AWS Cloud Connector API Reference
Endpoints, request shape, and process flow for sealing PDFs through the Trusted Signatures AWS Cloud Connector.
- S3 source and destination flow
- Lambda invocation
- Digest-only sealing request
AWS proof
Use Lambda and S3 for connector speed, scale, and account-scoped control
The documented AWS pattern uses Lambda for invocation, S3 for document movement, and AWS-native IAM and secrets controls so teams can run sealing workflows inside their own account.
S3
speed path
Source and destination buckets let applications hand off PDFs and retrieve sealed output through the same storage workflow.
Lambda
scale model
The connector runs as a Lambda function, fitting bursty or event-driven document jobs without managing long-lived servers.
IAM
security controls
Least-privilege roles, bucket policies, and Secrets Manager guidance scope access to documents and credentials.
SHA-256
data boundary
Only the document digest and signing metadata are sent to Trusted Signatures while PDFs stay in S3.
API Reference
The Trusted Signatures AWS Cloud Connector provides businesses with a scalable, cost-effective API in their own infrastructure to seal even the most sensitive documents. By deploying the connector in their own AWS account, customers have assurance that none of the information in the documents can be intercepted or modified. Only an SHA-256 digest of the PDF is sent to Trusted Signatures for signing; no other data about the document exits the customer’s infrastructure.
The AWS Cloud Connector is deployed as a Lambda function. Customers put the PDFs that they wish to seal into an S3 bucket, invoke the Lambda function, and receive the sealed PDF back in a destination bucket.
Architecture Overview
Process Flow
Access Methods
Complete Workflow:
| |
API Gateway (Optional): If you create API Gateway:
| |
Authentication
Trusted Signatures API Keys
- Create API keys at https://secure.trusted-signatures.com
- API keys must be time-limited, with a one-year maximum limit
- Required for all PDF sealing operations
Gateway Access Control
You are responsible for securing the API endpoint that fronts the AWS Cloud Connector. Options:
Direct Lambda Invocation (Most Secure):
- Use AWS SDK to invoke Lambda directly
- Control access with IAM policies
- No public HTTP endpoint
API Gateway (Optional):
- You may create API Gateway if needed
- Must limit access if you create one
- Configure proper authentication and authorization
Endpoints
Health Check
Verify the Lambda function is operational.
| |
Response:
| |
Seal PDF Document
Digitally seal a PDF document with Trusted Signatures using S3 storage.
| |
Request:
| |
Parameters:
| Field | Type | Required | Description |
|---|---|---|---|
sourceBucket | string | Yes | S3 bucket containing source PDF |
sourceKey | string | Yes | S3 key (path) to source PDF |
destinationBucket | string | Yes | S3 bucket for sealed PDF |
destinationKey | string | Yes | S3 key (path) for sealed PDF |
apiKey | string | Yes | Hex-encoded API key from Trusted Signatures |
apiKeyId | string | Yes | Your API key identifier |
tsaTimestamp | boolean | Yes | Include timestamp authority signature |
includeLtv | boolean | Yes | Include Long Term Validation data |
limitChanges | string | No | PDF modification restrictions |
Important:
- Use unique
sourceKeyanddestinationKeyvalues for concurrent invocations to avoid conflicts - The Gateway will not delete the source PDF from the source bucket after processing
- The source and destination buckets may be the same, or different buckets
limitChanges Options:
"no-changes"- No modifications allowed (default)"allow-forms"- Allow form filling only"allow-comments"- Allow comments and annotations
Response:
| |
Status Codes:
200- Success400- Invalid request500- Server error
Usage Examples
JavaScript/Node.js with S3
| |
Python with S3
| |
AWS CLI
| |
PHP with AWS SDK
| |
Error Handling
400 Bad Request
Missing or invalid parameters:
| |
403 Forbidden
Insufficient S3 permissions:
| |
| |
404 Not Found
S3 resource not found:
| |
| |
| |
500 Internal Server Error
Sealing operation failed:
| |
Common causes:
- Invalid API key or credentials
- Malformed PDF document
- Network connectivity issues
- Trusted Signatures API unavailable
- S3 service errors
Rate Limits
Default API Gateway limits:
- 10,000 requests per second
- 5,000 burst capacity
Configure throttling in API Gateway for your specific needs.
Best Practices
Security
- You are responsible for securing the AWS Cloud Connector entry point
- Use IAM-based, least-privilege approach
- CRITICAL: Clients should store Trusted Signatures API credentials in AWS Secrets Manager
- Never hardcode API keys in client applications or environment variables
- Use IAM roles to grant client applications access to secrets
- Rotate API keys regularly using Secrets Manager
- The Lambda Gateway receives API keys in each request - it doesn’t need Secrets Manager access
- Consider VPC deployment for enhanced security
- Monitor for unusual usage patterns
- Only SHA-256 digest transmitted to Trusted Signatures (PDFs stay in your environment)
Performance
- Memory allocation must match PDF size - Lambda processes PDFs in memory
- Rule of thumb: PDF size × 4 = minimum Lambda memory needed
- For 100 MB PDF: allocate at least 400 MB Lambda memory (use 512 MB)
- For 500 MB PDF: allocate at least 2 GB Lambda memory
- Implement client-side retry logic
- No PDF size limit (uses S3 for storage)
- Consider Lambda timeout for very large PDFs (max 15 minutes)
- Use S3 Transfer Acceleration for faster uploads if needed
Error Handling
- Implement proper error handling in your code
- Log errors for debugging
- Set up monitoring and alerts
Support
For technical support:
- Documentation: https://trusted-signatures.com/docs/
- Support: support@trusted-signatures.com
- API Issues: Check CloudWatch logs in your AWS account
Licensing
This API requires a valid Trusted Signatures Container Gateway license.
- Terms: https://trusted-signatures.com/terms/
- Licensing: sales@trusted-signatures.com
Need architectural review?
Book a technical walkthrough
For enterprise rollout, we can review trust model, controls, and integration patterns with your team.