when the component encounters a chain certificate.
Syntax
type TChainCertEvent = procedure ( Sender: TObject; const CertEncoded: String; const CertEncodedB: TBytes; const CertSubject: String; const CertIssuer: String; const ValidationTime: String; var ValidationResult: Integer; var ValidationDetails: Integer ) of Object;
property OnChainCert: TChainCertEvent read FOnChainCert write FOnChainCert;
Remarks
This event is fired once for each certificate encountered during chain validation to report that it is about to be processed. The component will try to retrieve all required chain certificates automatically.
The CertEncoded parameter specifies the PEM (Base64-encoded) public certificate.
The CertSubject and CertIssuer parameters specify the distinguished names of the certificate owner and issuer respectively.
The ValidationTime parameter specifies the time point (in UTC) at which the certificate validity was established.
The ValidationResult parameter reports the outcome of the individual certificate validation and can be one of the following values:
0 (cvrUnknown - default) | Certificate validity is unknown. |
1 (cvrValid) | The certificate is valid. |
2 (cvrValidButUntrusted) | The certificate is valid but not trusted. |
3 (cvrInvalid) | The certificate is not valid (it is revoked, expired, or contains an invalid signature). |
4 (cvrCantBeEstablished) | The validity of the certificate cannot be established because of missing or unavailable validation information (certificates, CRLs, or OCSP responses). |
In the case of a failure, the ValidationDetails parameter provides more details on its reasons. Its value is a bitmask of the following flags:
0x001 (cvdRevoked) | The certificate is revoked. |
0x002 (cvdExpiredOrNotYetValid) | The certificate is expired or not yet valid. |
0x004 (cvdUnknownCA) | A CA certificate for the certificate has not been found, is not trusted, or has a wrong public key (chain incomplete). |
0x008 (cvdPolicyViolated) | One of the CA certificates is not authorized to act as a CA, a mandatory key usage is not enabled, or a weak algorithm is used in the certificate. |
0x010 (cvdRevocationCheckFailed) | One or more CRLs or OCSP responses could not be verified. |
0x020 (cvdBlocked) | The certificate is blocked. |
0x040 (cvdFailure) | General validation failure. |
Overridable Chain Validation
While the component will follow the validation rules defined by the X.509 standard to the best of its ability, minor technical issues may arise when validating the chain. The ValidationResult and ValidationDetails parameters can be overridden to relax such requirements on a per-certificate basis.For example, set ValidationResult to cvrValid and ValidationDetails to 0 in order to:
- Ignore CA or TLS key usage requirements
- Ignore the AuthorityKeyId extension in certificate-issuing CAs (helps with incorrectly renewed certificates)
- Ignore the Basic Constraints or Name Constraints extensions of CA certificates
- Tolerate some weaker algorithms
- Implicitly trust self-signed certificates
- Skip validity period checks for trusted certificates (helps with older devices that have expired root certificates)
- Ignore chain loops (helps with buggy CAs that include subchains that sign themselves)
Note: The user code is ultimately responsible for certificate validity decisions made via these two parameters. If their values are modified within this event, the resulting chain validation procedure may deviate from the standard.
DocumentInfo Event (PDFSign Component)
Fired when the document has been loaded into memory.
Syntax
type TDocumentInfoEvent = procedure ( Sender: TObject; PageCount: Integer; SignatureCount: Integer ) of Object;
property OnDocumentInfo: TDocumentInfoEvent read FOnDocumentInfo write FOnDocumentInfo;
Remarks
This event is fired once per document processing routine to report that the document has been processed and loaded into memory.
The handler for this event is a good place to check the document structure and access document-related information such as page number and document file details. These may be useful when preparing the signature. For example, the GetPageProperty method can be used to find the optimal position for the signature widget.
The PageCount parameter reports the number of pages in the document.
The SignatureCount parameter reports the number of signatures in the document.
This event is fired when the Open method is called, but only after Password or RecipientInfo is fired (if applicable) and the document has been decrypted.
Error Event (PDFSign Component)
Fired when information is available about errors during data delivery.
Syntax
type TErrorEvent = procedure ( Sender: TObject; ErrorCode: Integer; const Description: String ) of Object;
property OnError: TErrorEvent read FOnError write FOnError;
Remarks
The Error event is fired in case of exceptional conditions during message processing. Normally the component raises an exception.
The ErrorCode parameter contains an error code, and the Description parameter contains a textual description of the error. For a list of valid error codes and their descriptions, please refer to the Error Codes section.
Log Event (PDFSign Component)
Fired once for each log message.
Syntax
type TLogEvent = procedure ( Sender: TObject; LogLevel: Integer; const Message: String; const LogType: String ) of Object;
property OnLog: TLogEvent read FOnLog write FOnLog;
Remarks
This event is fired once for each log message generated by the component. The verbosity is controlled by the LogLevel configuration setting.
The LogLevel parameter indicates the detail level of the message. Possible values are:
0 (None) | No messages are logged. |
1 (Info - default) | Informational events such as the basics of the chain validation procedure are logged. |
2 (Verbose) | Detailed data such as HTTP requests are logged. |
3 (Debug) | Debug data including the full chain validation procedure are logged. |
The Message parameter is the log message.
The LogType parameter identifies the type of log entry. Possible values are:
- CertValidator
- Font
- HTTP
- PDFInvalidSignature
- PDFRevocationInfo
- Timestamp
- TSL
Password Event (PDFSign Component)
Fired when the component detects that the PDF document is encrypted with a password.
Syntax
type TPasswordEvent = procedure ( Sender: TObject; Available: Boolean; var Cancel: Boolean ) of Object;
property OnPassword: TPasswordEvent read FOnPassword write FOnPassword;
Remarks
This event is fired during document processing to report that the document is encrypted with a password. It may be used to supply the correct decryption password to the Password property.
The Available parameter indicates whether the decryption password is already available to the component or still needs to be set. If this parameter is set to False, the correct password must be provided for the decryption attempt to succeed.
The Cancel parameter determines whether the component will stop firing this event to request a password.
RecipientInfo Event (PDFSign Component)
Fired for each recipient certificate of the encrypted PDF document.
Syntax
type TRecipientInfoEvent = procedure ( Sender: TObject; const Issuer: String; const SerialNumber: String; const SubjectKeyIdentifier: String; Available: Boolean; var Cancel: Boolean ) of Object;
property OnRecipientInfo: TRecipientInfoEvent read FOnRecipientInfo write FOnRecipientInfo;
Remarks
This event is fired during document processing for each recipient certificate that the document has been encrypted for (if applicable). It may be used to identify the certificate(s) to load and supply to the DecryptionCert property.
The Issuer parameter specifies the subject of the issuer certificate.
The SerialNumber parameter specifies the serial number of the encryption certificate.
The SubjectKeyIdentifier parameter specifies the X.509 subjectKeyIdentifier extension value of the encryption certificate, encoded as a hex string.
The Available parameter indicates whether the decryption certificate is already available to the component or still needs to be set. If this parameter is set to False, the correct certificate must be provided for the decryption attempt to succeed.
The Cancel parameter determines whether the component will stop firing this event to request a certificate.
Note: The document may be encrypted with more than one certificate (or have "more than one recipient"), in which case each certificate will cause its own invocation of this event.
SignatureInfo Event (PDFSign Component)
Fired when the component finds a signature in the document.
Syntax
type TSignatureInfoEvent = procedure ( Sender: TObject; SignatureIndex: Integer; var ValidateSignature: Boolean; var ValidateChain: Boolean ) of Object;
property OnSignatureInfo: TSignatureInfoEvent read FOnSignatureInfo write FOnSignatureInfo;
Remarks
This event is fired once for each signature found in the document to report that the signature specified by SignatureIndex is about to be validated.
The SignatureIndex parameter is the index of the signature in the Signatures properties.
Signature validation consists of two independent stages: cryptographic signature validation and chain validation. The ValidateSignature and ValidateChain parameters determine whether each stage should be included in the validation. They can be overridden to modify the validation policy on a per-signature basis, allowing signatures to be verified individually instead of all at once (via Verify). To skip validation entirely, set both parameters to False.
