TLS compatibility
To meet strict security and compliance standards, all connections to Signicat require TLS 1.2 or TLS 1.3.
Supported cipher suites
Your client must support at least one of the following strong cipher suites to connect successfully. For TLS 1.2, the negotiated cipher depends on the type of certificate used:
TLS 1.3
TLS_AES_128_GCM_SHA256TLS_AES_256_GCM_SHA384
TLS 1.2
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(EC certificates)TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(RSA certificates)TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(EC certificates)TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(RSA certificates)
Supported elliptic curves
For key agreement, the following elliptic curves are supported:
P-256P-384
Troubleshooting connectivity
We strongly recommend configuring your clients and integrations to use the latest secure protocols and ciphers to maintain a stable connection to our platform.
If your application experiences connectivity issues or handshake failures when connecting to Signicat, verify that your HTTP client or network infrastructure is configured to use at least TLS 1.2 alongside the supported cipher suites and curves listed above.