ADSS Server supports these signature types:

  1. PDF Signing
  2. Microsoft Office Signing
  3. XML Signing 
  4. File Signing
  5. S/MIME Signing
  6. PKCS#1 Signing
  7. E-Passport LDS



PDF Signing

PDF is a common business document format and therefore PDF signatures are the ideal choice when human users need to view and sign documents. Standard PDF signature formats exist (e.g. ISO 32000-1 and ETSI PAdES), which means PDF documents signed using ADSS Server can be verified using other third party PDF software including the ubiquitous Adobe® Reader.

At a high-level ADSS Server supports both PDF Certify signatures and PDF Approval signatures. A certify signature is a special type of PDF signature in which certain restrictions can be applied while signing; e.g. No Changes Allowed, Allow Form fill-in and digital signatures, Allow Annotations, Form fill-in and digital signatures. The PDF specifications only allow a certify signature to be applied if it’s the first signature on a document. An approval signature is any normal digital signature which does not specify any restrictions.


ISO 32000-1 Signatures:

  • PDF Basic (Part 2 - based on ISO 32000-1): This is the basic PDF signature format verifiable in Adobe Reader 7+.
  • PDF Basic with embedded timestamp: As above but ADSS Server will also embed a timestamp from a trusted TSA - this helps to independently prove the time of signing. The configuration of TSA address(es) is described in this sectionConfiguring Time Stamp Authorities (TSA).
  • PDF Basic with embedded timestamp and revocation information: As above but ADSS Server will embed the revocation information of the signer's certificate chain within the signature – this helps to prove the status of the signer’s certificate at the time of signing. Such signatures support Long Term Validation (LTV) as they can be successfully verified even after the signer’s certificate expires.


PAdES Signatures:

PAdES stands for “PDF Advanced Electronic Signatures” and is a set of standards published by ETSI to support European requirements for qualified electronic signatures. ADSS Signing Service fully supports the EN 319 142-1 (baseline) and the EN 319 142-2 (extended) versions. PAdES signatures formats are based on the ETSI CAdES signature formats, this allows such PDF signatures to be extended for long-term validation by either the signer at time of signing or later by relying parties.

ADSS Server supports these PAdES signatures formats:


PAdES Baseline Signatures (ETSI EN 319 132-1): 

  • PAdES-B-B (Basic Signature): This allows any type of PDF to be hashed and signed by generating a PAdES-B-B signature with mandatory signing-time.
  • PAdES-B-T (Signature with Time): A Timestamp is added from trusted TSA to PAdES-B-B signature. This helps to independently prove the time of signing. The configuration of TSA address(es) is described in this section:  Configuring Time Stamp Authorities (TSA).
  • PAdES-B-LT (Signature with Long Term Validation Data): This adds the revocation status information of the signer's certificate chain. These signatures aim to tackle the long term availability of the validation material.
  • PAdES-B-LTA (Signature providing Long Term Availability and Integrity of Validation Data): PAdES-B-LTA is build on a PAdES-B-LT by adding one or more archive-time-stamp attributes. Such signature supports Long Term Archiving (LTA). The outer document timestamp protects the whole evidence material inside from expiry, so such signatures can be verified up to the expiry of the outer document timestamp.


PAdES Extended Signatures (ETSI EN 319 132-2): 

  • PAdES-E-BES: A PAdES standard compliant basic signature provides requirements for the incorporation of signed and some unsigned qualifying properties when the signature is generated. These signatures are PAdES Extended signatures compliant.
  • PAdES-E-EPES: The signature policy information is added at the time of signing to the PAdES-E-BES Signature.
  • PAdES-E-BES with embedded timestamp: This adds a signature timestamp to the above format. This timestamp is from a trusted TSA which provides independent proof of the time of signing. The configuration of TSA address(es) is described in this section: Configuring Time Stamp Authorities (TSA).
  • PAdES-E-LTV with document timestamp: This adds the revocation status information of the signer's certificate chain and an outer document timestamp protecting all the evidence inside. Such signature supports Long Term Validation (LTV). The outer document timestamp protects the whole evidence material inside from expiry, so such signatures can be verified up to the expiry of the outer document timestamp. This Document timestamp is optional in these signatures. These signatures are PAdES Extended signatures compliant. Note from a technical perspective these are equivalent to a CAdES-X-Long signature.

PDF Hash Signing:

ADSS Server is also able to sign just the hash of a PDF document. This is advantageous where the business application does not want to send the whole PDF to ADSS Server for reasons of confidentiality or performance. The PDF hash is usually created via the ADSS Client SDK, (or Auto File Processor) and this hash is sent to ADSS Server for signing. When the signed hash is returned, the ADSS Client SDK assembles this back within the PDF and then returned the signed PDF to the business application.