Use the following properties to adjust chain validation parameters:
- BlockedCerts
- KnownCerts
- OfflineMode
- RevocationCheck
- TrustedCerts
- TrustedLists
- TrustSources
- ValidationFlags
- ValidationPolicy
- ValidationTime
SignatureProcessed Event (PDFSign Component)
Fired after a signature has been processed.
Syntax
type TSignatureProcessedEvent = procedure ( Sender: TObject; SignatureIndex: Integer; SignatureValidationResult: Integer; ChainValidationResult: Integer; ChainValidationDetails: Integer ) of Object;
property OnSignatureProcessed: TSignatureProcessedEvent read FOnSignatureProcessed write FOnSignatureProcessed;
Remarks
This event is fired once for each signature found in the document to report that the signature specified by SignatureIndex has completed validation. It is fired after SignatureInfo if that event's ValidateSignature parameter is set to True.
The SignatureIndex parameter is the index of the signature in the Signatures properties.
Signature validation consists of two independent stages: cryptographic signature validation and chain validation. Separate validation results are reported for each in the SignatureValidationResult and ChainValidationResult parameters.
The former reports the validity of the signature and can be one of the following values:
0 (svrUnknown - default) | Signature validity is unknown. |
1 (svrValid) | The signature is valid. |
2 (svrCorrupted) | The signature is corrupted. |
3 (svrSignerNotFound) | Failed to acquire the signing certificate. The signature cannot be validated. |
4 (svrFailure) | General failure. |
The latter reports the validity of the chain and can be one of the following values:
0 (cvrUnknown - default) | Chain validity is unknown. |
1 (cvrValid) | The chain is valid. |
2 (cvrValidButUntrusted) | The chain is valid, but the root certificate is not trusted. |
3 (cvrInvalid) | The chain is not valid (some of the certificates are revoked, expired, or contain an invalid signature). |
4 (cvrCantBeEstablished) | The validity of the chain cannot be established because of missing or unavailable validation information (certificates, CRLs, or OCSP responses). |
In the case of a failure, the ChainValidationDetails parameter provides more details on its reasons. Its value is a bitmask of the following flags:
0x001 (cvdRevoked) | One or more certificates are revoked. |
0x002 (cvdExpiredOrNotYetValid) | One or more certificates are expired or not yet valid. |
0x004 (cvdUnknownCA) | A CA certificate for one or more certificates has not been found, is not trusted, or has a wrong public key (chain incomplete). |
0x008 (cvdPolicyViolated) | One of the CA certificates is not authorized to act as a CA, a mandatory key usage is not enabled in one of the chain certificates, or a weak algorithm is used in one of the certificates or revocation elements. |
0x010 (cvdRevocationCheckFailed) | One or more CRLs or OCSP responses could not be verified. |
0x020 (cvdBlocked) | One or more certificates are blocked. |
0x040 (cvdFailure) | General validation failure. |
Note: SignatureValidationResult, ChainValidationResult, and ChainValidationDetails are also available as properties in the PDFSignature type.
SSLServerAuthentication Event (PDFSign Component)
Fired after the server presents its certificate to the client.
Syntax
type TSSLServerAuthenticationEvent = procedure ( Sender: TObject; const CertEncoded: String; const CertEncodedB: TBytes; const CertSubject: String; const CertIssuer: String; const Status: String; var Accept: Boolean ) of Object;
property OnSSLServerAuthentication: TSSLServerAuthenticationEvent read FOnSSLServerAuthentication write FOnSSLServerAuthentication;
Remarks
This event is fired during timestamping or chain validation after the server presents its SSL/TLS certificate to the component. It only applies if the TSA, CRL, OCSP, or Trusted List endpoint operates over HTTPS.
During this event, the client can decide whether or not to continue with the connection process. The Accept parameter is a recommendation on whether to continue or close the connection. This is just a suggestion: application software must use its own logic to determine whether or not to continue.
When the Accept parameter is False, the Status parameter shows why the verification failed (otherwise, Status contains the string OK). If it is decided to continue, you can override and accept the certificate by setting the Accept parameter to True.
SSLStatus Event (PDFSign Component)
Fired when secure connection progress messages are available.
Syntax
type TSSLStatusEvent = procedure ( Sender: TObject; const Message: String ) of Object;
property OnSSLStatus: TSSLStatusEvent read FOnSSLStatus write FOnSSLStatus;
Remarks
This event is fired during timestamping or chain validation for informational and logging purposes only. This event tracks the progress of the SSL/TLS connection. It only applies if the TSA, CRL, OCSP, or Trusted List endpoint operates over HTTPS.
Certificate Type
This is the digital certificate being used.
Remarks
This type describes the current digital certificate. The certificate may be a public or private key. The fields are used to identify or select certificates.
Fields
EffectiveDate
String (read-only)
Default Value: ""
The date on which this certificate becomes valid. Before this date, it is not valid. The date is localized to the system's time zone. The following example illustrates the format of an encoded date:
23-Jan-2000 15:00:00.
ExpirationDate
String (read-only)
Default Value: ""
The date on which the certificate expires. After this date, the certificate will no longer be valid. The date is localized to the system's time zone. The following example illustrates the format of an encoded date:
23-Jan-2001 15:00:00.
ExtendedKeyUsage
String (read-only)
Default Value: ""
A comma-delimited list of extended key usage identifiers. These are the same as ASN.1 object identifiers (OIDs).
Fingerprint
String (read-only)
Default Value: ""
The hex-encoded, 16-byte MD5 fingerprint of the certificate. This property is primarily used for keys which do not have a corresponding X.509 public certificate, such as PEM keys that only contain a private key. It is commonly used for SSH keys.
The following example illustrates the format: bc:2a:72:af:fe:58:17:43:7a:5f:ba:5a:7c:90:f7:02
FingerprintSHA1
String (read-only)
Default Value: ""
The hex-encoded, 20-byte SHA-1 fingerprint of the certificate. This property is primarily used for keys which do not have a corresponding X.509 public certificate, such as PEM keys that only contain a private key. It is commonly used for SSH keys.
The following example illustrates the format: 30:7b:fa:38:65:83:ff:da:b4:4e:07:3f:17:b8:a4:ed:80:be:ff:84
FingerprintSHA256
String (read-only)
Default Value: ""
The hex-encoded, 32-byte SHA-256 fingerprint of the certificate. This property is primarily used for keys which do not have a corresponding X.509 public certificate, such as PEM keys that only contain a private key. It is commonly used for SSH keys.
The following example illustrates the format: 6a:80:5c:33:a9:43:ea:b0:96:12:8a:64:96:30:ef:4a:8a:96:86:ce:f4:c7:be:10:24:8e:2b:60:9e:f3:59:53
Issuer
String (read-only)
Default Value: ""
The issuer of the certificate. This property contains a string representation of the name of the issuing authority for the certificate.
PrivateKey
String (read-only)
Default Value: ""
The private key of the certificate (if available). The key is provided as PEM/Base64-encoded data.
Note: The PrivateKey may be available but not exportable. In this case, PrivateKey returns an empty string.
PrivateKeyAvailable
Boolean (read-only)
Default Value: False
Whether a PrivateKey is available for the selected certificate. If PrivateKeyAvailable is True, the certificate may be used for authentication purposes (e.g., server authentication).
PrivateKeyContainer
String (read-only)
Default Value: ""
The name of the PrivateKey container for the certificate (if available). This functionality is available only on Windows platforms.
PublicKey
String (read-only)
Default Value: ""
The public key of the certificate. The key is provided as PEM/Base64-encoded data.
PublicKeyAlgorithm
String (read-only)
Default Value: ""
The textual description of the certificate's public key algorithm. The property contains either the name of the algorithm (e.g., "RSA" or "RSA_DH") or an object identifier (OID) string representing the algorithm.
PublicKeyLength
Integer (read-only)
Default Value: 0
The length of the certificate's public key (in bits). Common values are 512, 1024, and 2048.
