Skip to:

Marketplace

SealDoc — Electronic Signatures & Audit Trails

works with Jira Cloud

OVERALL RATINGS

INSTALLS

2

SUPPORT

  • Partner Supported

TRUST SIGNALS

Requires

JIRA

Works with

CONFLUENCE

Showing details for Cloud

Key highlights of the appElectronic signatures, hash-chain audit trails, and approval workflows for regulated industries

Two-Component E-Signatures & Approval Workflow

Sign Jira issues with PIN + session verification per 21 CFR Part 11. Six signature meanings, signer affirmation, content hash integrity. Draft → In Review → Approved with configurable quorum.

Tamper-Evident Hash-Chained Audit Trail

Append-only audit log with SHA-256 hash chains and HMAC sealing. Every sign, approve, reject, and classify action logged with field-level changes. Gap detection flags broken links.

Safety Classification

ASIL (ISO 26262), DAL (DO-178C), Risk Class (IEC 62304), or custom schemes. Per-class approval rules with minimum signers.

Supporting media

More details

SealDoc adds electronic signatures, approval workflows, and tamper-evident audit trails to Jira and Confluence. Every signature captures who signed, when, what they signed (cryptographic content hash), and why (signature meaning). Every action is recorded in an append-only, hash-chained audit log.

Resources

  • App documentation

    Comprehensive set of documentation from the partner on how this app works

Privacy and Security

Privacy policy

Atlassian's privacy policy is not applicable to the use of this app. Please refer to the privacy policy provided by this app's partner.

Partner privacy policy

Security program

This app is not part of the Marketplace Bug Bounty program.

Integration permissions

SealDoc — Electronic Signatures & Audit Trails integrates with your Atlassian app

Version information

Version 3.3.0for Jira Cloud

Release date
Mar 22nd 2026
Summary
Code Quality & Compliance Hardening
Details

Compliance & Audit Trail

  • Audit failed sign attempts: PIN verification failures now produce audit entries. Enables security monitoring and regulatory review of unauthorized access attempts.
  • Audit permission denials: Unauthorized resolver access now produces `permission_denied` audit entries. Previously, denials were thrown but never recorded in the tamper-evident audit chain.
  • Admin audit log filter: Two new filter options — "Failed Sign Attempt" and "Permission Denied" — added to the Audit Log tab action dropdown.
Payment model
Paid via Atlassian
License type
Commercial

Learn and explore

  • What’s Marketplace
  • App installation
  • About Atlassian
  • Atlassian resources
  • Search and ranking
  • Atlassian events
  • Atlassian foundation

Follow