NOTE: This PDF hash signing approach is not supported for PAdES-LTV signing because ADSS Server needs to receive the whole PDF in order to embed the revocation information and document timestamp. These objects are not embedded inside the signature dictionary but elsewhere in the PDF document.

PAdES Supported Attributes:

Below are the list of attributes that are currently being supported in PAdES (baseline and extended) signatures:

  • MimeType
  • SignerRoleV2
  • CommitmentTypeIndication
  • ContentTimestamp
  • SigningCertificate
  • SigningCertificateV2
  • SignaturePolicyIdentifier
  • SigningTime
  • SignaturePolicyStore
  • SignatureTimeStamp
  • SAMLAssertion
  • SignatureProductionPlace
  • ContentHints
  • ContentType
  • DocumentTimeStamp
  • CertificateValues
  • RevocationValues


Microsoft Office Signing

Microsoft Office signatures can be created for Office Word/Excel 2013 (ISO/IEC 29500-2) documents. Word/Excel documents signed using ADSS Server are fully compliant with Office Word/Excel 2013 and vice versa. The supported basic, extended and long-term formats includes: XAdES-BES, XAdES-T, XAdES-C, XAdES-X, and XAdES-X-L. 


Note: Above mentioned signatures have been explained below inside XAdES Signatures section. 


XAdES-X-Type 2 signatures and Archive signatures are not supported by Office Word/Excel 2013. These extended ETSI signature formats are explained in further detail in the CMS section below.




XML Signing


ADSS Server supports ETSI XAdES signature formats, XAdES stands for “XML Advanced Electronic Signatures” and is a set of standards published by ETSI to support European requirements for qualified electronic signatures. ADSS Signing Service partially supports the EN 319 132-1 (baseline) and the EN 319 132-2 (extended) versions.


XML Dsig Signatures:

This format allows XML to be hashed and signed by generating a XML Dsig signature.


XAdES Signatures:

ADSS Server supports these  ETSI XAdES signatures formats :


XAdES Legacy Signatures (ETSI TS 101 903): 

  • XAdES-BES: A XAdES-BES standard compliant basic signature provides requirements for the incorporation of signed and some unsigned qualifying properties when the signature is generated.
  • XAdES-T (XAdES-BES with embedded timestamp): A Timestamp is added from existing TSA to XAdES-BES signature to ensure the signature itself existed at a certain date and time.
  • XAdES-C (XAdES-T with Complete Validation Data References): XAdES-C is an extended version of XAdES-T on which qualifying properties containing references to certificates and references to status data value are added.
  • XAdES-X (XAdES-C with Extended Validation Data): XAdES-X is an extended version of XAdES-C with embedded timestamp for signature, certificate and revocation references.
  • XAdES-X-L (XAdES-X with Long-term Validation Data): XAdES-X-L is an extended version of XAdES-X which are built on which qualifying properties containing certificates and revocation values are added.
  • XAdES-A (XAdES-X-L with Archive Validation Data): In case of XAdES-A; XAdES-C, XAdES-X and XAdES-X-L are being created first. XAdES-A is created by adding ArchiveTimeStamp in above mentioned signatures.


XAdES Baseline Signatures (ETSI EN 319 132-1): 

  • XAdES-B-B (Basic Signature): A XAdES-B-B standard compliant basic signature provides requirements for the incorporation of signed and some unsigned qualifying properties when the signature is generated.
  • XAdES-B-T (Signature with Time): A Timestamp is added from existing TSA to XAdES-B-B signature to ensure the signature itself existed at a certain date and time.
  • XAdES-B-LT (Signature with Long Term Validation Data): XAdES-B-LT is an extended version of XAdES-B-T on which qualifying properties certificates and revocation values are added.
  • XAdES-B-LTA (Signature providing Long Term Availability and Integrity of Validation Data): In case of XAdES-B-LTA; XAdES-B-B, XAdES-B-T and XAdES-B-LT are being created first. XAdES-B-LTA is created by adding ArchiveTimeStamp in above mentioned signatures.