SerialNumber
String (read-only)
Default Value: ""
The serial number of the certificate encoded as a string. The number is encoded as a series of hexadecimal digits, with each pair representing a byte of the serial number.
SignatureAlgorithm
String (read-only)
Default Value: ""
The text description of the certificate's signature algorithm. The property contains either the name of the algorithm (e.g., "RSA" or "RSA_MD5RSA") or an object identifier (OID) string representing the algorithm.
Store
String
Default Value: "MY"
The name of the certificate store for the client certificate.
The StoreType property denotes the type of the certificate store specified by Store. If the store is password-protected, specify the password in StorePassword.
Store is used in conjunction with the Subject property to specify client certificates. If Store has a value, and Subject or Encoded is set, a search for a certificate is initiated. Please see the Subject property for details.
Designations of certificate stores are platform dependent.
The following designations are the most common User and Machine certificate stores in Windows:
MY | A certificate store holding personal certificates with their associated private keys. |
CA | Certifying authority certificates. |
ROOT | Root certificates. |
When the certificate store type is cstPFXFile, this property must be set to the name of the file. When the type is cstPFXBlob, the property must be set to the binary contents of a PFX file (i.e., PKCS#12 certificate store).
StoreB
TBytes
Default Value: "MY"
The name of the certificate store for the client certificate.
The StoreType property denotes the type of the certificate store specified by Store. If the store is password-protected, specify the password in StorePassword.
Store is used in conjunction with the Subject property to specify client certificates. If Store has a value, and Subject or Encoded is set, a search for a certificate is initiated. Please see the Subject property for details.
Designations of certificate stores are platform dependent.
The following designations are the most common User and Machine certificate stores in Windows:
MY | A certificate store holding personal certificates with their associated private keys. |
CA | Certifying authority certificates. |
ROOT | Root certificates. |
When the certificate store type is cstPFXFile, this property must be set to the name of the file. When the type is cstPFXBlob, the property must be set to the binary contents of a PFX file (i.e., PKCS#12 certificate store).
StorePassword
String
Default Value: ""
If the type of certificate store requires a password, this property is used to specify the password needed to open the certificate store.
StoreType
TispCertStoreTypes
Default Value: 0
The type of certificate store for this certificate.
The component supports both public and private keys in a variety of formats. When the cstAuto value is used, the component will automatically determine the type. This property can take one of the following values:
0 (cstUser - default) | For Windows, this specifies that the certificate store is a certificate store owned by the current user.
Note: This store type is not available in Java. |
1 (cstMachine) | For Windows, this specifies that the certificate store is a machine store.
Note: This store type is not available in Java. |
2 (cstPFXFile) | The certificate store is the name of a PFX (PKCS#12) file containing certificates. |
3 (cstPFXBlob) | The certificate store is a string (binary or Base64-encoded) representing a certificate store in PFX (PKCS#12) format. |
4 (cstJKSFile) | The certificate store is the name of a Java Key Store (JKS) file containing certificates.
Note: This store type is only available in Java. |
5 (cstJKSBlob) | The certificate store is a string (binary or Base64-encoded) representing a certificate store in Java Key Store (JKS) format.
Note: This store type is only available in Java. |
6 (cstPEMKeyFile) | The certificate store is the name of a PEM-encoded file that contains a private key and an optional certificate. |
7 (cstPEMKeyBlob) | The certificate store is a string (binary or Base64-encoded) that contains a private key and an optional certificate. |
8 (cstPublicKeyFile) | The certificate store is the name of a file that contains a PEM- or DER-encoded public key certificate. |
9 (cstPublicKeyBlob) | The certificate store is a string (binary or Base64-encoded) that contains a PEM- or DER-encoded public key certificate. |
10 (cstSSHPublicKeyBlob) | The certificate store is a string (binary or Base64-encoded) that contains an SSH-style public key. |
11 (cstP7BFile) | The certificate store is the name of a PKCS#7 file containing certificates. |
12 (cstP7BBlob) | The certificate store is a string (binary) representing a certificate store in PKCS#7 format. |
13 (cstSSHPublicKeyFile) | The certificate store is the name of a file that contains an SSH-style public key. |
14 (cstPPKFile) | The certificate store is the name of a file that contains a PPK (PuTTY Private Key). |
15 (cstPPKBlob) | The certificate store is a string (binary) that contains a PPK (PuTTY Private Key). |
16 (cstXMLFile) | The certificate store is the name of a file that contains a certificate in XML format. |
17 (cstXMLBlob) | The certificate store is a string that contains a certificate in XML format. |
18 (cstJWKFile) | The certificate store is the name of a file that contains a JWK (JSON Web Key). |
19 (cstJWKBlob) | The certificate store is a string that contains a JWK (JSON Web Key). |
21 (cstBCFKSFile) | The certificate store is the name of a file that contains a BCFKS (Bouncy Castle FIPS Key Store).
Note: This store type is only available in Java and .NET. |
22 (cstBCFKSBlob) | The certificate store is a string (binary or Base64-encoded) representing a certificate store in BCFKS (Bouncy Castle FIPS Key Store) format.
Note: This store type is only available in Java and .NET. |
23 (cstPKCS11) | The certificate is present on a physical security key accessible via a PKCS#11 interface.
To use a security key, the necessary data must first be collected using the CertMgr component. The ListStoreCertificates method may be called after setting CertStoreType to cstPKCS11, CertStorePassword to the PIN, and CertStore to the full path of the PKCS#11 DLL. The certificate information returned in the CertList event's CertEncoded parameter may be saved for later use. When using a certificate, pass the previously saved security key information as the Store and set StorePassword to the PIN. Code Example. SSH Authentication with Security Key:
|
99 (cstAuto) | The store type is automatically detected from the input data. This setting may be used with both public and private keys and can detect any of the supported formats automatically. |
SubjectAltNames
String (read-only)
Default Value: ""
Comma-separated lists of alternative subject names for the certificate.
ThumbprintMD5
String (read-only)
Default Value: ""
The MD5 hash of the certificate. It is primarily used for X.509 certificates. If the hash does not already exist, it is automatically computed.
ThumbprintSHA1
String (read-only)
Default Value: ""
The SHA-1 hash of the certificate. It is primarily used for X.509 certificates. If the hash does not already exist, it is automatically computed.
ThumbprintSHA256
String (read-only)
Default Value: ""
The SHA-256 hash of the certificate. It is primarily used for X.509 certificates. If the hash does not already exist, it is automatically computed.
Usage
String (read-only)
Default Value: ""
The text description of UsageFlags.
This value will be one or more of the following strings and will be separated by commas:
- Digital Signature
- Non-Repudiation
- Key Encipherment
- Data Encipherment
- Key Agreement
- Certificate Signing
- CRL Signing
- Encipher Only
If the provider is OpenSSL, the value is a comma-separated list of X.509 certificate extension names.
UsageFlags
Integer (read-only)
Default Value: 0
The flags that show intended use for the certificate. The value of UsageFlags is a combination of the following flags:
0x80 | Digital Signature |
0x40 | Non-Repudiation |
0x20 | Key Encipherment |
0x10 | Data Encipherment |
0x08 | Key Agreement |
0x04 | Certificate Signing |
0x02 | CRL Signing |
0x01 | Encipher Only |
Please see the Usage property for a text representation of UsageFlags.
This functionality currently is not available when the provider is OpenSSL.
Version
String (read-only)
Default Value: ""
The certificate's version number. The possible values are the strings "V1", "V2", and "V3".
Subject
String
Default Value: ""
The subject of the certificate used for client authentication.
This property must be set after all other certificate properties are set. When this property is set, a search is performed in the current certificate store to locate a certificate with a matching subject.
If a matching certificate is found, the property is set to the full subject of the matching certificate.
If an exact match is not found, the store is searched for subjects containing the value of the property.
If a match is still not found, the property is set to an empty string, and no certificate is selected.
The special value "*" picks a random certificate in the certificate store.
