Sinch will be performing a scheduled maintenance to replace the Root CA SSL certificate for the EU Sinch Gateways during the times specified below.
Type: Scheduled Maintenance
Maintenance: SSL Certificate Updates
Start Time: 2020-05-28 15:00 UTC
End Time: 2020-05-28 17:00 UTC
Impact: Clients connecting to the AU Sinch Gateway hosts below via the SSL secure port will fail if the client SSL application does not have the updated Root CA SSL certificate preloaded in its SSL trust store for a seamless Root CA SSL certificate switchover. Please note that the Entity SSL certificate and the Intermediate CA certificate for the FQDNs below will remain unchanged.
au.sms.api.sinch.com (REST API)
au1.sms.api.sinch.com (REST API)
au.httpsms.api.sinch.com (HTTP SMS)
au1-1.httpsms.api.sinch.com (HTTP SMS)
au1-2.httpsms.api.sinch.com (HTTP SMS)
We are not updating or changing the entity SSL certificates for the FQDNs above, including the certificate authority's intermediate certificate (expiring on Dec 2030).
We are only updating the certificate authority's root SSL certificate that is expiring this coming 30th May 2020.
If your TLS client is validating only the entity SSL certificate and your TLS client is chaining it against your existing trust store that already has the updated certificate authority root SSL certificate with the DN: "Subject: C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority" expiring on 2028 or 2038, then you do not have to do anything in response to this notice.
Download ONLY the updated Root CA SSL Certificate files here: Link
Download the current individual Entity SSL Certificate Chain with the Updated Root CA SSL Certificate included here: Link
We appreciate your patience and apologize for any inconvenience experienced during this maintenance period. If for any reason the maintenance is extended or cancelled we will advise you accordingly.
Please contact email@example.com
should you require further information or assistance.