XAdES Extended Signatures (ETSI EN 319 132-2): 

  • XAdES-E-BES: A XAdES-E-BES standard compliant basic signature provides requirements for the incorporation of signed and some unsigned qualifying properties when the signature is generated.
  • XAdES-E-EPES: XAdES-E-EPES is a version of XAdES-E-BES with Signature Policy Identifier.
  • XAdES-E-T (XAdES-E-BES with embedded timestamp): A Timestamp is added from existing TSA to XAdES-E-BES signature to ensure the signature itself existed at a certain date and time.
  • XAdES-E-C (XAdES-E-T with Complete Validation Data References): XAdES-E-C is an extended version of XAdES-E-T on which qualifying properties containing references to certificates and references to status data value are added.
  • XAdES-E-X (XAdES-E-C with Extended Validation Data): XAdES-E-X is an extended version of XAdES-E-C with embedded timestamp for signature, certificate and revocation references.
  • XAdES-E-X-L (XAdES-E-X with Long-term Validation Data): XAdES-E-X-L is an extended version of XAdES-E-X which are built on which qualifying properties containing certificates and revocation values are added.
  • XAdES-E-A (XAdES-E-X-L with Archive Validation Data): In case of XAdES-E-A; XAdES-E-C, XAdES-E-X and XAdES-E-X-L are being created first. XAdES-E-A is created by adding ArchiveTimeStamp in above mentioned signatures.


ADSS Server also supports the original W3C XML DigSig standard with modes:

  • Enveloping: The original XML file is contained inside the signature.
  • Enveloped: The XML signature is embedded within the original XML file.


XAdES Supported Attributes:

Below are the list of attributes that are currently being supported in XAdES (legacy, baseline and extended) signatures:

  • SigningTime
  • SigningCertificateV2 ('SigningCertificate' in case of XAdES Legacy Signatures)
  • DataObjectFormat
    • DataObjectFormat/Description
    • DataObjectFormat/MimeType
    • DataObjectFormat's ObjectReference attribute
  • SignerRoleV2 ('SignerRole' in case of XAdES Legacy Signatures)
  • CommitmentTypeIndication
  • SignatureProductionPlaceV2 ('SignatureProductionPlace' in case of XAdES Legacy Signatures)
  • CounterSignature
  • AllDataObjectsTimeStamp
  • SignaturePolicyIdentifier
  • SignaturePolicyStore (Does not exists in case of XAdES Legacy Signatures)
  • SignatureTimeStamp
  • CompleteCertificateRefsV2 ('CompleteCertificateRefs' in case of XAdES Legacy Signatures)
  • CompleteRevocationRefs
  • CertificateValues
  • RevocationValues
  • SigAndRefsTimeStampV2 ('SigAndRefsTimeStamp' in case of XAdES Legacy Signatures)
  • RefsOnlyTimeStampV2 ('RefsOnlyTimeStamp' in case of XAdES Legacy Signatures)
  • ArchiveTimeStamp (defined in namespace whose URI is "http://uri.etsi.org/01903/v1.4.1#").



File Signing

File Signing is the term used to describe traditional binary-based ASN.1 signature formats. ADSS Server supports the historical signature formats in this category (i.e. PKCS#7 and CMS) and also the latest CAdES formats. It is recommended to use CAdES formats unless the older signature formats are required for backward compatibility. The type of supported signature can be further defined as:

  • Enveloping: The original file is contained inside the signature.
  • Detached: The signature contains just the hash of the original file.

Following signature types are supported for File signing:

PKCS#7 Signatures:

This format allows any type of file to be hashed and signed by generating a PKCS#7 signature. In this category both enveloping signatures (the original file is contained inside the signature) and detached signatures (the signature only contains the hash of the original file) are supported.

CMS Signatures:

This format allows any type of file to be hashed and signed by generating a CMS signature. CMS is essentially a later version of the PKCS#7 signature format. Both enveloping signatures and detached signatures are supported.

CAdES Signatures:

CAdES stands for “CMS Advanced Electronic Signatures” and is a set of standards published by ETSI  to support European requirements for electronic signatures. ADSS Signing Service fully supports the EN 319 132-1 (baseline) and the EN 319 132-2 (extended) versions. CAdES specifies the use of signature formats for signing the file content. So the use of CAdES signatures will allow these signatures to be extended by either the signer or relying parties to ensure that signatures can be verified for as long as is necessary. Following are the different standard CAdES signatures formats:

CAdES Baseline Signatures (ETSI EN 319 132-1): 

  • CAdES-B-B (Basic short-term signatures)This allows any type of file to be hashed and signed by generating a CAdES-B-B signature with mandatory signing-time.
  • CAdES-B-T (CAdES B-B with Signature Timestamp): A Timestamp is added from trusted TSA to CAdES-B-B signature. This helps to independently prove the time of signing. The configuration of TSA address(es) is described in this section:  Configuring Time Stamp Authorities (TSA).
  • CAdES-B-LT (CAdES B-T with Revocation Values in Long Term Validation):  CAdES-B-LT is an extended version of CAdES-B-T that contains the certificate-values and revocation-values. Certificate-values contain the whole certificate path required for verifying the signature, whereas, the revocation-values contain the CRLs and/or OCSP responses required for the validation of the signature.
  • CAdES-B-LTA (CAdES-B-LT with Archive Validation Data): CAdES-B-LTA is build on a CAdES-B-LT by adding one or more archive-time-stamp attributes.


