Idea Description:
According to the current DocuSign JWT authentication documentation (https://developers.docusign.com/platform/auth/jwt-get-token/), the supported JWT claims include:
{ "iss": "<integration_key>",
"sub": "<user_id>",
"aud": "account-d.docusign.com",
"iat": <epoch_time>,
"exp": <epoch_time+6000>,
"scope": "signature impersonation"
}
However, the JSON Web Token (JWT) RFC 7519 specification (Section 4.1.7) defines the "jti" (JWT ID) claim, which provides a unique identifier for a token and can be used specifically to prevent replay attacks:
“The 'jti' claim can be used to prevent the JWT from being replayed.”
The jti value is a case-sensitive string that must be globally unique. While optional in the RFC, it is a widely adopted security enhancement in modern API authentication systems.
Why This Matters
In real customer environments, JWT assertions are often passed through multiple layers—load balancers, proxies, middleware, observability layers, or logging systems. When the JWT assertion is URL-encoded and sent to the /token endpoint, these systems may log or store the full request. This creates a risk that the same assertion could be replayed to request a new access token.
Given that Docusign manages extremely sensitive business data (contracts, legal records, identity information), strengthening API-level protections is essential. Replay protection is a foundational security mechanism that is often overlooked but has very high impact when compromised.
Requested Enhancement
Please consider adding support for the "jti" claim in Docusign JWT validation logic:
-
Allow developers to include a “jti” claim in their JWT assertions
-
Docusign should validate the uniqueness of each
jtiwithin a configurable time window.
-
-
Reject any
/tokenrequest that attempts to reuse a previous “jti” value-
Ensures a strong guardrail against replay attacks.
-
-
Optional logging or monitoring
-
Log replay attempts to help customers detect possible credential leakage.
-
Customer Value
-
Strengthens API authentication security
-
Reduces risk of replay attacks when assertions traverse proxies or logs
-
Aligns Docusign more closely with industry best practices (per RFC 7519)
-
Helps customers meet compliance requirements for high-assurance environments
-
Provides higher protection for mission-critical contract data
-
Builds defense-in-depth for JWT-based integrations
With increasing threats in the SaaS ecosystem and the high sensitivity of contract data, adding jti support would be a significant improvement to Docusign’s API security posture.
FreeLink/甫连信息
🌍 DocuSign Partner | Partner Profile
🌟The only DocuSign Partner globally with two Certified eSignature Technical Consultants
🏆 DocuSign 2025 APAC Growth Engine Partner of the Year
💡 Ranked #1 in the OG All Star category in DocuSign Community Wrapped 2024
📊 DocuSign Community Leaderboard Top 5 contributor
🚀 Expertise in DocuSign integrations with on-premises systems for leading enterprises across various industries
🔗 Connect with me on LinkedIn: https://www.linkedin.com/in/gehengfeng
📬 For business inquiries, feel free to connect via :
WeChat/微信: +86 1381880287
WhatsApp: +65 97796938
Back to Docusign.com

