Company Logo

Is there an SecureAuth outage?

SecureAuth status: Systems Active

Last checked: 8 minutes ago

Get notified about any outages, downtime or incidents for SecureAuth and 1800+ other cloud vendors. Monitor 10 companies, for free.

Subscribe for updates

SecureAuth outages and incidents

Outage and incident data over the last 30 days for SecureAuth.

There have been 1 outages or incidents for SecureAuth in the last 30 days.

Severity Breakdown:

Tired of searching for status updates?

Join OutLogger to be notified when any of your vendors or the components you use experience an outage. It's completely free and takes less than 2 minutes!

Sign Up Now

Components and Services Monitored for SecureAuth

Outlogger tracks the status of these components for Xero:

Operator Alerts Active
Application Active
AU Region Active
EU Region Active
Push Active
SMS Active
US Region Active
Voice Active
Application Active
Device Trust Active
Mobile App Active
Push Active
SMS Active
Voice Active
SaaS/Full Cloud Identity Platform Active
SecureAuth Connector Active
3rd Party Mobile Carrier Active
Enhanced Geolocation Resolution Service - US1 Active
Enhanced Geolocation Resolution Service - US2 Active
Fraud Service - US1 Active
Fraud Service - US2 Active
Geolocation Resolution Service - US1 Active
Geolocation Resolution Service - US2 Active
Nexmo Voice API Active
Push-to-Accept Service - US1 Active
Push-to-Accept Service - US2 Active
SMS Service - US1 Active
SMS Service - US2 Active
Telephony Extension/DTMF Service - US1 Active
Telephony Extension/DTMF Service - US2 Active
Telephony Provider SMS API Active
Telephony Service - US1 Active
Telephony Service - US2 Active
Threat Service - US1 Active
Threat Service - US2 Active
X.509 Certificate Service (SHA2) - US1 Active
X.509 Certificate Service (SHA2) - US2 Active
SecureAuth Application Templates Active
SecureAuth Web Admin Active
FIDO Service Active
Mobile Services Active
Polaris Base Infrastructure Active
SaaS IdP Broker Active
Dashboard Service Active
Device Enrollment Service Active
Fraud Service Active
IP Blocking Service Active
IP Intel Service Active
IP Reporting Service Active
Licensing Service Active
Link-to-Accept Service Active
OAuth Service Active
Push-to-Accept Service Active
SMS Service Active
Symbol-to-Accept Service Active
Telephony Service Active
Titan Proxy Services (SA IdP 9.3 and older only) Active
Transaction Service Active
User Risk Scoring Service Active
User Risk Service Active
User Stats Service Active
Certificate Enrollment Active
Cloud IdP Active
Dashboard Active
FIDO WebAuthn Active
Kerberos Authentication Active
Link-to-Accept Service Active
Mobile App Active
Push Active
SMS Active
Voice Active
Component Status
Operator Alerts Active
Active
Application Active
AU Region Active
EU Region Active
Push Active
SMS Active
US Region Active
Voice Active
Active
Application Active
Device Trust Active
Mobile App Active
Push Active
SMS Active
Voice Active
Active
SaaS/Full Cloud Identity Platform Active
SecureAuth Connector Active
Active
3rd Party Mobile Carrier Active
Enhanced Geolocation Resolution Service - US1 Active
Enhanced Geolocation Resolution Service - US2 Active
Fraud Service - US1 Active
Fraud Service - US2 Active
Geolocation Resolution Service - US1 Active
Geolocation Resolution Service - US2 Active
Nexmo Voice API Active
Push-to-Accept Service - US1 Active
Push-to-Accept Service - US2 Active
SMS Service - US1 Active
SMS Service - US2 Active
Telephony Extension/DTMF Service - US1 Active
Telephony Extension/DTMF Service - US2 Active
Telephony Provider SMS API Active
Telephony Service - US1 Active
Telephony Service - US2 Active
Threat Service - US1 Active
Threat Service - US2 Active
X.509 Certificate Service (SHA2) - US1 Active
X.509 Certificate Service (SHA2) - US2 Active
Active
SecureAuth Application Templates Active
SecureAuth Web Admin Active
Active
FIDO Service Active
Mobile Services Active
Polaris Base Infrastructure Active
SaaS IdP Broker Active
Active
Dashboard Service Active
Device Enrollment Service Active
Fraud Service Active
IP Blocking Service Active
IP Intel Service Active
IP Reporting Service Active
Licensing Service Active
Link-to-Accept Service Active
OAuth Service Active
Push-to-Accept Service Active
SMS Service Active
Symbol-to-Accept Service Active
Telephony Service Active
Titan Proxy Services (SA IdP 9.3 and older only) Active
Transaction Service Active
User Risk Scoring Service Active
User Risk Service Active
User Stats Service Active
Active
Certificate Enrollment Active
Cloud IdP Active
Dashboard Active
FIDO WebAuthn Active
Kerberos Authentication Active
Link-to-Accept Service Active
Mobile App Active
Push Active
SMS Active
Voice Active