CAdES Extended Signatures (ETSI EN 319 132-2): 

  • CAdES-E-BES (Basic short-term signatures): This allows any type of file to be hashed and signed by generating a CAdES-E-BES signature. This is illustrated as follow:

  • CAdES-E-EPESAs above but the Signature Policy ID information is also added to the signature as a signed attribute. This is illustrated as follow:


  • CAdES-E-T (CAdES-E-BES with Signature Timestamp): As above but ADSS Server also adds a timestamp from a trusted TSA - this helps to independently prove the time of signing. The configuration of TSA address(es) is described in this section: Configuring Time Stamp Authorities (TSA).


  • CAdES-E-C (CAdES-E-T with Complete Validation Data References): This adds the complete-certificate-references and complete-revocation-references attributes. The complete-certificate-references attribute contains references to all the certificates present in the certification path used for verifying the signature. The complete-revocation-references attribute contains references to the CRLs and/or OCSP responses used for verifying the signature. Storing the references allows the values of the certification path and the CRLs or OCSPs responses to be stored elsewhere, reducing the size of a stored electronic signature:

  • CAdES-E-X (CAdES-E-C with Extended Validation Data) Type1: This adds a time-stamp token on the CAdES-E-C itself to provide trust over all the elements and references. This protects the certificates, CRLs, and OCSP responses in case of a later compromise of a CA key, CRL key, or OCSP issuer key:

  • CAdES-E-X (CAdES-E-C with Extended Validation Data) Type2: This adds to the CAdES-E-C format the CAdES-E-C-time-stamped-certs-crls-references attribute, whose content is a time-stamp token on the certification path and revocation information references. This provides integrity and trusted time protection over all the references. This may protect the certificates, CRLs and OCSP responses in case of a later compromise of a CA key, CRL key or OCSP issuer key. Note Type 1 and Type 2 are essentially very similar and protect against the same threat:

  • CAdES-E-X-L (CAdES-X with Long-term Validation Data): This can be based on either Type 1, Type 2. CAdES-E-X Long adds the certificate-values and revocation-values. Certificate-values contain the whole certificate path required for verifying the signature; the revocation-values contain the CRLs and/or OCSP responses required for the validation of the signature. This provides a known repository of certificate and revocation information required to validate a CAdES-E-C and prevents such information from getting lost:


  • CAdES-E-X-A (CAdES-X-L with Archive Validation Data): CAdES-E-A builds on a CAdES-E-X Long Type 1 or 2 by adding one or more archive-time-stamp attributes. This form is used for archival of long-term signatures. Successive time-stamps protect the whole material against vulnerable hashing algorithms or the breaking of the cryptographic material or algorithms (i.e. each outer timestamp can use stronger algorithms or key lengths):


CAdES Supported Attributes:

Below are the list of attributes that are currently being supported in CAdES (baseline and extended) signatures:

  • ContentType
  • SigningCertificate
  • SigningCertificateV2
  • SigningTime
  • CommitmentTypeIndication
  • ContentHints
  • MimeType
  • SignatureProductionPlace
  • SignerRole
  • CounterSignature
  • ContentTimestamp
  • SignaturePolicyIdentifier
  • SignaturePolicyStore
  • SignatureTimeStamp
  • CompleteCertificateRefs
  • CompleteRevocationRefs
  • CertificateValues
  • RevocationValues
  • RefsOnlyTimeStamp
  • SigAndRefsTimeStamp
  • ArchiveTimeStampv3


ETSI Portal does not verify SHA3 hashed signatures.




S/MIME Signing

S/MIME Signatures: Use this option for standard email signatures (as used by most email applications such as Microsoft Outlook®).



PKCS#1 Signing

PKCS#1 signatures are the lowest level digital signature format often referred to as a “raw” signature. It is created over the document hash using the signer’s private key. This basic PKCS#1 signature is the core element within the other signature formats explained above.


E-Passport LDS
E-Passport also known as an electronic Machine Readable Travel Document (eMRTD), contains a contactless chip onto which the passport holder's personal information and biometrics are stored. To ensure the integrity and authenticity of this information, it is digitally signed by a Document Signer (DS). ICAO has defined a special structure to store data on the chip that is called LDS (Logical Data Structure). The LDS consists of different data groups where each group contains specific information related to the user. The signature computed on the LDS is a CMS signature based on RFC 3369. 
So this signature type is used to sign the E-Passport chips data according to RFC 3369 and ICAO guidelines. 


Note: The E-Passport LDS Signature Type will only be available if its enabled in the ADSS Signing Service license.