Skribble AG - Notice history

All systems operational

Operational

Skribble API - Operational

100% - uptime
Sep 2024 · 100%Oct · 100.0%Nov · 100.0%
Sep 2024
Oct 2024
Nov 2024

Skribble Platform - Operational

97% - uptime
Sep 2024 · 100%Oct · 91.84%Nov · 100.0%
Sep 2024
Oct 2024
Nov 2024

Skribble Document Validation API - Operational

100% - uptime
Sep 2024 · 100%Oct · 100.0%Nov · 100.0%
Sep 2024
Oct 2024
Nov 2024
Operational

A-Trust - Operational

100% - uptime
Sep 2024 · 100%Oct · 100.0%Nov · 100.0%
Sep 2024
Oct 2024
Nov 2024

GlobalSign Atlas - Operational

100% - uptime
Sep 2024 · 100%Oct · 100.0%Nov · 100.0%
Sep 2024
Oct 2024
Nov 2024

CloudScale - Operational

100% - uptime
Sep 2024 · 100%Oct · 100.0%Nov · 100.0%
Sep 2024
Oct 2024
Nov 2024

VSHN - Operational

100% - uptime
Sep 2024 · 100%Oct · 100.0%Nov · 100.0%
Sep 2024
Oct 2024
Nov 2024

Swisscom Trust Services - Operational

97% - uptime
Sep 2024 · 100%Oct · 90.67%Nov · 100.0%
Sep 2024
Oct 2024
Nov 2024

SparkPost - Operational

100% - uptime
Sep 2024 · 100%Oct · 100.0%Nov · 100.0%
Sep 2024
Oct 2024
Nov 2024

Stripe API - Operational

Stripe Checkout - Operational

Notice history

Nov 2024

Signatures with AES4Business / GlobalSign - Connectivity issues
  • Resolved
    Resolved

    Incident Summary:

    On November 12th 2024, an upgrade to the latest version of GlobalSign Atlas inadvertently disabled the mTLS certificate expiration warning. As a result, no notification was received on either the GlobalSign or Skribble side regarding the certificate status. This led to a temporary disruption in the secure communication channel, impacting functionality for signatures and the AES4Business feature.

    Timeline of Events:

    1. Issue Detected: 12:00 - Discovered interruption in the secure channel between GlobalSign and Skribble, affecting specific features.

    2. Root Cause Analysis: 12:15 - Identified that the mTLS certificate expiration warning had been disabled in the updated GlobalSign Atlas version, preventing any proactive alerts.

    3. Resolution: 13:40 - Updated the secure channel between GlobalSign and Skribble, restoring all functionalities, including AES4Business.

    Resolution:

    The secure communication channel between GlobalSign and Skribble was reestablished. Signature services and the AES4Business feature are now functioning as expected.

    Follow-Up Actions:

    1. Review and Update Communication Channels: All communication channels between Skribble and GlobalSign will be reviewed and updated to ensure uninterrupted notifications and functionality.

    2. Long-Term Validity Assurance: The renewed connection is valid for the next five years, minimizing the risk of similar issues during this period.

    Conclusion:

    The issue has been resolved, and measures are in place to prevent recurrence. We expect smooth operations and reliable notifications over the next five years due to the updated connection configuration.

  • Investigating
    Investigating

    We are currently investigating this incident with our AES4Business features and connectivity with GlobalSign.

Login not working
  • Update
    Update

    Incident Summary:

    On November 11th 2024, 16:45, a maintenance script inadvertently removed access rights for a system user required during a post-authentication process. While the primary login function remained operational, a secondary process that logs user data from our Identity Provider (IDP) service failed due to insufficient permissions. This led to presumed login failures on our website from the user perspective.

    Timeline of Events:

    1. Issue Detected: 16:45 - Users reported presumed login failures.

    2. Root Cause Analysis: 17:45 - Identified that a maintenance script had removed access rights for a specific system user involved in the post-authentication data logging process.

    3. Resolution: 18:30 - Restored the system user’s permissions, allowing the post-authentication process to function as intended.

    Resolution:

    The system user’s permissions were restored, returning the post-authentication process and website functionality to normal.

    Follow-Up Actions:

    1. Maintenance Task Correction: Updated the maintenance script to prevent unintentional permission removals for essential system users in the future.

    2. Verification: Reviewed other critical processes to ensure no additional permissions were affected.

    Conclusion:

    The issue was successfully resolved, and preventive measures have been implemented to mitigate the risk of similar incidents. The system is now performing as expected, and no further interruptions are anticipated.

  • Resolved
    Resolved
    This incident has been resolved.
  • Monitoring
    Monitoring
    We implemented a fix and are currently monitoring the result.
  • Investigating
    Investigating
    We are currently investigating this incident.

Oct 2024

Sep 2024

Swisscom Identifications ZertES (Switzerland) currently not available
  • Resolved
    Resolved

    This incident has been resolved. Both identification methods SRS-Videoident and SRS-Autoident are available again via SRS Idents.

  • Monitoring
    Monitoring

    The issue with Swisscom Trust Services still persists. Identifications via the SRS Site are still not possible for ZertES (Switzerland). However, for our customers who have Identification packages for their members and/or external signers, the Identifications started via Skribble work for both ZertES and eIDAS.

    We are actively monitoring the situation and will provide updates accordingly.

  • Investigating
    Investigating

    Currently Identifications for QES ZertES (Switzerland) are not possible via the Swisscom SRS Website.

    The problem is known and being worked on. We will update accordingly.

Sep 2024 to Nov 2024

Next