The certificate subject is a comma-separated list of distinguished name fields and values. For instance, "CN=www.server.com, OU=test, C=US, E=support@nsoftware.com". Common fields and their meanings are as follows:
Field | Meaning |
CN | Common Name. This is commonly a hostname like www.server.com. |
O | Organization |
OU | Organizational Unit |
L | Locality |
S | State |
C | Country |
E | Email Address |
If a field value contains a comma, it must be quoted.
Encoded
String
Default Value: ""
The certificate (PEM/Base64 encoded). This property is used to assign a specific certificate. The Store and Subject properties also may be used to specify a certificate.
When Encoded is set, a search is initiated in the current Store for the private key of the certificate. If the key is found, Subject is updated to reflect the full subject of the selected certificate; otherwise, Subject is set to an empty string.
EncodedB
TBytes
Default Value: ""
The certificate (PEM/Base64 encoded). This property is used to assign a specific certificate. The Store and Subject properties also may be used to specify a certificate.
When Encoded is set, a search is initiated in the current Store for the private key of the certificate. If the key is found, Subject is updated to reflect the full subject of the selected certificate; otherwise, Subject is set to an empty string.
Constructors
>
constructor Create();
Creates a instance whose properties can be set. This is useful for use with when generating new certificates.
constructor Create(valEncoded: TBytes);
Parses Encoded as an X.509 public key.
constructor Create(valStoreType: TispCertStoreTypes; valStore: String; valStorePassword: String; valSubject: String);
StoreType identifies the type of certificate store to use. See for descriptions of the different certificate stores. Store is a file containing the certificate store. StorePassword is the password used to protect the store.
After the store has been successfully opened, the component will attempt to find the certificate identified by Subject . This can be either a complete or a substring match of the X.509 certificate's subject Distinguished Name (DN). The Subject parameter can also take an MD5, SHA-1, or SHA-256 thumbprint of the certificate to load in a "Thumbprint=value" format.
constructor Create(valStoreType: TispCertStoreTypes; valStore: TBytes; valStorePassword: String; valSubject: String);
StoreType identifies the type of certificate store to use. See for descriptions of the different certificate stores. Store is a byte array containing the certificate data. StorePassword is the password used to protect the store.
After the store has been successfully opened, the component will attempt to find the certificate identified by Subject . This can be either a complete or a substring match of the X.509 certificate's subject Distinguished Name (DN). The Subject parameter can also take an MD5, SHA-1, or SHA-256 thumbprint of the certificate to load in a "Thumbprint=value" format.
Firewall Type
The firewall the component will connect through.
Remarks
When connecting through a firewall, this type is used to specify different properties of the firewall, such as the firewall Host and the FirewallType.
Fields
AutoDetect
Boolean
Default Value: False
Whether to automatically detect and use firewall system settings, if available.
FirewallType
TispFirewallTypes
Default Value: 0
The type of firewall to connect through. The applicable values are as follows:
fwNone (0) | No firewall (default setting). |
fwTunnel (1) | Connect through a tunneling proxy. Port is set to 80. |
fwSOCKS4 (2) | Connect through a SOCKS4 Proxy. Port is set to 1080. |
fwSOCKS5 (3) | Connect through a SOCKS5 Proxy. Port is set to 1080. |
fwSOCKS4A (10) | Connect through a SOCKS4A Proxy. Port is set to 1080. |
Host
String
Default Value: ""
The name or IP address of the firewall (optional). If a Host is given, the requested connections will be authenticated through the specified firewall when connecting.
If this property is set to a Domain Name, a DNS request is initiated. Upon successful termination of the request, this property is set to the corresponding address. If the search is not successful, the component raises an exception.
Password
String
Default Value: ""
A password if authentication is to be used when connecting through the firewall. If Host is specified, the User and Password properties are used to connect and authenticate to the given firewall. If the authentication fails, the component raises an exception.
Port
Integer
Default Value: 0
The Transmission Control Protocol (TCP) port for the firewall Host. See the description of the Host property for details.
Note: This property is set automatically when FirewallType is set to a valid value. See the description of the FirewallType property for details.
User
String
Default Value: ""
A username if authentication is to be used when connecting through a firewall. If Host is specified, this property and the Password property are used to connect and authenticate to the given Firewall. If the authentication fails, the component raises an exception.
Constructors
constructor Create();
PDFAttachment Type
This describes the file being attached to the PDF document.
Remarks
This type contains information about the file that is being attached to the document.
Fields
ContentType
String
Default Value: ""
The content type of the attachment.
CreationDate
String
Default Value: ""
The creation date of the attachment.
Data
String
Default Value: ""
The raw data of the attachment.
If OutputStream is not set to a valid stream, the component will write to this property when an empty string is passed to the SaveAttachment method.
DataB
TBytes
Default Value: ""
The raw data of the attachment.
If OutputStream is not set to a valid stream, the component will write to this property when an empty string is passed to the SaveAttachment method.
Description
String
Default Value: ""
A textual description of the attachment.
FileName
String
Default Value: ""
The path and filename of the attachment.
InputStream
TStream
Default Value: ""
A stream containing the attachment.
If this property is set to a valid stream, the component will attach the data from the stream as the current attachment.
ModificationDate
String
Default Value: ""
The date and time of the file's last modification.
Name
String
Default Value: ""
The name of the attachment.
OutputStream
TStream
Default Value: ""
The stream to write the attachment to.
If this property is set to a valid stream, the component will write to this property when an empty string is passed to the SaveAttachment method.
Size
Int64 (read-only)
Default Value: 0
The attachment's size in bytes.
Constructors
constructor Create();
constructor Create(valFileName: String);
constructor Create(valFileName: String; valDescription: String);
constructor Create(valData: TBytes; valName: String; valDescription: String);
PDFSignature Type
A container for PDF signature details.
Remarks
This type contains details about the signature. Use it to read information about the signature when processing it.
Fields
AuthorName
String (read-only)
Default Value: ""
The human-readable name of the signer.
ChainValidationDetails
Integer (read-only)
Default Value: 0
The details of the certificate chain validation outcome. They may often suggest the reasons that contributed to the overall validation result in ChainValidationResult.
The value of this property is a bitmask of the following flags:
0x001 (cvdRevoked) | One or more certificates are revoked. |
0x002 (cvdExpiredOrNotYetValid) | One or more certificates are expired or not yet valid. |
0x004 (cvdUnknownCA) | A CA certificate for one or more certificates has not been found, is not trusted, or has a wrong public key (chain incomplete). |
0x008 (cvdPolicyViolated) | One of the CA certificates is not authorized to act as a CA, a mandatory key usage is not enabled in one of the chain certificates, or a weak algorithm is used in one of the certificates or revocation elements. |
0x010 (cvdRevocationCheckFailed) | One or more CRLs or OCSP responses could not be verified. |
0x020 (cvdBlocked) | One or more certificates are blocked. |
0x040 (cvdFailure) | General validation failure. |
Subscribe to the Log event to access the detailed validation log. This property is also available as a parameter of the SignatureProcessed event.
ChainValidationResult
TispChainValidationResults (read-only)
Default Value: 0
The outcome of the certificate chain validation routine.
Possible values are:
0 (cvrUnknown - default) | Chain validity is unknown. |
1 (cvrValid) | The chain is valid. |
2 (cvrValidButUntrusted) | The chain is valid, but the root certificate is not trusted. |
3 (cvrInvalid) | The chain is not valid (some of the certificates are revoked, expired, or contain an invalid signature). |
4 (cvrCantBeEstablished) | The validity of the chain cannot be established because of missing or unavailable validation information (certificates, CRLs, or OCSP responses). |
Subscribe to the Log event to access the detailed validation log. This property is also available as a parameter of the SignatureProcessed event.
ClaimedSigningTime
String (read-only)
Default Value: ""
The signature's creation time in UTC.
Use this property to get the signature creation time from the signer's computer. Note that the claimed time, unlike ValidatedSigningTime, does not originate from a trusted TSA and may be forfeited or wrong.
