tawqi3 tawqi3.com

Welcome

An orientation to what lives in this knowledge base, who it is for, and how to find what you need.

This knowledge base is the public reference for operators and security reviewers using tawqi3. It complements the main site at tawqi3.com by going deeper on product behaviour, security posture, and the everyday workflows your team will rely on.

What you will find here

  • Getting Started: orientation and onboarding for a new tenant.
  • Products: how each tawqi3 product behaves, at a level useful to a buyer, an administrator, or an integrator.
  • Security: a public summary of our threat model and the controls we expect customers to ask about.

What you will NOT find here

  • Internal runbooks. Those live inside the operator portal.
  • Credentials, network configuration, or tenant-specific settings.
  • Engineering decisions that have not yet stabilised; they only become public reference once their customer-facing behaviour is locked.

Conventions

Every article carries a stable URL. We do not rewrite slugs after publishing; if an article is replaced, the older version is marked superseded and links forward to the new one. The Updated date reflects substantive edits, not typo fixes.

Reporting an issue

Spotted an error or an unclear paragraph? Email hello@tawqi3.com for content fixes. Security disclosures should go through tawqi3.com/security instead.

title: Welcome to the tawqi3 Knowledge Base description: An orientation to what lives in this knowledge base, who it is for, and how to find what you need. category: Getting Started updated: 2026-05-15 readMinutes: 3 order: 1

The tawqi3 Knowledge Base is the public reference for operators, developers, and security reviewers integrating with the tawqi3 platform. It complements the marketing site at tawqi3.com by going deeper on product mechanics, security posture, and operational runbooks that are stable enough to publish openly.

What you will find here

  • Getting Started: orientation and onboarding for new tenants.
  • Products: feature-level documentation for Email Signature Cloud, Agreement & E-Sign Cloud, and Document & Template Cloud.
  • Security: public excerpts of our threat model, signing-tier ladder, and evidence-bundle specification.
  • API: REST surface notes, error envelopes, webhook contracts.
  • Integrations: Microsoft 365 / Google Workspace directory and add-in guidance.
  • Legal: jurisdictional notes, audit-record retention contract.
  • Operations: outage indicators, status page conventions, support expectations.

What you will NOT find here

  • Internal runbooks (those live in the operator console).
  • Credentials, IP allow-lists, or tenant-specific configuration.
  • Engineering decisions that have not yet stabilised, those move from internal ADRs into this KB only after their public surface is locked.

Conventions

Every article carries a stable URL. We do not 301-rewrite slugs after publish; if an article is replaced, the older version is marked superseded and links forward to the new one. Updated dates reflect substantive edits, not typo fixes.

Code blocks use the same dark/light Shiki themes as the marketing site. The search box at the top is wired to a private Meilisearch instance in production and falls back to a static client-side index on previews.

Reporting issues

Spotted an error, an unclear paragraph, or a security concern with documented behaviour? Email kb@tawqi3.com for content fixes; security disclosures should go through tawqi3.com/security instead.