SSO Integration
Connects with SAML or OIDC identity providers to centralize resets and avoid separate passwords within signNow.
Users can reset their signNow password on web browsers and supported mobile apps; verify browser compatibility and app version before beginning.
Ensure the app is updated and network connectivity is secure; administrators should confirm SSO configuration and session timeouts to avoid reset conflicts.
A time-limited reset link is sent to the account email so the user can set a new password; this method is quick yet depends on access to the registered inbox and is logged in the audit trail for compliance review.
An organization administrator can initiate an account reset or unlock through the admin console; this is appropriate for managed users, helps when email access is lost, and allows an admin to verify identity per company policy before restoration.
When accounts use single sign-on, password management is handled by the identity provider so signNow defers authentication; this removes local passwords, simplifies recovery, and centralizes access control for enterprises.
Enforced two-factor authentication adds a secondary verification step during reset, requiring a code or device confirmation to reduce the risk of unauthorized password changes and protect eSignature authority.
Connects with SAML or OIDC identity providers to centralize resets and avoid separate passwords within signNow.
Offers role-based controls for resetting, unlocking, and auditing user account actions within the organization.
Users can receive reset emails and complete password changes from iOS or Android signNow apps for on-the-go recovery.
All reset attempts and subsequent signings are added to the document history for compliance and forensics.
Admins can receive alerts for suspicious reset activity and implement monitoring through integrations.
Enterprise APIs enable programmatic account management and controlled reset workflows for identity orchestration.
| Setting Name | Default Configuration |
|---|---|
| Password Policy | Minimum length 12 |
| Account Lockout | 5 failed attempts |
| Reset Link TTL | 60 minutes |
| Two-factor Enforcement | Optional by plan |
| SSO Enforcement | Configurable |
| signNow | DocuSign | Adobe Sign | PandaDoc | HelloSign | |
|---|---|---|---|---|---|
| Starting Price | $8/user/mo, billed annually | $8/user/mo, annual | $13/user/mo, annual | $19/user/mo, annual | $15/user/mo, annual |
| Free Trial | 7-day free trial, no card | Limited trial availability | Trial available | Trial available | Trial available |
| Bulk Send | Yes, Business Premium plan | Add-on available | Add-on available | Yes, included | Add-on available |
| Audit Trail | Yes, full audit trail | Yes, full audit trail | Yes, full audit trail | Yes, activity logs | Yes, full audit trail |
| HIPAA Compliant | Yes, BAA required | Yes, BAA required | Yes, BAA required | Limited support | Yes, BAA available |
| Envelope Cap | No envelope cap | 100 envelopes/user/year | No envelope cap | No envelope cap | No envelope cap |
A small real estate firm needed fast account recovery for remote agents
Resulting in faster closings and maintained audit records for compliance.
An enterprise operations team required controlled resets for integration users
Leading to secure, auditable access restoration and fewer support tickets.
Password reset capabilities are important for a wide range of signNow users from individual signers to enterprise IT teams who manage many accounts.
Provide role-based instructions so end users, admins, and security teams each know the correct recovery path and how to preserve eSignature compliance.
An IT administrator oversees signNow provisioning, manages SSO integration, unlocks or resets user accounts, and audits reset activity. They configure password policies and ensure that password recovery aligns with organizational security standards and compliance requirements such as HIPAA or SOC 2.
A mobile-first sales representative needs rapid account recovery to complete client contracts remotely. They rely on self-service reset links sent to their registered email and expect mobile app compatibility so eSignature workflows remain uninterrupted during deals.
Typically 60 minutes for security-sensitive links.
Inactivity ends sessions after configured minutes.
Audit records retained per account policy.
Locks expire after admin action or timeout.
Retain logs for audit requirements years.