CoverageEndsAt
Integer (read-only)
Default Value: 0
The offset in the PDF file where the signature coverage ends.
PDF generators often use incremental updates to make changes in documents. This may result in the signature only covering a part of the document (one of the past revisions), but not the subsequent changes.
Use this property to identify the offset where the signature coverage ends. One option is to compare it to the length of the whole document to ensure that the signature covers the entire document. Alternatively, use the GetSignedVersion method to extract the exact revision that was signed.
HashAlgorithm
String (read-only)
Default Value: "SHA256"
The hash algorithm that was used for signing.
Possible values are:
- SHA1
- SHA224
- SHA256
- SHA384
- SHA512
- MD5
Profile
TispPDFSignatureProfiles (read-only)
Default Value: 0
The pre-defined PAdES profile that was applied when creating the signature, as defined by ETSI.
Advanced signatures come in many variants, and they are often defined by parties that need to process them or by local standards. Profiles are sets of pre-defined configurations that correspond to particular signature variants.
Possible values are:
0 (pfNone - default) | No profile |
1 (pfBaselineB) | PAdES B-B profile |
2 (pfBaselineT) | PAdES B-T profile |
3 (pfBaselineLT) | PAdES B-LT profile |
4 (pfBaselineLTA) | PAdES B-LTA profile |
Note that when verifying a signature, the LTV modifier may be affected by the validation settings. These include OfflineMode (set it to True to obtain the clean LTV capability) and CacheRevocationInfo (set it to False to prevent earlier validations from affecting the current validation).
Reason
String (read-only)
Default Value: ""
The reason for signing.
SignatureType
TispPDFSignatureTypes (read-only)
Default Value: 0
The type of the signature that was created.
Possible values are:
0 (stLegacy - default) | Legacy Adobe signature (adbe.pkcs7.detached) |
1 (stAdvanced) | PAdES-compliant signature (ETSI.CAdES.detached) |
2 (stDTS) | Document timestamp (ETSI.RFC3161) |
3 (stEmptyField) | Empty signature field (signature placeholder) |
SignerCertIndex
Integer (read-only)
Default Value: -1
The index of the signer certificate in the DocumentCerts properties.
TimestampCertIndex
Integer (read-only)
Default Value: -1
The index of the timestamping certificate in the DocumentCerts properties (if applicable).
Timestamped
Boolean (read-only)
Default Value: False
Whether the signature contains an embedded timestamp.
ValidatedSigningTime
String (read-only)
Default Value: ""
The certified signing time in UTC.
Use this property to obtain the signing time as certified by a timestamp from a trusted timestamping authority. This property is only nonempty if there is a valid timestamp included in the signature.
Note that the validated time, unlike ClaimedSigningTime, is the trusted signing time.
ValidationResult
TispSignatureValidationResults (read-only)
Default Value: 0
The outcome of the cryptographic signature validation.
Possible values are:
0 (svrUnknown - default) | Signature validity is unknown. |
1 (svrValid) | The signature is valid. |
2 (svrCorrupted) | The signature is corrupted. |
3 (svrSignerNotFound) | Failed to acquire the signing certificate. The signature cannot be validated. |
4 (svrFailure) | General failure. |
This property is also available as the SignatureValidationResult parameter of the SignatureProcessed event.
WidgetHeight
String (read-only)
Default Value: "70"
The height of the signature widget in points. Both integer and decimal values are supported.
WidgetOffsetX
String (read-only)
Default Value: "0"
The signature widget offset from the left-hand page border in points. Both integer and decimal values are supported.
WidgetOffsetY
String (read-only)
Default Value: "0"
The signature widget offset from the bottom page border in points. Both integer and decimal values are supported.
WidgetPages
String (read-only)
Default Value: ""
The pages that the signature and its widget are placed on.
WidgetWidth
String (read-only)
Default Value: "70"
The width of the signature widget in points. Both integer and decimal values are supported.
Constructors
constructor Create();
Proxy Type
The proxy the component will connect to.
Remarks
When connecting through a proxy, this type is used to specify different properties of the proxy, such as the Server and the AuthScheme.
Fields
AuthScheme
TispProxyAuthSchemes
Default Value: 0
The type of authorization to perform when connecting to the proxy. This is used only when the User and Password properties are set.
AuthScheme should be set to authNone (3) when no authentication is expected.
By default, AuthScheme is authBasic (0), and if the User and Password properties are set, the component will attempt basic authentication.
If AuthScheme is set to authDigest (1), digest authentication will be attempted instead.
If AuthScheme is set to authProprietary (2), then the authorization token will not be generated by the component. Look at the configuration file for the component being used to find more information about manually setting this token.
If AuthScheme is set to authNtlm (4), NTLM authentication will be used.
For security reasons, setting this property will clear the values of User and Password.
AutoDetect
Boolean
Default Value: False
Whether to automatically detect and use proxy system settings, if available. The default value is False.
Password
String
Default Value: ""
A password if authentication is to be used for the proxy.
If AuthScheme is set to Basic Authentication, the User and Password properties are Base64 encoded and the proxy authentication token will be generated in the form Basic [encoded-user-password].
If AuthScheme is set to Digest Authentication, the User and Password properties are used to respond to the Digest Authentication challenge from the server.
If AuthScheme is set to NTLM Authentication, the User and Password properties are used to authenticate through NTLM negotiation.
Port
Integer
Default Value: 80
The Transmission Control Protocol (TCP) port for the proxy Server (default 80). See the description of the Server property for details.
Server
String
Default Value: ""
If a proxy Server is given, then the HTTP request is sent to the proxy instead of the server otherwise specified.
If the Server property is set to a domain name, a DNS request is initiated. Upon successful termination of the request, the Server property is set to the corresponding address. If the search is not successful, an error is returned.
SSL
TispProxySSLTypes
Default Value: 0
When to use a Secure Sockets Layer (SSL) for the connection to the proxy. The applicable values are as follows:
psAutomatic (0) | Default setting. If the URL is an https URL, the component will use the psTunnel option. If the URL is an http URL, the component will use the psNever option. |
psAlways (1) | The connection is always SSL-enabled. |
psNever (2) | The connection is not SSL-enabled. |
psTunnel (3) | The connection is made through a tunneling (HTTP) proxy. |
User
String
Default Value: ""
A username if authentication is to be used for the proxy.
If AuthScheme is set to Basic Authentication, the User and Password properties are Base64 encoded and the proxy authentication token will be generated in the form Basic [encoded-user-password].
If AuthScheme is set to Digest Authentication, the User and Password properties are used to respond to the Digest Authentication challenge from the server.
If AuthScheme is set to NTLM Authentication, the User and Password properties are used to authenticate through NTLM negotiation.
Constructors
constructor Create();
constructor Create(valServer: String; valPort: Integer);
constructor Create(valServer: String; valPort: Integer; valUser: String; valPassword: String);
Config Settings (PDFSign Component)
The component accepts one or more of the following configuration settings. Configuration settings are similar in functionality to properties, but they are rarely used. In order to avoid "polluting" the property namespace of the component, access to these internal properties is provided through the Config method.PDFSign Config Settings
BR.AD_RB_v1_0 | Brazilian signature with Basic Reference (AD-RB) version 1.0 |
BR.AD_RB_v1_1 | Brazilian signature with Basic Reference (AD-RB) version 1.1 |
BR.AD_RT_v1_0 | Brazilian signature with Time Reference (AD-RT) version 1.0 |
BR.AD_RT_v1_1 | Brazilian signature with Time Reference (AD-RT) version 1.1 |
BR.AD_RC_v1_1 | Brazilian signature with Complete References (AD-RC) version 1.1 |
BR.AD_RC_v1_2 | Brazilian signature with Complete References (AD-RC) version 1.2 |
BR.AD_RA_v1_1 | Brazilian signature with References for Archiving (AD-RA) version 1.1 |
BR.AD_RA_v1_2 | Brazilian signature with References for Archiving (AD-RA) version 1.2 |
Index is the index of the signature in the Signatures properties. When creating a new signature, use -1 as the Index. If set to PBAD_PAdES, the component will create a PBAD.PAdES-compatible signature.
