Skip to content

docusign/code-examples-csharp

master
Switch branches/tags
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

C# Launcher Code Examples

GitHub repo: code-examples-csharp

This GitHub repo includes code examples for the DocuSign Admin API, Click API, eSignature REST API, Monitor API, and Rooms API. To switch between API code examples, modify the ExamplesAPI setting from ESignature to Admin, Click, Monitor, or Rooms, in the appsettings.json file.

Introduction

This repo is a C# .NET Core MVC application that demonstrates:

  • Authentication with DocuSign via Authorization Code Grant. When the token expires, the user is asked to re-authenticate. The refresh token is not used.

  • Authentication with DocuSign via JSON Web Token (JWT) Grant. When the token expires, it updates automatically.

eSignature API

For more information about the scopes used for obtaining authorization to use the eSignature API, see Required scopes.

For a list of code examples that use the eSignature API, select the C# tab under Examples and languages on the DocuSign Developer Center.

Rooms API

Note: To use the Rooms API, you must also create your Rooms developer account. Examples 4 and 6 require that you have the DocuSign Forms feature enabled in your Rooms for Real Estate account.
For more information about the scopes used for obtaining authorization to use the Rooms API, see Required scopes.

For a list of code examples that use the Rooms API, select the C# tab under Examples and languages on the DocuSign Developer Center.

Click API

For more information about the scopes used for obtaining authorization to use the Click API, see Required scopes

For a list of code examples that use the Click API, select the C# tab under Examples and languages on the DocuSign Developer Center.

Monitor API

Note: To use the Monitor API, you must also enable DocuSign Monitor for your organization.

For information about the scopes used for obtaining authorization to use the Monitor API, see the scopes section.

For a list of code examples that use the Monitor API, select the C# tab under Examples and languages on the DocuSign Developer Center.

Admin API

Note: To use the Admin API, you must create an organization in your DocuSign developer account. Also, to run the DocuSign CLM code example, CLM must be enabled for your organization.

For information about the scopes used for obtaining authorization to use the Admin API, see the scopes section.

For a list of code examples that use the Admin API, select the C# tab under Examples and languages on the DocuSign Developer Center.

Installation

Prerequisites

Note: If you downloaded this code using Quickstart from the DocuSign Developer Center, skip items 1 and 2 as they were automatically performed for you.

  1. A free DocuSign developer account; create one if you don't already have one.

  2. A DocuSign app and integration key that is configured to use either Authorization Code Grant or JWT Grant authentication.

    This video demonstrates how to obtain an integration key.

    To use Authorization Code Grant, you will need an integration key and a secret key. See Installation steps for details.

    To use JWT Grant, you will need an integration key, an RSA key pair, and the User ID GUID of the impersonated user. See Installation steps for JWT Grant authentication for details.

    For both authentication flows:

    If you use this launcher on your own workstation, the integration key must include a redirect URI of https://localhost:44333/ds/callback

    If you host this launcher on a remote web server, set your redirect URI as

    {base_url}/ds/callback

    where {base_url} is the URL for the web app.

  3. C# .NET Core 3.1 or later.

  4. Visual Studio 2022 with ASP.NET package (Visual Studio 2019 is also supported).

Installation steps

Note: If you downloaded this code using Quickstart from the DocuSign Developer Center, skip step 4 as it was automatically performed for you.

  1. Extract the Quickstart ZIP file or download or clone the code-examples-csharp repository.
  2. In File Explorer, open your Quickstart folder or your code-examples-csharp folder.
  3. Open the project with Visual Studio by double-clicking the launcher-csharp.sln file.
  4. To configure the launcher for Authorization Code Grant authentication, create a copy of the file launcher-csharp/appsettings.example.json and save the copy as launcher-csharp/appsettings.json.
    1. Add your integration key. On the Apps and Keys page, under Apps and Integration Keys, choose the app to use, then select Actions > Edit. Under General Info, copy the Integration Key GUID and save it in appsettings.json as your ClientId.
    2. Generate a secret key, if you don’t already have one. Under Authentication, select + ADD SECRET KEY. Copy the secret key and save it in appsettings.json as your ClientSecret.
    3. Add the launcher’s redirect URI. Under Additional settings, select + ADD URI, and set a redirect URI of https://localhost:44333/ds/callback. Select SAVE.
    4. Set a name and email address for the signer. In appsettings.json, save an email address as SignerEmail and a name as SignerName.
  5. Run the launcher with Visual Studio: Select the green Play IIS Express button.

Installation steps for JWT Grant authentication

Note: If you downloaded this code using Quickstart from the DocuSign Developer Center, skip step 4 as it was automatically performed for you.
Also, in order to select JSON Web Token authentication in the launcher, in launcher-csharp/appsettings.json, change the quickstart setting to "false".

  1. Extract the Quickstart ZIP file or download or clone the code-examples-csharp repository.
  2. In File Explorer, open your Quickstart folder or your code-examples-powershell folder.
  3. Open the launcher-csharp.sln solution file using Visual Studio.
  4. To configure the launcher for JWT Grant authentication, create a copy of the file launcher-csharp/appsettings.example.json and save the copy as launcher-csharp/appsettings.json.
    1. Add your User ID. On the Apps and Keys page, under My Account Information, copy the User ID GUID and save it in appsettings.json as your ImpersonatedUserId.
    2. Add your integration key. On the Apps and Keys page, under Apps and Integration Keys, choose the app to use, then select Actions > Edit. Under General Info, copy the Integration Key GUID and save it in appsettings.json as your ClientId.
    3. Generate an RSA key pair, if you don’t already have one. Under Authentication, select + GENERATE RSA. Copy the private key, and save it in a new file launcher-csharp/private.key.
    4. Add the launcher’s redirect URI. Under Additional settings, select + ADD URI, and set a redirect URI of https://localhost:44333/ds/callback. Select SAVE.
    5. Set a name and email address for the signer. In appsettings.json, save an email address as SignerEmail and a name as SignerName.
      Note: Protect your personal information. Please make sure that appsettings.json will not be stored in your source code repository.
  5. Run the launcher with Visual Studio: Select the green Play IIS Express button.
  6. On the black navigation bar, select Login.
  7. From the picklist, select JWT (JSON Web Token) > Authenticate with DocuSign.
  8. When prompted, log in to your DocuSign developer account. If this is your first time using the app, select ACCEPT at the consent window.
  9. Select your desired code example.

JWT grant remote signing project

See DocuSign Quickstart overview on the DocuSign Developer Center for more information on how to run the JWT grant remote signing project.

Payments code example

To use the payments code example, create a test payment gateway on the Payments page in your developer account. See Configure a payment gateway for details.

Once you've created a payment gateway, save the Gateway Account ID GUID to appsettings.json.

License and additional information

License

This repository uses the MIT License. See LICENSE for details.

Pull Requests

Pull requests are welcomed. Pull requests will only be considered if their content uses the MIT License.