Pasar al contenido principal
No se ha encontrado ningún elemento.
Logotipo de Dropbox Sign
¿Por qué elegir Dropbox Sign?
Desplegar o contraer acordeón

Qué puedes hacer

Firmar documentos en línea
Crea firmas electrónicas
Selecciona o crea plantillas
Rellenar y firmar PDF
Finalizar contratos en línea
Gestión de documentos‍
Ver funciones
Icono de flecha hacia la derecha

Casos prácticos

Desarrollo comercial y de negocio
Recursos humanos
Start-ups
Tecnología financiera
Propiedad inmobiliaria
Servicios a la carta
Productos
Desplegar o contraer acordeón
Icono de Dropbox
Sign
Facilita el envío y la firma
Icono de Dropbox
Sign API
Integra las firmas electrónicas en tu flujo de trabajo
Icono de Dropbox Fax
Fax
Envía faxes sin tener fax
Icono de integraciones de Dropbox
Integraciones
Estamos donde trabajas
Recursos
Desplegar o contraer acordeón
Blog
Amplios conocimientos sobre flujos de trabajo y noticias sobre productos
Experiencias de clientes
Historias reales con resultados tangibles
Centro de ayuda
Consejos avanzados para usar nuestros productos
Colección de recursos
Informes, vídeos y hojas informativas
Desarrolladores
Precios
Desplegar o contraer acordeón
Precios de Dropbox Sign
Encuentra el plan perfecto para ti
Precios de Dropbox Sign API
Historias reales con resultados tangibles
Contactar con ventas
Registrarse
Contactar con ventas
Iniciar sesión
Desplegar o contraer acordeón
Dropbox Sign
Dropbox Forms
Dropbox Fax
Pruébalo gratis
Blog
/
Desarrolladores

Cross-Window Messaging & Embedded Signing

por 
Ben Dezile
April 30, 2015
5
minutos de lectura
Cross-Window Messaging and Embedded Signing
icono de mensaje emergente

Cambio de imagen, pero ¡el mismo gran producto! HelloSign ahora es Dropbox Sign.

icono de cerrar

Our API customers can integrate Dropbox Sign’s signer page directly within their website. This creates a seamless signing experience since their users never need to leave the site to review and legally sign documents. To add document signing to your site using Dropbox Sign’s API, you’ll first need to create an API app configuration which declares the domain of your site in which the signer page will appear.


When we first started implementing the embedded signing feature we faced three main challenges. 

‍

The first challenge was to make it secure. We decided to use an iFrame -- rather than adding the features directly to the host site's page – to prevent malicious manipulation of the signer page. 

‍

The second challenge was figuring out how to communicate between the iFrame and the parent window (our customer’s site). Browsers restrict what can be accessed from a child window when it’s in a different domain (cross-origin policies). To do this, we would need to develop a custom inter-window messaging system. 

‍

Our third and final challenge was finding a reliable way to verify that the signer page was being opened on a site in an approved domain. This protects signers from fraud, ensuring they are signing documents on a trusted partner site.



‍

Cross-window messaging

‍


Cross-window communication is necessary for two reasons. First, if a user cancels halfway through or completes the signing process, we need a way to communicate that event to the parent window. This allows the embedding site to respond appropriately. Second, we need to verify that the parent domain's window matches the API app's registered domain. This process is detailed further down. 

‍

There are two components to cross-window messaging: setting up a window to listen for messages, and sending messages to that window from other windows. The following code examples illustrate how to do that.

‍

Listening for messages 

‍

‍

Sending a message 

‍

‍

NOTE: A few older browsers do not support cross-window messaging altogether, one possible workaround is for the iframe to change the parent window’s hash to contain the message data. The listener in the parent window will then parse it from there.

‍


All messages dispatched to the current window by the browser will be passed to our listener method via an event object. Both eventObj.origin and eventObj.data will be useful to check where it comes from and what the message data is. 

‍

We’ve made this easy for our API customers to set up. All that’s needed is for the embedding site to include a single JavaScript file on their page. This file takes care of setting up the listeners illustrated above and allowing the page to receive messages from our iFrame. 