Latest SecureAuth outages and incidents.

View the latest incidents for SecureAuth and check for official updates:

Updates:

  • Time: Oct. 7, 2022, 2:13 a.m.
    Status: Postmortem
    Update: # SecureAuth Production Incident Root Cause Analysis \(RCA\) ## Incident Description The Push to Accept \(P2A\) service was sending push requests to users; however, approval of those requests were not getting back to the Identity Platform \(IdP\) to finish the login process for a user with P2A multi-factor authentication \(MFA\). All other MFA methods were still available to users. ## Root Cause During normal, automated auto-scaling of the Amazon Elastic Kubernetes Service \(EKS\), there was an issue with the networking components of the EKS nodes, which caused the Redis databases used within the environment to lose access with other services. It is suspected that the auto-scaling of the EKS environment impacted the core networking and DNS services of the cluster due to a single auto-scaling policy for the entire cluster. ## Resolution * Alerts were generated and investigated by the DevOps Team within minutes of the networking issues; however, these alerts were generated from multiple services, and it was eventually determined to be the Redis services after multiple other services were also cycled. * The Redis Pods were cycled, and the Push Service was restored to normal operation. ## Corrective Actions * The DevOps Team is working to move from Redis pods on EKS to utilizing the AWS Elasticache service to allow for redundancy and additional stability for the service. ETA is the end of 2022. * Additional alerts have been created updated procedures have been added to runbooks to minimize a potential future failure. * The DevOps team is modifying the auto-scaling policies to separate the core services into one auto-scaling group \(ASG\) and the application itself into a separate ASG. This is expected to be completed by the end of October 2022.
  • Time: Oct. 6, 2022, 7:35 p.m.
    Status: Resolved
    Update: This incident has been resolved.
  • Time: Oct. 6, 2022, 4:48 p.m.
    Status: Monitoring
    Update: The issue has been resolved, now monitoring
  • Time: Oct. 6, 2022, 4:27 p.m.
    Status: Identified
    Update: Other MFA methods (TOTP, SMS, etc) are still working
  • Time: Oct. 6, 2022, 4 p.m.
    Status: Identified
    Update: The issue has been identified and a fix is being implemented.
  • Time: Oct. 6, 2022, 3:52 p.m.
    Status: Investigating
    Update: The push service is not accepting approval for push to accept

Updates:

