Entries filed under 'Forms best practices'

    What is an e-Signature? Part II.

    June 26, 2017 8:50 AM by Dave Venance

     

    In the last blog post, we discussed the two main types of signatures (Electronic and Digital).  We then explored some examples of each.  In this continuation, we will continue to explore different types of signatures that you can leverage in your form based business processes.

     

     

    Read More »

    What is an e-Signature? Part I.

    June 5, 2017 1:30 PM by Dave Venance

    There are two kinds of signatures today:

     

    •        Electronic Signatures

     

    An electronic signature, or e-signature, refers to data in electronic form, which is logically associated with other data in electronic form and which is used by the signatory to sign or confirm their approval of a document or transaction.

     

    •        Digital Signatures

     

    These are a subset of electronic signatures because they are also in electronic form. Digital signatures, are a cryptographic mechanism often used to implement electronic signatures.  Digital signatures go much further in terms of providing security and trust services. 

     

     

    Let’s consider the differences between electronic signatures and digital signatures in more detail.

     

    Read More »

    AEM Security User Onboarding Decisions (Part II)

    December 6, 2016 9:19 AM by Frank Preston

    Configuring The Authentication and Directory Models

     

    As we had shown in our previous blog entry, making the decisions on who we want to share protected documents with is critical in understanding how we need to configure the Authentication and Directory Models.

     

    AEM allows us to setup multiple or single Domains. In the context of AEM a Domain is any environment that we connect with to gather user information and perform authentication.

     

     

    Read More »

    AEM Security User Onboarding Decisions

    November 29, 2016 3:22 PM by Frank Preston

    AEM Security is used in a wide variety of scenarios. You may be distributing coupons where you want to restrict the ability to print the coupon and given the distribution, you may want to use Anonymous Policies. You could be a manufacturing company and want to protect you intellectual property where only internal authorized staff can access the material. Or you’re organization is a bank and you have a need to control internal access but you also want to allow your clients to access their own documents in a secure manner.

     

     

    Read More »

    That’s a wrap: A cost-effective alternative to replacing your legacy system (Part II)

    November 14, 2016 2:12 PM by 4Point

    To continue discussing the Adobe AEM wrapper let's take a "technology view" on the problem.

    The AEM wrapper approach involves three elements:

    • An AEM Forms or AEM Sites user interface, which supports desktop, tablet and mobile devices
    • An AEM web service-based middleware layer that serves data as well as business rules
    • An application programming interface (API) that allows the legacy system to communicate with the Web using TCP/IP

     

     

     

     

    Read More »
Need a hand?
Contact Us