Skip to main content

TLS compatibility

To meet strict security and compliance standards, all connections to Signicat require TLS 1.2 or TLS 1.3.

Supported cipher suites

Your client must support at least one of the following strong cipher suites to connect successfully. For TLS 1.2, the negotiated cipher depends on the type of certificate used:

TLS 1.3

  • TLS_AES_128_GCM_SHA256
  • TLS_AES_256_GCM_SHA384

TLS 1.2

  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (EC certificates)
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (RSA certificates)
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (EC certificates)
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (RSA certificates)

Supported elliptic curves

For key agreement, the following elliptic curves are supported:

  • P-256
  • P-384

Troubleshooting connectivity

We strongly recommend configuring your clients and integrations to use the latest secure protocols and ciphers to maintain a stable connection to our platform.

If your application experiences connectivity issues or handshake failures when connecting to Signicat, verify that your HTTP client or network infrastructure is configured to use at least TLS 1.2 alongside the supported cipher suites and curves listed above.