SSL updates: deprecated TLS ciphers

We are making some changes to the list of supported ciphers, and will be removing the ability to connect using outdated ciphers.

Why are we doing this?

To ensure that we are providing the highest levels of privacy and data integrity, we periodically review our TLS cipher usage and align with any recommendations provided by NIST

What are we changing?

NIST recommends avoiding cipher suites that don't support forward secrecy. (Full NIST guidelines  are available at

All of our existing cipher suites support forward secrecy, with one exception: TLS_RSA_WITH_AES_128_GCM_SHA256

After analyzing our customers' cipher usage, we've determined that deprecating and removing this cipher will have minimal impact on the vast majority of customers.

When is this happening?

Connections attempting to reach xMatters using the TLS_RSA_WITH_AES_128_GCM_SHA256 cipher will be rejected as of February 1, 2022. 

How can you prepare?

As mentioned, the vast majority of our customers will not be affected by this change. 

Our customer support agents and customer success managers are currently reaching out directly to the few customers still using this cipher to ensure that they can transition to alternate connection methods. 

If you have further questions about this change, please contact Customer Support.


Have more questions? Submit a request


Please sign in to leave a comment.
Powered by Zendesk