<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">

<channel>

  <atom:link href="https://community.kissflow.com/rss/category/important-information" rel="self" type="application/rss+xml"/>
  <title>Kissflow Community&#32;Important information</title>
  <link>https://community.kissflow.com/category/important-information/</link>
  <description>Learn about important SLAs and other supported models in Kissflow</description>
  <language>en-us</language>
<ttl>240</ttl>
  <item>
          <title>Important update regarding Kissflow’s SSL certificate</title>
          <link>https://community.kissflow.com/t/g9ypg0a/important-update-regarding-kissflows-ssl-certificate</link>
          <description><![CDATA[<p>We'd like to share an important update regarding Kissflow’s SSL certificate renewal to ensure your experience with us remains secure and uninterrupted.</p>
<p>Our SSL provider, Sectigo, has migrated its signing infrastructure to a new, more secure <strong>Public Server Authentication Root (R46)</strong>. The new root certificate replaces the older trust chain based on <strong>AAA Certificate Services </strong>and<strong> USERTrust RSA Certification Authority</strong>.</p>
<h2>How does it impact users?</h2>
<p>Due to this change, if you are accessing Kissflow through systems that cannot receive OS/browser updates regularly (for example, legacy servers, embedded devices, or isolated environments) you may encounter one of the following SSL trust errors. This means you will no longer be able to access Kissflow.</p>
<p>In legacy environments/servers:</p>
<ul>
 <li><p>SSL handshake failure</p></li>
 <li><p>SSL connection failed</p></li>
 <li><p>ERR_SSL_PROTOCOL_ERROR</p></li>
</ul>
<p>In older browsers:</p>
<ul>
 <li><p>NET::ERR_CERT_AUTHORITY_INVALID</p></li>
 <li><p>Your connection is not private</p></li>
</ul>
<p style="text-align:center"><img alt="" class="fb-img" src="https://s3-us-west-2.amazonaws.com/media.forumbee.com/i/2dc270c3-332c-4708-8cd2-48d28eb81aa1/h/547.png" style="" width="422"></p>
<p>This occurs because those environments still rely on the older certificate trust path, that is, AAA Certificate Services &nbsp;→ &nbsp;USERTrust RSA Certification Authority → Sectigo.</p>
<h3>Deadlines for SSL certificate renewal</h3>
<h4>If you are on the <a rev="auto" rel="nofollow noopener noreferrer" href="http://Kissflow.eu" target="_blank">Kissflow.eu</a> domain</h4>
<p>Update the new SSL certificate by <strong>February 13, 2026.</strong></p>
<h4>If you are on the <a rev="auto" rel="nofollow noopener noreferrer" href="http://Kissflow.com" target="_blank">Kissflow.com</a> domain</h4>
<p>Update the new SSL certificate by <strong>February 27, 2026.</strong></p>
<p>After the mentioned dates, only the new Sectigo root (R46) will be supported and trusted.</p>
<h2>How to verify if your environment is compliant with the new root certificate</h2>
<p>To verify if your system trusts the new certificate, you can perform one of the following checks using:</p>
<ul>
 <li><p>A web browser.</p></li>
 <li><p>OpenSSL.</p></li>
</ul>
<blockquote>
 <p><strong>Note:</strong><br> You must run these tests from the specific browser or environment you use to access Kissflow.</p>
</blockquote>
<h3>1. Using OpenSSL</h3>
<h4>Run the following command from a terminal</h4>
<pre class="language-shell"><code class="language-shell">openssl s_client -connect sectigo.com:443 -showcerts
</code></pre>
<p>If your root certificate is updated, your output will look like this:</p>
<pre class="language-shell"><code class="language-shell">Issuer:&nbsp;Sectigo&nbsp;Public&nbsp;Server&nbsp;Authentication&nbsp;Root&nbsp;R46

