Overview
If you’re building a platform, admin system, or reseller service that makes UIP API requests on behalf of your end users, you must include the real requester’s UIP ID in your API calls for legal traceability. UIP only captures the originrequester_uip_id (your platform’s UIP ID). Without including the actual end user’s UIP ID in the intent or signature_information fields, audit trails will only show your platform—not the real person making the request.
Why This Is Required
Audit Trail Accuracy
Every UIP action creates a permanent audit record. For compliance, legal, and dispute resolution purposes, audit trails must show:- Who actually requested the action - The real end user’s UIP ID (mandatory)
- Which organization facilitated it - Your platform or reseller service
- Complete chain of custody - Full transparency from end user through platform to recipient
Regulatory Compliance
Many industries require knowing the true originator of identity verification or signature requests:- Financial services - KYC/AML regulations require identifying the actual account holder
- Healthcare - HIPAA requires tracking who accessed or signed for patient information
- Legal documents - Court-admissible signatures need the real signatory’s identity, not a platform’s
- Government services - Identity verification must trace to actual citizens, not intermediary platforms
Preventing Internal & External Fraud
Including the real requester’s UIP ID prevents:- External fraud - Outsiders can’t impersonate your users because their UIP ID must be included
- Internal fraud - Malicious employees or admins can’t hide behind your platform’s identity
- Account compromise - If a platform admin account is compromised, the attacker still can’t hide their actions
- False attribution - Clear evidence of who actually made each request prevents wrongful accusations
Dispute Resolution
When disputes arise, you need clear evidence of:- Which specific user made the request - Their UIP ID provides government-verified identity
- When they made it through your platform
- What information they provided
- The admin who processed it (if applicable)
How to Include Real Requester Information
UIP captures your platform’srequester_uip_id automatically. You must embed the actual end user’s UIP ID in the intent or signature_information fields.
Method 1: Include in Intent (Recommended)
Method 2: Include in Signature Information
For Sign API requests, you can embed requester details in the signature information:Method 3: Structured Format
Use a consistent structured format for programmatic parsing:Recommended Information to Include
End User UIP ID (Required for Legal Binding)
End User UIP ID (Required for Legal Binding)
Always include the end user’s UIP ID (the person actually making the request through your platform):
- UIP ID (required for legal traceability) - The actual user’s UIP identifier
- Internal user ID (optional) - Your system’s identifier for correlation
- Employee ID (optional) - For HR/employee platforms
- Customer number (optional) - For customer service platforms
"requested by UIP: user_abc123def456"Recommended format: "UIP: user_abc123def456, Employee ID: 12345"Admin/Requester UIP ID
Admin/Requester UIP ID
Include the UIP ID of the admin or person initiating the request in your system:
- Admin UIP ID (recommended) - The admin’s UIP identifier
- Role or department (optional) - For additional context
"by Admin UIP: admin_xyz789" or "HR Manager UIP: admin_xyz789"Platform Context
Platform Context
Identify your platform or system:
- Platform name
- Department or division
- System or service name
"via Acme Corp Admin Platform" or "through StreamCo HR System"Request Timestamp (Optional)
Request Timestamp (Optional)
For additional audit clarity, include when the request was initiated:Example:
"requested on 2025-01-11 at 14:30 UTC"Common Use Cases
HR & Employee Management Platforms
When HR admins request employee signatures for handbooks, policies, or onboarding documents:Multi-Tenant SaaS Platforms
When your SaaS platform makes requests on behalf of tenant organizations:Healthcare Admin Systems
When healthcare admins request patient consent or identity verification:Financial Services Resellers
When reseller platforms facilitate KYC/AML verification for their clients:Property Management Platforms
When property managers request tenant signatures on leases:Best Practices
Always Include UIP ID
Required for legal binding: Include the actual end user’s UIP ID in every request. Use UIP IDs, not email addresses or generic identifiers.
Use Consistent Format
Standardize your format across all requests for easier parsing and auditing
Include Context
Add platform name, department, or system name so audit trails are clear
Preserve Privacy
Use UIP IDs instead of email addresses. Don’t include sensitive personal information like SSN or full credit card numbers
Compliance Considerations
Data Retention
Store mapping between your internal user IDs and UIP session IDs/audit IDs:Audit Query Strategy
When retrieving audit trails via the Audit API, correlate UIP audit records with your internal logs:- Query UIP Audit API with the
audit_idto get official UIP audit record - Cross-reference with your internal database using the mapping above
- Combine records to show complete chain: end user → your platform → UIP → recipient
Legal Documentation
For court-admissible evidence or regulatory audits:1
Retrieve UIP Audit Record
Use the Audit API to get the cryptographic audit proof
2
Retrieve Your Platform Logs
Pull your internal logs showing the end user’s request through your system
3
Combine Documentation
Present both records together showing the complete chain of custody
4
Include Embedded Information
The intent or signature_information fields will show the real requester details you embedded