Troubleshooting Signature Verification Errors
Any Signature verification errors will be listed in the last section of the Summary Report. Each error will provide information about the associated signature/record, as well as an error code and error description to aid in further investigation.
The following is a summary of error codes that may be reported by the signature verification utility.
Error Code | Description | Troubleshooting Tips | Recommended Resolutions |
---|---|---|---|
ESIG-101 | 'Signatures (Raw)' field is missing or corrupt. An error occurred while reading or parsing the raw signature data field of this record. | Verify that the record type in QC/ALM has a field named "Signatures (Raw)". This is where the electronic signature information is expected to be stored. | If the record type is not expected to contain signatures, then update the project's Records Management Policy to exclude this record type from signature verification. |
ESIG-102 | Missing signature component. A required data element is missing from the signature. | The detailed error message should indicate the specific data element that is missing. Inspect the JSON-formatted signature information in the "Signatures (Raw)" field to determine whether the element is missing or otherwise corrupted. | If unexpected modifications were made to the "Signatures (Raw)" field, then attempt to revert those modifications. |
ESIG-103 | Signature hash failure. The electronic signature has been modified or corrupted, and it is no longer authentic. | Verify the audit history of the field to determine whether any unexpected modifications to the signature data were made outside of the system's expected use. | If unexpected modifications were made to the "Signatures (Raw)" field, then attempt to revert those modifications. |
ESIG-104 | Invalid record association. The electronic signature was generated for a different record than the record it is currently associated with. | Verify whether this is an original record. This error most typically occurs when a record is duplicated (within the same project), and its signature data is inappropriately duplicated with it. | If the signature was duplicated from another record, then manually purge the signature from the current record. |
ESIG-105 | Record hash failure. The signature does not match the current contents of the record. The record has been modified after the signature was applied. | Inspect the record's audit history. A field that is configured as a data field (as opposed to a metadata field) was modified after this signature was applied. | If the record was unexpectedly modified, then attempt to manually revert the modifications. |
ESIG-106 | Invalid signature transport. The active signature was generated in another project/repository, and it is not valid for the current record. Either the record was modified after the transport, or the signature has become associated with a different record. | This error indicates that the signature cannot be associated with the current record, but the exact reason cannot be determined because the signature was transported from another location. This can most likely happen if a signed record is imported from a QC/ALM library, and the record is unexpectedly modified after the import; or it can happen if data loss/corruption occurs during a data migration operation. | If the record was unexpectedly modified, then attempt to manually revert the modifications. |
ESIG-201 | 'Signatures' field is missing or corrupt. An error occurred while reading or parsing the displayed signature data field of this record. | Verify that the record type in QC/ALM has a field named "Signatures". This is where the displayed (human-readable) signature information is expected to be stored. | If the record type is not expected to contain signatures, then update the project's Records Management Policy to exclude this record type from signature verification. |
ESIG-202 | Displayed signature is corrupt. The displayed signature could not be parsed. | A displayed signature is not formatted as expected. Inspect the contents of the Signatures field to determine whether each signature is displayed in a standard format. | If unexpected modifications were made to the "Signatures" field, then attempt to revert those modifications. |
ESIG-203 | No corresponding signature data. The displayed signature has no corresponding electronic signature data and cannot be verified. | Verify the audit history of the "Signatures" and "Signature (Raw)" fields to determine whether any unexpected modifications to the signature data were made outside of the system's expected use. | If unexpected modifications were made to either the "Signatures (Raw)" or "Signatures" fields, then attempt to revert those modifications. |
ESIG-204 | Signature text has been modified. The displayed signature does not match its hash information. The displayed signature is no longer authentic. | Verify the audit history of the "Signatures" and "Signature (Raw)" fields to determine whether any unexpected modifications to the signature data were made outside of the system's expected use. | If unexpected modifications were made to the "Signatures" field, then attempt to revert those modifications. |
ESIG-301 | eApprove - Signature hash failure. The electronic signature created by eApprove has been modified or corrupted, and it is no longer authentic. | This error implies an expected change made to the AUDIT_LOG table where the eApprove signature data is stored. Investigate system activity and research the system history to determine whether any activities have occurred that may have impacted the AUDIT_LOG table. | If a backup of the project exists prior to the corruption, then the impacted AUDIT_LOG entry might be recoverable from the backup. |
Additional Guidelines
- Any corrective actions made to resolve a signature verification failure should be correctly documented in accordance with your organization's relevant change control procedures.
- When resolving a data issue in the "Signatures (Raw)" and/or "Signatures" fields, all field changes should be made using SQL via the QC/ALM Site Administration portal.
- The signature verification utility will verify electronic signatures created by the VERA 2 software and also signatures created by the TechData eApprove software (with or without the VERA 1 software). No other electronic signatures will be detected or verified by the utility.
.