Verify&nbsp;return&nbsp;code:&nbsp;0&nbsp;(ok)</code></pre>
<p>This means your environment trusts the new certificate chain. No further action is needed from your end.</p>
<p>If your output does not return 0, then you need to import the new Sectigo R46 SSL certificate into your system.</p>
<h3>2. Using a web browser&nbsp;</h3>
<ol>
 <li><p>Open <a href="https://www.sectigo.com/" rel="nofollow noopener noreferrer" target="_blank">https://www.sectigo.com/</a>.</p></li>
 <li><p>Click the padlock icon <img alt="" class="fb-img" src="https://s3-us-west-2.amazonaws.com/media.forumbee.com/i/216479c1-8f69-40c2-91f3-2ef6d419f325/h/547.png" style="" width="15"></p> <p>&nbsp;→ <strong>Certificate viewer → Details.</strong></p></li>
 <li><p>Check if the root certificate listed is <strong>Sectigo Public Server Authentication Root R46</strong>.<br> If the root is not R46, you must import the new Sectigo R46 SSL certificate.</p></li>
</ol>
<p>The following browser and operating system versions natively support the new Sectigo Root R46 certificate.</p>
<table>
 <tbody>
  <tr>
   <td><p><strong>Browser</strong></p></td>
   <td><p><strong>Minimum supported version</strong></p></td>
   <td><p><strong>Release date</strong></p></td>
  </tr>
  <tr>
   <td><p>Chrome</p></td>
   <td><p>120 or newer</p></td>
   <td><p>Dec 2023</p></td>
  </tr>
  <tr>
   <td><p>Edge</p></td>
   <td><p>120 or newer</p></td>
   <td><p>Dec 2023</p></td>
  </tr>
  <tr>
   <td><p>Firefox</p></td>
   <td><p>117 or newer</p></td>
   <td><p>Aug 2023</p></td>
  </tr>
  <tr>
   <td><p>Safari (OS trust store)</p></td>
   <td><p>macOS 14.4+ / iOS 17.4+</p></td>
   <td><p>Mar 2024</p></td>
  </tr>
  <tr>
   <td><p>Opera</p></td>
   <td><p>106 or newer</p></td>
   <td><p>Dec 2023</p></td>
  </tr>
  <tr>
   <td><p>SRWare Iron:</p></td>
   <td><p>120 or newer</p></td>
   <td><p>Dec 2023</p></td>
  </tr>
 </tbody>
</table>
<p>If you are using a version older than these, you must either update the browser/OS, or manually import the new certificate to your operating system’s trust store.<br> We strongly recommend performing a verification check even if your systems meet the minimum requirements.</p>
<h2>Importing the new Sectigo R46 SSL certificate</h2>
<p>If your systems cannot receive OS/browser updates regularly (for example, legacy servers, embedded devices, or isolated environments), you have to manually install the new R46 root certificate into your system’s trusted root store before February 13, 2026 or February 27, 2026 depending on your domain.</p>
<ol>
 <li><p>Download the official Sectigo Public Server Authentication Root R46 certificate from:<br> <a href="https://crt.sh/?d=1199354" rel="nofollow noopener noreferrer" target="_blank">Sectigo Public Root Certificates - USERTrust RSA CA</a>&nbsp; (<a href="https://crt.sh/?d=1199354" rel="nofollow noopener noreferrer" target="_blank">https://crt.sh/?d=1199354</a>)</p></li>
 <li><p>Install the certificate into your Trusted Root Certification Authorities store.</p></li>
</ol>
<p><strong>Windows:</strong><br> Open <strong>certmgr.msc</strong> <strong>→ Trusted Root Certification Authorities → Import</strong>.</p>
<p><strong>macOS:</strong><br> Open <strong>Keychain Access → System Roots → Import</strong>.</p>
<p><strong>Linux:</strong><br> Copy the certificate to the path /usr/local/share/ca-certificates/ and run the command:</p>
<pre class="language-shell"><code class="language-shell">sudo&nbsp;update-ca-certificates</code></pre>
<p><strong>Java: </strong><br> Copy the certificate to the path $JAVA_HOME/lib/security/cacerts and run the command:</p>
<pre class="language-shell"><code class="language-shell">keytool&nbsp;-import&nbsp;-trustcacerts&nbsp;-keystore&nbsp;$JAVA_HOME/lib/security/cacerts&nbsp;\
-alias&nbsp;sectigoR46&nbsp;-file&nbsp;SectigoPublicServerAuthenticationRootR46.crt</code></pre>
<p>After the import is complete, restart the application or web browser.</p>
<blockquote>
 <p><strong>Note:</strong><br> If your technical team connects to Kissflow via Docker or other containerized environments, you must ensure the new SSL certificate is also updated in the Docker images and containers.</p>
</blockquote>
<p>Importing the official Sectigo Root R46 certificate ensures your systems continue to trust Kissflow and that your connection remains secure.</p>
<p>To maintain a secure and uninterrupted connection, please complete the certificate update by the <strong>February 13 or February 27 </strong>deadline, depending on your region.</p>
<p>If you require assistance regarding this, please contact our support team, and we will be happy to help you resolve the issue.</p>]]></description>
          <pubDate>Wed, 21 Jan 2026 07:20:08 +0000</pubDate>
          <guid>https://community.kissflow.com/t/g9ypg0a/important-update-regarding-kissflows-ssl-certificate</guid>
          <dc:creator>Mathangi S</dc:creator>
        </item>

