Get webhook notifications whenever Signhost, the Entrust Workflow Signing Service creates an incident, updates an incident, resolves an incident or changes a component status.
Monitoring - A fix has been implemented and we are monitoring the results.
Mar 18, 2024 - 17:27 CET
Investigating - We are currently experiencing an issue where some users experience a delay when opening a singing link. We are investigating the issue.
If you experience this, please try opening the link again in a private/incognito window in your browser.
Mar 18, 2024 - 16:51 CET
This is the statuspage of Signhost, the Entrust Workflow Signing Service. You can monitor the availability and maintenance of our signing and identification platform. Please subscribe with the top right subscribe button on this site to get pro-active messages on (planned) maintenance or degraded performance. Signhost is a market leader in the field of electronic signatures and electronic identification.
API
?
Operational
90 days ago
99.9
% uptime
Today
UI / View
?
Degraded Performance
90 days ago
99.94
% uptime
Today
Portal
?
Operational
90 days ago
99.78
% uptime
Today
⮑ External verifications
?
Operational
Phonenumber / SMS
Operational
iDIN
Operational
itsme sign (qualified signature)
?
Operational
itsme Identification
?
Operational
iDEAL
Operational
DigiD
Operational
eHerkenning
Operational
eIDAS
?
Operational
ZealiD Qualified
Operational
Auth and login service
?
Operational
90 days ago
99.93
% uptime
Today
Account and billing service
?
Operational
ID Proof
?
Operational
90 days ago
99.96
% uptime
Today
Webforms
?
Operational
90 days ago
99.96
% uptime
Today
Evidos App
Operational
External services
Operational
SMS Service
Operational
CDN-EU1
Operational
CDN-EU2
Operational
Mail service
?
Operational
IDIN
?
Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Major outage
Partial outage
No downtime recorded on this day.
No data exists for this day.
had a major outage.
had a partial outage.
Related
No incidents or maintenance related to this downtime.
The ING bank routing certificate, used to encrypt the information the bank sends back to iDIN merchants, will change. In this time window, you must update your iDIN bank certificate to the new public acquirer certificate.
It is not possible to perform a rollover, as ING only supports one active certificate at the same time. It will be important to change your certificate to keep the iDIN service operational. The ING test environment is already switched over, so you can test decrypting messages coming from iDIN with the new certificate via that environment.
This does not apply for your own merchant certificates you use to encrypt your own message going towards the bank, only for decrypting the messages coming from the bank!
This does not apply to Signhost customers, only to ID Connect iDIN customers that are registered with ING.
Update -
We will be undergoing scheduled maintenance during this time.
Feb 13, 2024 - 14:44 CET
Update -
We will be undergoing scheduled maintenance during this time.
Apr 01, 2024 - 00:20 CEST
Scheduled -
Dear customer/partner,
In the week of Monday April 1st 2024 we will block API GET calls that contain a Content-Type header. We still allow these type of API calls for now. However, this is not conforming the HTTP specs. No need to worry though, you'll be contacted directly by us if your implementation still sends us the "bad" GET calls containing the Content-Type header.
Kind regards, Entrust - Team Signhost
Apr 01, 2024 - 00:15 CEST
The ABN AMRO bank routing certificate, used to encrypt the information the bank sends back to iDIN merchants, will change. In this time window, you must update your iDIN bank certificate to the new public acquirer certificate.
It is not possible to perform a rollover, as ABN AMRO only supports one active certificate at the same time. It will be important to change your certificate to keep the iDIN service operational. The ABN AMRO test environment is already switched over, so you can test decrypting messages coming from iDIN with the new certificate via that environment.
This does not apply for your own merchant certificates you use to encrypt your own message going towards the bank, only for decrypting the messages coming from the bank!
This does not apply to Signhost customers, only to ID Connect iDIN customers that are registered with ABN AMRO.
Completed -
The scheduled maintenance has been completed.
Mar 6, 20:15 CET
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Mar 6, 20:00 CET
Scheduled -
Dear customer/partner,
As of Wednesday March 6 2024 we will disable two weak cipher suites we're currently offering on our Signhost platform. No need to worry though, you'll be contacted directly by us if your implementation still uses these two weak cipher suites.
The cipher suites that will be disabled are: TLSv1.2 - ECDHE-RSA-AES128-SHA256 (TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) TLSv1.2 - ECDHE-RSA-AES256-SHA384 (TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384)
During this maintenance window the Signhost platform will remain fully active and functional.
Kind regards, Entrust - Team Signhost
Feb 9, 12:25 CET