Index is the index of the signature in the Signatures properties. When creating a new signature, use -1 as the Index.
0x001 (rilAuto) | Revocation information will be included in either the DSS dictionary or the adbe-revocationInfoArchival signature attribute depending on the SignatureType. |
0x002 (rilDSS) | Revocation information will be included in the DSS dictionary. |
0x004 (rilAdbeAttribute) | Revocation information will be included in the adbe-revocationInfoArchival signature attribute. |
0 | Do not include the signing chain in the signature. |
1 (default) | Attempt to build the signing chain automatically, and if successful, include it in the signature. |
2 | Include the contents of KnownCerts in the signature. |
0 (None) | No messages are logged. |
1 (Info - default) | Informational events such as the basics of the chain validation procedure are logged. |
2 (Verbose) | Detailed data such as HTTP requests are logged. |
3 (Debug) | Debug data including the full chain validation procedure are logged. |
This setting is read-only. Its value is a bitmask of the following flags:
0x001 (pepAnnotations) | Annotating is allowed. |
0x002 (pepAssemble) | Assembling a new document on the basis of the processed one is allowed. |
0x004 (pepExtract) | Extraction/copying of the pictures and text from the document is allowed. |
0x008 (pepExtractAcc) | Content extraction is allowed for accessibility purposes only. |
0x010 (pepFillInForms) | Filling in forms is allowed. |
0x020 (pepHighQualityPrint) | High quality printing is allowed. |
0x040 (pepLowQualityPrint) | Low quality printing is allowed. |
0x080 (pepModify) | Modifications are allowed. |
0 | Discard all changes. |
1 | Save the document to OutputFile, OutputData, or the stream set in SetOutputStream, even if it has not been modified. |
2 (default) | Save the document to OutputFile, OutputData, or the stream set in SetOutputStream, but only if it has been modified. |
MY | A certificate store holding personal certificates with their associated private keys. |
CA | Certifying authority certificates. |
ROOT | Root certificates. |
When TSATLSClientCertStoreType is set to 2 (cstPFXFile), this setting must be set to the name of the file. When the type is set to 3 (cstPFXBlob), this setting must be set to the binary contents of a PFX file (i.e., a PKCS#12 certificate store). If the store is password-protected, specify the password in TSATLSClientCertStorePassword.
0 (cstUser - default) | For Windows, this specifies that the certificate store is a certificate store owned by the current user.
Note: This store type is not available in Java. |
1 (cstMachine) | For Windows, this specifies that the certificate store is a machine store.
Note: This store type is not available in Java. |
2 (cstPFXFile) | The certificate store is the name of a PFX (PKCS#12) file containing certificates. |
3 (cstPFXBlob) | The certificate store is a string (binary or Base64-encoded) representing a certificate store in PFX (PKCS#12) format. |
4 (cstJKSFile) | The certificate store is the name of a Java Key Store (JKS) file containing certificates.
Note: This store type is only available in Java. |
5 (cstJKSBlob) | The certificate store is a string (binary or Base64-encoded) representing a certificate store in Java Key Store (JKS) format.
Note: This store type is only available in Java. |
6 (cstPEMKeyFile) | The certificate store is the name of a PEM-encoded file that contains a private key and an optional certificate. |
7 (cstPEMKeyBlob) | The certificate store is a string (binary or Base64-encoded) that contains a private key and an optional certificate. |
8 (cstPublicKeyFile) | The certificate store is the name of a file that contains a PEM- or DER-encoded public key certificate. |
9 (cstPublicKeyBlob) | The certificate store is a string (binary or Base64-encoded) that contains a PEM- or DER-encoded public key certificate. |
10 (cstSSHPublicKeyBlob) | The certificate store is a string (binary or Base64-encoded) that contains an SSH-style public key. |
11 (cstP7BFile) | The certificate store is the name of a PKCS#7 file containing certificates. |
12 (cstP7BBlob) | The certificate store is a string (binary) representing a certificate store in PKCS#7 format. |
13 (cstSSHPublicKeyFile) | The certificate store is the name of a file that contains an SSH-style public key. |
14 (cstPPKFile) | The certificate store is the name of a file that contains a PPK (PuTTY Private Key). |
15 (cstPPKBlob) | The certificate store is a string (binary) that contains a PPK (PuTTY Private Key). |
16 (cstXMLFile) | The certificate store is the name of a file that contains a certificate in XML format. |
17 (cstXMLBlob) | The certificate store is a string that contains a certificate in XML format. |
18 (cstJWKFile) | The certificate store is the name of a file that contains a JWK (JSON Web Key). |
19 (cstJWKBlob) | The certificate store is a string that contains a JWK (JSON Web Key). |
21 (cstBCFKSFile) | The certificate store is the name of a file that contains a BCFKS (Bouncy Castle FIPS Key Store).
Note: This store type is only available in Java and .NET. |
22 (cstBCFKSBlob) | The certificate store is a string (binary or Base64-encoded) representing a certificate store in BCFKS (Bouncy Castle FIPS Key Store) format.
Note: This store type is only available in Java and .NET. |
23 (cstPKCS11) | The certificate is present on a physical security key accessible via a PKCS#11 interface.
To use a security key, the necessary data must first be collected using the CertMgr component. The ListStoreCertificates method may be called after setting CertStoreType to cstPKCS11, CertStorePassword to the PIN, and CertStore to the full path of the PKCS#11 DLL. The certificate information returned in the CertList event's CertEncoded parameter may be saved for later use. When using a certificate, pass the previously saved security key information as the Store and set StorePassword to the PIN. Code Example. SSH Authentication with Security Key:
|
99 (cstAuto) | The store type is automatically detected from the input data. This setting may be used with both public and private keys and can detect any of the supported formats automatically. |
If a matching certificate is found, the setting is set to the full subject of the matching certificate. If an exact match is not found, the store is searched for subjects containing the value of the setting. If a match is still not found, the setting is set to an empty string, and no certificate is selected.
The asterisk character (*) picks a random certificate in the certificate store.
The certificate subject is a comma-separated list of distinguished name fields and values. For instance, "CN=www.server.com, OU=test, C=US, E=support@nsoftware.com". Common fields and their meanings are as follows:
Field | Meaning |
CN | Common Name. This is commonly a hostname like www.server.com. |
O | Organization |
OU | Organizational Unit |
L | Locality |
S | State |
C | Country |
E | Email Address |
If a field value contains a comma, it must be quoted.
