Security Methods
Penbox offers multiple ways to secure form access:OTP Email
One-time password sent via emailSecurity Level: Medium to High
OTP SMS
One-time password sent via SMSSecurity Level: High
Password
Username and password protectionSecurity Level: Medium
Auto Access
Direct access via linkSecurity Level: Low
OTP Email Security
One-Time Password via Email requires the contact to verify their email address before accessing the form.How It Works
- Contact clicks the form link
- System prompts for email verification
- One-time code is sent to their email
- Contact enters the code
- Form becomes accessible
- Code expires after use or timeout (typically 10 minutes)
Configuration
enabled: Make this option availabledefault: Use by default when creating formsmandatory: Must be used (can’t be disabled for individual forms)template: Email template to use for sending OTP
When to Use
✅ Good For
✅ Good For
- Moderate security needs
- Email verification required
- Professional/business contexts
- When you already have email addresses
- Documents and data collection
❌ Not Ideal For
❌ Not Ideal For
- Highest security requirements
- When contacts may not have email access
- Time-sensitive forms (email delays)
- Very short forms (friction may reduce completion)
OTP SMS Security
One-Time Password via SMS requires the contact to verify their phone number before accessing the form.How It Works
- Contact clicks the form link
- System prompts for phone verification
- One-time code is sent via SMS
- Contact enters the code
- Form becomes accessible
- Code expires after use or timeout
Configuration
enabled: Make this option availabledefault: Use by defaultmandatory: Must be usedtext: SMS message template (must include{code})
SMS messages must include the
{code} placeholder where the actual code will be inserted.When to Use
✅ Good For
✅ Good For
- High security requirements
- Phone number verification needed
- Financial or sensitive information
- When email is unreliable
- Identity verification
❌ Not Ideal For
❌ Not Ideal For
- Contacts without mobile phones
- International users (SMS costs)
- Areas with poor mobile coverage
- Budget-sensitive situations (SMS costs money)
Password Security
Password Protection requires a username and password to access the form.How It Works
- Contact clicks the form link
- System prompts for username and password
- Contact enters credentials
- Form becomes accessible
- Credentials can be reused (no expiration)
Configuration
enabled: Make this option availabledefault: Use by defaultmandatory: Must be usedlength: Minimum password lengthlower: Minimum lowercase charactersupper: Minimum uppercase charactersnumeric: Minimum numeric charactersalpha: Minimum alphabetic characterslogin: Default username/password (optional)
Password Requirements
You can enforce password complexity:| Requirement | Description | Example |
|---|---|---|
| length | Minimum total characters | 8 |
| lower | Minimum lowercase letters | 1 (a-z) |
| upper | Minimum uppercase letters | 1 (A-Z) |
| numeric | Minimum numbers | 1 (0-9) |
| alpha | Minimum alphabetic characters | 2 (a-z, A-Z) |
When to Use
✅ Good For
✅ Good For
- Shared access (multiple people, same credentials)
- Internal team forms
- Reusable access
- Partner portals
- When you control credential distribution
❌ Not Ideal For
❌ Not Ideal For
- Individual verification
- One-time use
- High security (passwords can be shared)
- Forgot password support needed
Auto Access
Automatic Access provides direct access to the form without additional authentication.How It Works
- Contact clicks the form link
- Form opens immediately
- No additional verification
Configuration
When to Use
✅ Good For
✅ Good For
- Public surveys
- Feedback forms
- Low-sensitivity data
- Maximum convenience
- High completion rates needed
- General inquiries
❌ Not Ideal For
❌ Not Ideal For
- Personal information
- Financial data
- Legal documents
- Compliance requirements
- Verification needed
Combining Security Methods
You can enable multiple security methods and require specific combinations.Multiple Options (Choose One)
Allow contacts to choose their preferred verification method:- Sees options: “Verify by Email”, “Verify by SMS”, “Use Password”
- Chooses preferred method
- Completes that verification
Multiple Requirements (All Required)
Require multiple authentication factors:- Must enter password first
- Then must verify email with OTP
- Both required to access form
Security Best Practices
Match security to sensitivity
Match security to sensitivity
Choose security level based on data sensitivity:
- High: Financial, health, legal → OTP SMS + Password
- Medium: Personal info, documents → OTP Email
- Low: Surveys, feedback → Auto Access or Password
Consider user experience
Consider user experience
More security = more friction = lower completion ratesBalance security needs with completion goals. Don’t use high security for low-risk forms.
Test all security methods
Test all security methods
Before sending forms to contacts, test each security method to ensure it works smoothly and emails/SMS are delivered.
Communicate security to contacts
Communicate security to contacts
In invitation emails, explain why you’re using security measures. This builds trust and reduces confusion.
Monitor failed access attempts
Monitor failed access attempts
Track failed verification attempts. Multiple failures may indicate contact issues or security concerns.
Have fallback options
Have fallback options
If using SMS, have an email backup. Some contacts may not receive SMS or prefer email verification.
Update credentials regularly
Update credentials regularly
For password-protected forms with shared credentials, update passwords regularly and track who has access.
Security Configurations by Use Case
Financial Information
Standard Document Collection
Partner Portal
Public Feedback Form
Form Expiration
In addition to access security, forms can have expiration dates:- The form link shows an expiration message
- Contact cannot submit the form
- Helps maintain data freshness
- Creates urgency for completion
- Time-sensitive offers
- Compliance deadlines
- Event registrations
- Limited-time data requests
Custom Domains
Forms can be accessed through custom domains for improved trust:- Default:
forms.penbox.io/abc123 - Custom:
forms.yourcompany.com/abc123
- Increased trust and brand recognition
- Can be whitelisted in corporate networks
- Matches your email domain
- Professional appearance