      <item>
          <title>Enhancing stability with static IP reservations</title>
          <link>https://community.kissflow.com/t/h7yynvd/enhancing-stability-with-static-ip-reservations</link>
          <description><![CDATA[<h2>Introduction</h2>
<p><a href="https://cloud.google.com/nat/docs/overview" rel="nofollow noopener noreferrer" target="_blank">Google Cloud NAT</a> (Network Address Translation) is a service provided by Google Cloud Platform (GCP) that enables specific resources to establish outbound connections to the internet or other Virtual Private Cloud (VPC) networks.<br> <br>Currently, Kissflow uses dynamic public IPs managed by Google Cloud NAT for all outbound calls, including integration calls to connect external applications. To enhance stability and streamline operations, we are transitioning to static public IPs.</p>
<h3>What is changing</h3>
<p>After <strong>07 January 2024</strong>, Kissflow will use manual IP allocation strategy in Google Cloud NAT service, allowing users to use reserved static IPs that remain constant over time. This will eliminate the need for frequent updates to firewall rules with new Kissflow public IPs.&nbsp;</p>
<h3>Who will it affect</h3>
<p>This change will affect users who have <strong>configured their firewalls by safelisting Kissflow IPs</strong> to allow Kissflow’s integration calls to applications in their network. Users who haven’t implemented this configuration will not be affected.&nbsp;</p>
<h3>What you need to do for uninterrupted services</h3>
<ol>
 <li><p>Safelist the new Kissflow public IPs (see below) along with the current public IPs <strong>before 07 January 2024</strong>.</p></li>
 <li><p>After <strong>07 January 2024</strong>, remove the old IPs (see below) from your safelisted IP list, as they will not be associated with Kissflow's public IP.</p></li>
</ol>
<p>Kissflow’s outbound integration calls to applications in your network will be allowed only if you safelist the new IPs listed below. Failure to do so will result in the <strong>disruption of those integration calls</strong>.</p>
<h3>Old and new IPs</h3>
<table>
 <tbody>
  <tr>
   <td><strong>Old IPs</strong></td>
   <td><span class="pen4"><strong>New IPs</strong></span></td>
  </tr>
  <tr>
   <td>35.226.147.36</td>
   <td>35.222.151.216</td>
  </tr>
  <tr>
   <td>34.70.211.170</td>
   <td>35.184.11.171</td>
  </tr>
  <tr>
   <td>34.136.109.156</td>
   <td>34.41.86.150</td>
  </tr>
  <tr>
   <td>104.155.136.67</td>
   <td>34.30.199.65</td>
  </tr>
  <tr>
   <td>35.232.194.10</td>
   <td>34.41.69.169</td>
  </tr>
  <tr>
   <td>34.42.147.216</td>
   <td>35.232.190.255</td>
  </tr>
  <tr>
   <td>35.202.16.203</td>
   <td>34.123.136.177</td>
  </tr>
  <tr>
   <td>34.107.16.48</td>
   <td>34.66.21.198</td>
  </tr>
  <tr>
   <td>35.246.189.18</td>
   <td>34.159.62.126</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>34.159.85.137</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>35.198.112.83</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>35.246.174.111</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>34.141.48.133</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>35.246.245.12</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>35.242.234.6</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>35.242.252.3</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>34.93.209.125</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>34.93.214.206</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>34.100.221.217</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>34.100.189.219</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>34.93.240.230</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>35.200.224.207</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>34.100.167.208</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>35.244.33.104</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>34.40.158.113</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>35.189.11.118</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>34.40.145.67</td>
  </tr>
  <tr>
   <td>&nbsp;</td>
   <td>34.40.169.170</td>
  </tr>
 </tbody>
</table>
<h3>Effects during change implementation</h3>
<p>We’ll implement these Cloud NAT changes on <strong>07 January 2024 (Sunday)</strong> during a period of minimal traffic to minimize any potential disruption. During the implementation, there may be a brief impact lasting less than one minute while triggering integrations.</p>
<p>We appreciate your understanding and support during this transition. If you have any questions or concerns, please reach out to us in the comments or our support team.</p>]]></description>
          <pubDate>Mon, 27 Nov 2023 11:05:00 +0000</pubDate>
          <guid>https://community.kissflow.com/t/h7yynvd/enhancing-stability-with-static-ip-reservations</guid>
          <dc:creator>Dharsan V K</dc:creator>
        </item>