Base Config Settings
The following is a list of valid code page identifiers:
Identifier | Name |
037 | IBM EBCDIC - U.S./Canada |
437 | OEM - United States |
500 | IBM EBCDIC - International |
708 | Arabic - ASMO 708 |
709 | Arabic - ASMO 449+, BCON V4 |
710 | Arabic - Transparent Arabic |
720 | Arabic - Transparent ASMO |
737 | OEM - Greek (formerly 437G) |
775 | OEM - Baltic |
850 | OEM - Multilingual Latin I |
852 | OEM - Latin II |
855 | OEM - Cyrillic (primarily Russian) |
857 | OEM - Turkish |
858 | OEM - Multilingual Latin I + Euro symbol |
860 | OEM - Portuguese |
861 | OEM - Icelandic |
862 | OEM - Hebrew |
863 | OEM - Canadian-French |
864 | OEM - Arabic |
865 | OEM - Nordic |
866 | OEM - Russian |
869 | OEM - Modern Greek |
870 | IBM EBCDIC - Multilingual/ROECE (Latin-2) |
874 | ANSI/OEM - Thai (same as 28605, ISO 8859-15) |
875 | IBM EBCDIC - Modern Greek |
932 | ANSI/OEM - Japanese, Shift-JIS |
936 | ANSI/OEM - Simplified Chinese (PRC, Singapore) |
949 | ANSI/OEM - Korean (Unified Hangul Code) |
950 | ANSI/OEM - Traditional Chinese (Taiwan; Hong Kong SAR, PRC) |
1026 | IBM EBCDIC - Turkish (Latin-5) |
1047 | IBM EBCDIC - Latin 1/Open System |
1140 | IBM EBCDIC - U.S./Canada (037 + Euro symbol) |
1141 | IBM EBCDIC - Germany (20273 + Euro symbol) |
1142 | IBM EBCDIC - Denmark/Norway (20277 + Euro symbol) |
1143 | IBM EBCDIC - Finland/Sweden (20278 + Euro symbol) |
1144 | IBM EBCDIC - Italy (20280 + Euro symbol) |
1145 | IBM EBCDIC - Latin America/Spain (20284 + Euro symbol) |
1146 | IBM EBCDIC - United Kingdom (20285 + Euro symbol) |
1147 | IBM EBCDIC - France (20297 + Euro symbol) |
1148 | IBM EBCDIC - International (500 + Euro symbol) |
1149 | IBM EBCDIC - Icelandic (20871 + Euro symbol) |
1200 | Unicode UCS-2 Little-Endian (BMP of ISO 10646) |
1201 | Unicode UCS-2 Big-Endian |
1250 | ANSI - Central European |
1251 | ANSI - Cyrillic |
1252 | ANSI - Latin I |
1253 | ANSI - Greek |
1254 | ANSI - Turkish |
1255 | ANSI - Hebrew |
1256 | ANSI - Arabic |
1257 | ANSI - Baltic |
1258 | ANSI/OEM - Vietnamese |
1361 | Korean (Johab) |
10000 | MAC - Roman |
10001 | MAC - Japanese |
10002 | MAC - Traditional Chinese (Big5) |
10003 | MAC - Korean |
10004 | MAC - Arabic |
10005 | MAC - Hebrew |
10006 | MAC - Greek I |
10007 | MAC - Cyrillic |
10008 | MAC - Simplified Chinese (GB 2312) |
10010 | MAC - Romania |
10017 | MAC - Ukraine |
10021 | MAC - Thai |
10029 | MAC - Latin II |
10079 | MAC - Icelandic |
10081 | MAC - Turkish |
10082 | MAC - Croatia |
12000 | Unicode UCS-4 Little-Endian |
12001 | Unicode UCS-4 Big-Endian |
20000 | CNS - Taiwan |
20001 | TCA - Taiwan |
20002 | Eten - Taiwan |
20003 | IBM5550 - Taiwan |
20004 | TeleText - Taiwan |
20005 | Wang - Taiwan |
20105 | IA5 IRV International Alphabet No. 5 (7-bit) |
20106 | IA5 German (7-bit) |
20107 | IA5 Swedish (7-bit) |
20108 | IA5 Norwegian (7-bit) |
20127 | US-ASCII (7-bit) |
20261 | T.61 |
20269 | ISO 6937 Non-Spacing Accent |
20273 | IBM EBCDIC - Germany |
20277 | IBM EBCDIC - Denmark/Norway |
20278 | IBM EBCDIC - Finland/Sweden |
20280 | IBM EBCDIC - Italy |
20284 | IBM EBCDIC - Latin America/Spain |
20285 | IBM EBCDIC - United Kingdom |
20290 | IBM EBCDIC - Japanese Katakana Extended |
20297 | IBM EBCDIC - France |
20420 | IBM EBCDIC - Arabic |
20423 | IBM EBCDIC - Greek |
20424 | IBM EBCDIC - Hebrew |
20833 | IBM EBCDIC - Korean Extended |
20838 | IBM EBCDIC - Thai |
20866 | Russian - KOI8-R |
20871 | IBM EBCDIC - Icelandic |
20880 | IBM EBCDIC - Cyrillic (Russian) |
20905 | IBM EBCDIC - Turkish |
20924 | IBM EBCDIC - Latin-1/Open System (1047 + Euro symbol) |
20932 | JIS X 0208-1990 & 0121-1990 |
20936 | Simplified Chinese (GB2312) |
21025 | IBM EBCDIC - Cyrillic (Serbian, Bulgarian) |
21027 | Extended Alpha Lowercase |
21866 | Ukrainian (KOI8-U) |
28591 | ISO 8859-1 Latin I |
28592 | ISO 8859-2 Central Europe |
28593 | ISO 8859-3 Latin 3 |
28594 | ISO 8859-4 Baltic |
28595 | ISO 8859-5 Cyrillic |
28596 | ISO 8859-6 Arabic |
28597 | ISO 8859-7 Greek |
28598 | ISO 8859-8 Hebrew |
28599 | ISO 8859-9 Latin 5 |
28605 | ISO 8859-15 Latin 9 |
29001 | Europa 3 |
38598 | ISO 8859-8 Hebrew |
50220 | ISO 2022 Japanese with no halfwidth Katakana |
50221 | ISO 2022 Japanese with halfwidth Katakana |
50222 | ISO 2022 Japanese JIS X 0201-1989 |
50225 | ISO 2022 Korean |
50227 | ISO 2022 Simplified Chinese |
50229 | ISO 2022 Traditional Chinese |
50930 | Japanese (Katakana) Extended |
50931 | US/Canada and Japanese |
50933 | Korean Extended and Korean |
50935 | Simplified Chinese Extended and Simplified Chinese |
50936 | Simplified Chinese |
50937 | US/Canada and Traditional Chinese |
50939 | Japanese (Latin) Extended and Japanese |
51932 | EUC - Japanese |
51936 | EUC - Simplified Chinese |
51949 | EUC - Korean |
51950 | EUC - Traditional Chinese |
52936 | HZ-GB2312 Simplified Chinese |
54936 | Windows XP: GB18030 Simplified Chinese (4 Byte) |
57002 | ISCII Devanagari |
57003 | ISCII Bengali |
57004 | ISCII Tamil |
57005 | ISCII Telugu |
57006 | ISCII Assamese |
57007 | ISCII Oriya |
57008 | ISCII Kannada |
57009 | ISCII Malayalam |
57010 | ISCII Gujarati |
57011 | ISCII Punjabi |
65000 | Unicode UTF-7 |
65001 | Unicode UTF-8 |
Identifier | Name |
1 | ASCII |
2 | NEXTSTEP |
3 | JapaneseEUC |
4 | UTF8 |
5 | ISOLatin1 |
6 | Symbol |
7 | NonLossyASCII |
8 | ShiftJIS |
9 | ISOLatin2 |
10 | Unicode |
11 | WindowsCP1251 |
12 | WindowsCP1252 |
13 | WindowsCP1253 |
14 | WindowsCP1254 |
15 | WindowsCP1250 |
21 | ISO2022JP |
30 | MacOSRoman |
10 | UTF16String |
0x90000100 | UTF16BigEndian |
0x94000100 | UTF16LittleEndian |
0x8c000100 | UTF32String |
0x98000100 | UTF32BigEndian |
0x9c000100 | UTF32LittleEndian |
65536 | Proprietary |
- Product: The product the license is for.
- Product Key: The key the license was generated from.
- License Source: Where the license was found (e.g., RuntimeLicense, License File).
- License Type: The type of license installed (e.g., Royalty Free, Single Server).
- Last Valid Build: The last valid build number for which the license will work.
This setting only works on these components: AS3Receiver, AS3Sender, Atom, Client(3DS), FTP, FTPServer, IMAP, OFTPClient, SSHClient, SCP, Server(3DS), Sexec, SFTP, SFTPServer, SSHServer, TCPClient, TCPServer.
Setting this configuration setting to True tells the component to use the internal implementation instead of using the system security libraries.
This setting is set to False by default on all platforms.
