Identified - Some customers continue to report (1) messages are going to the junk/spam folder, and, (2) an elevated number of opens and clicks from Office 365 addresses.

We are aware of this and are in discussions with the party sending our mails and Microsoft to resolve this. In the meantime, we would like to advise you to place our mail domain (noreply@signhost.com) or your configured sending domain on your allowlist and register it as a safe sender.

Feb 16, 2024 - 13:27 CET

About This Site

This is the statuspage of Signhost, the Entrust Workflow Signing Service. You can monitor the availability and maintenance of our signing and identification platform. Please subscribe with the top right subscribe button on this site to get pro-active messages on (planned) maintenance or degraded performance. Signhost is a market leader in the field of electronic signatures and electronic identification.

API ? Operational
90 days ago
99.94 % uptime
Today
UI / View ? Operational
90 days ago
99.98 % uptime
Today
Portal ? Operational
90 days ago
99.95 % uptime
Today
⮑ External verifications ? Operational
Phonenumber / SMS Operational
iDIN Operational
itsme sign (qualified signature) ? Operational
itsme Identification ? Operational
iDEAL Operational
DigiD Operational
eHerkenning Operational
eIDAS ? Operational
ZealiD Qualified Operational
Auth and login service ? Operational
90 days ago
99.96 % uptime
Today
Account and billing service ? Operational
ID Proof ? Operational
90 days ago
99.96 % uptime
Today
Webforms ? Operational
90 days ago
99.96 % uptime
Today
Evidos App Operational
External services Degraded Performance
SMS Service Operational
CDN-EU1 Operational
CDN-EU2 Operational
Mail service ? Degraded Performance
IDIN ? Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Major outage
Partial outage
No downtime recorded on this day.
No data exists for this day.
had a major outage.
had a partial outage.
Scheduled Maintenance
Signhost - Phase out weak cipher suites Mar 6, 2024 20:00-20:15 CET
Dear customer/partner,

As of Wednesday March 6 2024 we will disable two weak cipher suites we're currently offering on our Signhost platform. No need to worry though, you'll be contacted directly by us if your implementation still uses these two weak cipher suites.

The cipher suites that will be disabled are:
TLSv1.2 - ECDHE-RSA-AES128-SHA256 (TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256)
TLSv1.2 - ECDHE-RSA-AES256-SHA384 (TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384)

During this maintenance window the Signhost platform will remain fully active and functional.

Kind regards,
Entrust - Team Signhost

Posted on Feb 09, 2024 - 12:25 CET
The ING bank routing certificate, used to encrypt the information the bank sends back to iDIN merchants, will change. In this time window, you must update your iDIN bank certificate to the new public acquirer certificate.

It is not possible to perform a rollover, as ING only supports one active certificate at the same time. It will be important to change your certificate to keep the iDIN service operational. The ING test environment is already switched over, so you can test decrypting messages coming from iDIN with the new certificate via that environment.

This does not apply for your own merchant certificates you use to encrypt your own message going towards the bank, only for decrypting the messages coming from the bank!

This does not apply to Signhost customers, only to ID Connect iDIN customers that are registered with ING.


This public certificate is shared below:

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

Posted on Feb 23, 2024 - 14:04 CET
Update - We will be undergoing scheduled maintenance during this time.
Feb 13, 2024 - 14:44 CET
Update - We will be undergoing scheduled maintenance during this time.
Apr 01, 2024 - 00:20 CEST
Scheduled - Dear customer/partner,

In the week of Monday April 1st 2024 we will block API GET calls that contain a Content-Type header. We still allow these type of API calls for now. However, this is not conforming the HTTP specs.
No need to worry though, you'll be contacted directly by us if your implementation still sends us the "bad" GET calls containing the Content-Type header.

Kind regards,
Entrust - Team Signhost

Apr 01, 2024 - 00:15 CEST
Messages being processed
Backend processing times ?
Past Incidents
Feb 25, 2024

No incidents reported today.

Feb 24, 2024

No incidents reported.

Feb 23, 2024

No incidents reported.

Feb 22, 2024
Completed - The scheduled maintenance has been completed.
Feb 22, 23:00 CET
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Feb 22, 22:00 CET
Scheduled - We will be undergoing scheduled maintenance during this time. No downtime is expected.
Feb 1, 12:04 CET
Feb 21, 2024

No incidents reported.

Feb 20, 2024

No incidents reported.

Feb 19, 2024

No incidents reported.

Feb 18, 2024

No incidents reported.

Feb 17, 2024

No incidents reported.

Feb 16, 2024
Resolved - This incident has been resolved.
Feb 16, 10:15 CET
Monitoring - The environments are loading quick and working as expected again. We keep monitoring the situation.
Feb 16, 10:06 CET
Investigating - We are seeing issues with slow loading of the ID Proof forms and webforms. Loading can take longer than normal.
We are investigation the issue.

Feb 16, 09:52 CET
Feb 15, 2024
Resolved - This incident has been resolved.
Feb 15, 15:49 CET
Monitoring - A fix has been implemented and we are monitoring the results.
Feb 15, 15:28 CET
Identified - The issue has been identified and a fix is being implemented.
Feb 15, 15:24 CET
Investigating - We are currently experiencing issues with creating transactions.
We are investigating the issue.

Feb 15, 15:12 CET
Feb 14, 2024

No incidents reported.

Feb 13, 2024

No incidents reported.

Feb 12, 2024

No incidents reported.

Feb 11, 2024

No incidents reported.