‍

Inside the iFrame on the signing page, we create a second listener that will only process messages from the parent window and ignore the rest. This way we have a bi-directional communication channel between our page in the iFrame and the parent window. This channel is used for domain verification and reporting user activity to the parent window so it can take the appropriate action in response. 

‍

Our customer’s site must do one last thing to process the messages being reported from the Dropbox Sign iFrame, which is to specify an event handler function. This function will be used by the internal message listener to pass messages to the parent window. 

‍

‍

 For example, if the user cancels before completing the document, the internal listener in the parent window will receive an event with an origin domain for verification and an event data payload. If the origin matches, the customer’s message handler receives a nicely formatted event: 

‍

‍

Domain verification

‍

Because of the same origin policy, the embedded iFrame can’t access information about the parent window’s location. Instead, our library communicates this from the parent window to the iFrame when HelloSign.open() is called. Because this could be easily faked by using a modified version of our library, we don’t trust this data until it’s been verified.

‍

If we try to access the parent window’s location from the console, you’ll see we are blocked by the browser because it’s considered cross-origin.

‍

‍

We leveraged cross-window messaging to implement a ping-like scheme that verifies the accuracy of the domain claimed by the parent window. 

‍

Here’s the full verification process:

‍

  1. The parent window sends a message to the iFrame with its domain and client ID.
  2. We use the client ID to look up the registered domain and verify a match.
  3. The iFrame dispatches a hello message that’s targeted to windows within the registered domain and includes a unique token that has been randomly generated on the server.
  4. If the parent window is indeed within the domain it claims to be it will get the hello message. Our internal listener in the parent window will extract the unique token from message data and send a helloback message to the iFrame that also contains the unique token.
  5. Upon receiving the helloback message with the right token the iFrame will know that the claimed domain is indeed accurate and will start loading the signer page.

‍

Conclusion

‍
Cross-window messaging provides secure communication and domain verification between our site and our customers’, but it was tricky to get right. If you’re looking to build a web-based feature that can be embedded in a third-party site, we hope our approach can serve as an example and save you some time. 

‍

We are excited about pushing our approach further in the future. Cross-window messaging could be extended to create a full-on API that would allow customer sites to act on what is rendered in the iFrame or what the signer is doing as they complete the signing process. 

‍

You can find more details on how this works by checking out our API documentation.

No pierdas el hilo

¡Listo! Revisa tu bandeja de entrada.

Thank you!
Thank you for subscribing!

Lorem ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Lorem ipsum
Icono de flecha hacia la derecha
icono de cerrar

Up next:

Ilustración en primer plano de una firma manuscrita, que representa soluciones modernas para la firma digital.
Desarrolladores
15
minutos de lectura

Integración de Dropbox Sign con Ruby on Rails: un tutorial paso a paso

Ilustración en primer plano de una firma manuscrita, que representa soluciones modernas para la firma digital.
Desarrolladores
15
minutos de lectura

Dropbox Sign vs. SignNow for developers

eBook

7 ways to protect your company culture through change and growth

Productos
Dropbox SignDropbox Sign APIDropbox FaxIntegraciones
Por qué Dropbox Sign
Firmas electrónicasFirmar documentosFirma y rellena documentos PDFContratos onlineCrea firmas electrónicasEditor de firmasFirma de documentos de Word
Asistencia
Centro de ayudaContactar con ventasPonte en contacto con el departamento de asistencia.Gestionar cookiesPrimeros pasos: Dropbox SignPrimeros pasos: Dropbox Sign API
Recursos
BlogExperiencias de clientesCentro de recursosGuía de legalidadCentro de confianza
Socios
Socios estratégicosLocalizador de socios
Empresa
EmpleoCondicionesPrivacidad
Icono de FacebookIcono de YouTube

Métodos de pago aceptados

Logotipo de MastercardLogotipo de VisaLogotipo de American ExpressLogotipo de Discover
Insignia de conformidad con la CPAInsignia de conformidad con la HIPAAInsignia de Sky High Enterprise-ReadyInsignia de certificación ISO 9001

Las firmas electrónicas de Dropbox Sign son legalmente vinculantes en los Estados Unidos, la Unión Europea, el Reino Unido y en muchos otros países.
Para obtener más información, consulta nuestros Términos y condiciones y la Política de privacidad.