      <item>
          <title>Multi-language support in Kissflow</title>
          <link>https://community.kissflow.com/t/60h9qzy/languages-supported-by-kissflow</link>
          <description><![CDATA[<p><strong>Kissflow is available in the following 14 languages:</strong></p>
<ul>
 <li>English</li>
 <li>Italian (Italiano)</li>
 <li>Korean (한국어)</li>
 <li>Japanese (日本語)</li>
 <li>Simplified Chinese (简体中文)</li>
 <li>Russian (Русский)</li>
 <li>German (Deutsch)</li>
 <li>Spanish (Español)</li>
 <li>French (Français)</li>
 <li>Brazilian Portuguese (Portuguesê (Brazil))</li>
 <li>Vietnamese (Tiếng Việt)</li>
 <li>Thai (ภาษาไทย)</li>
 <li>Arabic (عربى)</li>
 <li>Polish (Język Polski)</li>
</ul>]]></description>
          <pubDate>Sat, 07 Jan 2023 10:19:00 +0000</pubDate>
          <guid>https://community.kissflow.com/t/60h9qzy/languages-supported-by-kissflow</guid>
          <dc:creator>Nandini Diagarajan</dc:creator>
        </item>

      <item>
          <title>SLAs and support models</title>
          <link>https://community.kissflow.com/t/35h9qt9/slas-and-support-models</link>
          <description><![CDATA[<h2 id="our_product_support_model">Our support model</h2>
<p style="text-align:justify">Our primary support communication is through the Kissflow Community, which can be accessed through the product by clicking on the (?) next to the profile picture or by visiting <a rev="auto" href="//community.kissflow.com/" rel="nofollow noopener noreferrer">https://community.kissflow.com/</a>. Customers can post questions and report issues or defects using the " <a href="/category/Get-help" rel="nofollow noopener noreferrer">Get Help</a>" section, which is the main mode of communication available in Kissflow. If you have a question related to using Kissflow, our team will respond promptly.<br> &nbsp;</p>
<p style="text-align:justify">We provide chat as our secondary support channel, enabling customers to report account-specific issues or defects in the chat within the Kissflow Community. The 1:1 chat can be found within the Kissflow <a href="//community.kissflow.com/" rel="nofollow noopener noreferrer">Community</a>. We recommend email communication only in cases where users cannot log in via Kissflow due to downtime or other critical issues. All emails sent to <a rev="auto" rel="nofollow noopener noreferrer" href="mailto:support@Kissflow.com">support@Kissflow.com</a> are directed to our chat system and managed by our team of support specialists.</p>
<p>Kissflow's live chat and phone/remote assistance support timings vary depending on the product and plan you select.</p>
<h2 id="status_page">Status page</h2>
<p>The Kissflow system is being actively monitored, and issues, if any, will be reported immediately on the&nbsp;<a href="https://status.kissflow.com/" rel="nofollow noopener noreferrer" target="_blank">Kissflow status page</a>. You can check this page if you’re facing any service availability issues and downtime.&nbsp;</p>
<h2 id="general_sla_terms">General SLA Terms</h2>
<p>All conversations that originate in our chat system will be answered within 24 hours on business days. However, we generally respond in a much shorter time. Our current average response time during business hours is about 30 minutes.</p>
<p>For defects that are confirmed by our product specialist, the following SLAs will apply:</p>
<h2 id="critical_defects">Critical defects</h2>
<p>Example:&nbsp;The system is down</p>
<ul>
 <li>Ticket response time: 4 hours</li>
 <li>Immediate workaround*: 4 hours</li>
 <li>Permanent fix: 48 hours</li>
</ul>
<h2 id="highly_important_defects">Highly important defects</h2>
<ul>
 <li>Example: An entire module is affected</li>
 <li>Ticket response time: 4 hours</li>
 <li>Immediate workaround: 24 hours</li>
 <li>Permanent fix: 1 week</li>
</ul>
<h2 id="medium_defects">Medium defects</h2>
<ul>
 <li>Example: A feature within a module is affected</li>
 <li>Ticket response time: 8 hours</li>
 <li>Immediate workaround: 3 business days</li>
 <li>Permanent fix: Next release</li>
</ul>
<h2 id="low_defects">Low defects</h2>
<ul>
 <li>Example: Annoyances</li>
 <li>Ticket response time: 48 hours</li>
 <li>Workaround or fix: As seen fit^</li>
</ul>
<p>*An immediate workaround is an acceptable solution to the specific problem reported.</p>
<p><strong>All timelines exclude Saturdays and Sundays.</strong></p>
<p>For large enterprise deals, we can include these SLAs in a signed contract. Write to&nbsp;<em>contact {at} <a rev="auto" rel="nofollow noopener noreferrer" href="http://kissflow.com" target="_blank">kissflow.com</a></em>&nbsp;for more information.</p>]]></description>
          <pubDate>Wed, 13 Apr 2022 19:03:00 +0000</pubDate>
          <guid>https://community.kissflow.com/t/35h9qt9/slas-and-support-models</guid>
          <dc:creator>Nandini Diagarajan</dc:creator>
        </item>

      </channel>
</rss>