Trappable Errors (PDFSign Component)
PDFSign Errors
801 | No timestamp server specified. |
802 | HTTP download failed. The error description contains the detailed message. |
803 | The document is not signed. |
810 | Unsupported image type. |
811 | Unsupported color space type. |
816 | Invalid signature. The error description contains the detailed message. |
827 | Invalid timestamp data. The error description contains the detailed message. |
829 | Bad signing certificate attribute. |
830 | Chain validation failed. The error description contains the detailed message. |
831 | Cannot update this type of signature. |
833 | Trusted List processing error. The error description contains the detailed message. |
834 | Cannot parse Trusted List data. |
837 | Invalid revocation information. |
839 | Failed to process Trusted List. The error description contains the detailed message. |
843 | No signing certificate found. |
845 | Invalid signing certificate chain. The error description contains the detailed message. |
851 | Unsupported hash algorithm. |
855 | Invalid signature contents. |
856 | Invalid signature byte range. |
857 | Byte range does not cover the entire document. |
858 | Cannot sign and encrypt document with more than one signature. |
862 | Cannot timestamp encrypted document. |
863 | Cannot update encrypted document. |
865 | Signature is too large to fit in the allocated window. Please consider extending the window by assigning the number of bytes to add to the ExtraSpace config before closing the document. |
866 | Not enough space to update signature. |
875 | Bad signature type (only PKCS#7/CMS signatures are supported by this handler). |
876 | Invalid decryption mode. |
PDF Errors
804 | PDF decompression failed. |
805 | Cannot add entry to cross-reference table. |
806 | Unsupported field size. |
807 | Unsupported Encoding filter. |
808 | Unsupported predictor algorithm. |
809 | Unsupported document version. |
812 | Cannot read PDF file stream. |
813 | Cannot write to PDF file stream. |
814 | OutputFile already exists and Overwrite is False. |
815 | Invalid parameter. |
817 | Bad cross-reference entry. |
818 | Invalid object or generation number. |
819 | Invalid object stream. |
820 | Invalid stream dictionary. |
821 | Invalid AcroForm entry. |
822 | Invalid Root entry. |
823 | Invalid annotation. |
824 | The input document is empty. |
826 | OpenType font error. The error description contains the detailed message. |
828 | Invalid CMS data. The error description contains the detailed message. |
835 | Cannot change decryption mode for opened document. |
836 | Unsupported Date string. |
838 | Cryptographic error. The error description contains the detailed message. |
840 | No decryption key found. |
841 | Encryption failed. The error description contains the detailed message. |
842 | No proper certificate for encryption found. |
846 | Unsupported revision. |
847 | Unsupported security handler SubFilter. |
848 | Failed to verify permissions. |
849 | Invalid password. |
850 | Invalid password information. |
852 | Unsupported encryption algorithm. |
859 | Cannot encrypt encrypted document. |
864 | Cannot modify document after signature update. |
868 | Cannot encrypt or decrypt object. |
869 | Invalid security handler information. |
870 | Invalid encrypted data. |
871 | Invalid block cipher padding. |
872 | Failed to reload signature. |
873 | Object is not encrypted. |
874 | Unexpected cipher information. |
877 | Invalid document. Bad document catalog. |
878 | Invalid document Id. |
880 | Invalid document. Invalid requirements dictionary. |
881 | Invalid linearization dictionary. |
882 | Invalid signature information. |
883 | Unsupported document format. |
890 | Unsupported feature. |
891 | Internal error. The error description contains the detailed message. |
Parsing Errors
1001 | Bad object. |
1002 | Bad document trailer. |
1003 | Illegal stream dictionary. |
1004 | Illegal string. |
1005 | Indirect object expected. |
1007 | Invalid reference. |
1008 | Invalid reference table. |
1009 | Invalid stream data. |
1010 | Unexpected character. |
1011 | Unexpected EOF. |
1012 | Unexpected indirect object in cross-reference table. |
1021 | Invalid type in Root object list. |
The component may also return one of the following error codes, which are inherited from other components.
HTTP Errors
118 | Firewall error. The error description contains the detailed message. |
143 | Busy executing current method. |
151 | HTTP protocol error. The error message has the server response. |
152 | No server specified in URL. |
153 | Specified URLScheme is invalid. |
155 | Range operation is not supported by server. |
156 | Invalid cookie index (out of range). |
301 | Interrupted. |
302 | Cannot open AttachedFile. |
The component may also return one of the following error codes, which are inherited from other components.
TCPClient Errors
100 | You cannot change the RemotePort at this time. A connection is in progress. |
101 | You cannot change the RemoteHost (Server) at this time. A connection is in progress. |
102 | The RemoteHost address is invalid (0.0.0.0). |
104 | Already connected. If you want to reconnect, close the current connection first. |
106 | You cannot change the LocalPort at this time. A connection is in progress. |
107 | You cannot change the LocalHost at this time. A connection is in progress. |
112 | You cannot change MaxLineLength at this time. A connection is in progress. |
116 | RemotePort cannot be zero. Please specify a valid service port number. |
117 | You cannot change the UseConnection option while the component is active. |
135 | Operation would block. |
201 | Timeout. |
211 | Action impossible in control's present state. |
212 | Action impossible while not connected. |
213 | Action impossible while listening. |
301 | Timeout. |
302 | Could not open file. |
434 | Unable to convert string to selected CodePage. |
1105 | Already connecting. If you want to reconnect, close the current connection first. |
1117 | You need to connect first. |
1119 | You cannot change the LocalHost at this time. A connection is in progress. |
1120 | Connection dropped by remote host. |
SSL Errors
270 | Cannot load specified security library. |
271 | Cannot open certificate store. |
272 | Cannot find specified certificate. |
273 | Cannot acquire security credentials. |
274 | Cannot find certificate chain. |
275 | Cannot verify certificate chain. |
276 | Error during handshake. |
280 | Error verifying certificate. |
281 | Could not find client certificate. |
282 | Could not find server certificate. |
283 | Error encrypting data. |
284 | Error decrypting data. |
TCP/IP Errors
10004 | [10004] Interrupted system call. |
10009 | [10009] Bad file number. |
10013 | [10013] Access denied. |
10014 | [10014] Bad address. |
10022 | [10022] Invalid argument. |
10024 | [10024] Too many open files. |
10035 | [10035] Operation would block. |
10036 | [10036] Operation now in progress. |
10037 | [10037] Operation already in progress. |
10038 | [10038] Socket operation on nonsocket. |
10039 | [10039] Destination address required. |
10040 | [10040] Message is too long. |
10041 | [10041] Protocol wrong type for socket. |
10042 | [10042] Bad protocol option. |
10043 | [10043] Protocol is not supported. |
10044 | [10044] Socket type is not supported. |
10045 | [10045] Operation is not supported on socket. |
10046 | [10046] Protocol family is not supported. |
10047 | [10047] Address family is not supported by protocol family. |
10048 | [10048] Address already in use. |
10049 | [10049] Cannot assign requested address. |
10050 | [10050] Network is down. |
10051 | [10051] Network is unreachable. |
10052 | [10052] Net dropped connection or reset. |
10053 | [10053] Software caused connection abort. |
10054 | [10054] Connection reset by peer. |
10055 | [10055] No buffer space available. |
10056 | [10056] Socket is already connected. |
10057 | [10057] Socket is not connected. |
10058 | [10058] Cannot send after socket shutdown. |
10059 | [10059] Too many references, cannot splice. |
10060 | [10060] Connection timed out. |
10061 | [10061] Connection refused. |
10062 | [10062] Too many levels of symbolic links. |
10063 | [10063] File name is too long. |
10064 | [10064] Host is down. |
10065 | [10065] No route to host. |
10066 | [10066] Directory is not empty |
10067 | [10067] Too many processes. |
10068 | [10068] Too many users. |
10069 | [10069] Disc Quota Exceeded. |
10070 | [10070] Stale NFS file handle. |
10071 | [10071] Too many levels of remote in path. |
10091 | [10091] Network subsystem is unavailable. |
10092 | [10092] WINSOCK DLL Version out of range. |
10093 | [10093] Winsock is not loaded yet. |
11001 | [11001] Host not found. |
11002 | [11002] Nonauthoritative 'Host not found' (try again or check DNS setup). |
11003 | [11003] Nonrecoverable errors: FORMERR, REFUSED, NOTIMP. |
11004 | [11004] Valid name, no data record (check DNS setup). |