  • Time: Oct. 7, 2022, 2:13 a.m.
    Status: Postmortem
    Update: # SecureAuth Production Incident Root Cause Analysis \(RCA\) ## Incident Description The Push to Accept \(P2A\) service was sending push requests to users; however, approval of those requests were not getting back to the Identity Platform \(IdP\) to finish the login process for a user with P2A multi-factor authentication \(MFA\). All other MFA methods were still available to users. ## Root Cause During normal, automated auto-scaling of the Amazon Elastic Kubernetes Service \(EKS\), there was an issue with the networking components of the EKS nodes, which caused the Redis databases used within the environment to lose access with other services. It is suspected that the auto-scaling of the EKS environment impacted the core networking and DNS services of the cluster due to a single auto-scaling policy for the entire cluster. ## Resolution * Alerts were generated and investigated by the DevOps Team within minutes of the networking issues; however, these alerts were generated from multiple services, and it was eventually determined to be the Redis services after multiple other services were also cycled. * The Redis Pods were cycled, and the Push Service was restored to normal operation. ## Corrective Actions * The DevOps Team is working to move from Redis pods on EKS to utilizing the AWS Elasticache service to allow for redundancy and additional stability for the service. ETA is the end of 2022. * Additional alerts have been created updated procedures have been added to runbooks to minimize a potential future failure. * The DevOps team is modifying the auto-scaling policies to separate the core services into one auto-scaling group \(ASG\) and the application itself into a separate ASG. This is expected to be completed by the end of October 2022.
  • Time: Oct. 6, 2022, 7:35 p.m.
    Status: Resolved
    Update: This incident has been resolved.
  • Time: Oct. 6, 2022, 4:48 p.m.
    Status: Monitoring
    Update: The issue has been resolved, now monitoring
  • Time: Oct. 6, 2022, 4:27 p.m.
    Status: Identified
    Update: Other MFA methods (TOTP, SMS, etc) are still working
  • Time: Oct. 6, 2022, 4 p.m.
    Status: Identified
    Update: The issue has been identified and a fix is being implemented.
  • Time: Oct. 6, 2022, 3:52 p.m.
    Status: Investigating
    Update: The push service is not accepting approval for push to accept

Updates:

  • Time: July 4, 2022, 4:23 a.m.
    Status: Resolved
    Update: This incident has been resolved.
  • Time: July 3, 2022, 12:28 a.m.
    Status: Monitoring
    Update: A fix has been implemented and we are monitoring the results.
  • Time: July 2, 2022, 4:03 p.m.
    Status: Identified
    Update: We have reports of a single customer having SMS/Voice MFA issues. This appears to be an issue with our third-party SMS/Voice Provider.

Updates:

  • Time: July 4, 2022, 4:23 a.m.
    Status: Resolved
    Update: This incident has been resolved.
  • Time: July 3, 2022, 12:28 a.m.
    Status: Monitoring
    Update: A fix has been implemented and we are monitoring the results.
  • Time: July 2, 2022, 4:03 p.m.
    Status: Identified
    Update: We have reports of a single customer having SMS/Voice MFA issues. This appears to be an issue with our third-party SMS/Voice Provider.

Updates:

  • Time: July 2, 2022, 3:57 p.m.
    Status: Resolved
    Update: This incident has been resolved, Root Cause Analysis pending
  • Time: July 1, 2022, 4:18 p.m.
    Status: Monitoring
    Update: A resolution has been placed, we will provide an RCA here shortly after.
  • Time: July 1, 2022, 4:18 p.m.
    Status: Investigating
    Update: We are continuing to investigate this issue.
  • Time: July 1, 2022, 3:56 p.m.
    Status: Investigating
    Update: We are currently investigating this issue.

Check the status of similar companies and alternatives to SecureAuth

NetSuite
NetSuite

Systems Active

ZoomInfo
ZoomInfo

Systems Active

SPS Commerce
SPS Commerce

Systems Active

Miro
Miro

Systems Active

Field Nation
Field Nation

Systems Active

Outreach
Outreach

Systems Active

Own Company

Issues Detected

Mindbody
Mindbody

Systems Active

TaskRabbit
TaskRabbit

Systems Active

Nextiva
Nextiva

Systems Active

6Sense

Systems Active

BigCommerce
BigCommerce

Systems Active

Frequently Asked Questions - SecureAuth

Is there a SecureAuth outage?
The current status of SecureAuth is: Systems Active
Where can I find the official status page of SecureAuth?
The official status page for SecureAuth is here
How can I get notified if SecureAuth is down or experiencing an outage?
To get notified of any status changes to SecureAuth, simply sign up to OutLogger's free monitoring service. OutLogger checks the official status of SecureAuth every few minutes and will notify you of any changes. You can veiw the status of all your cloud vendors in one dashboard. Sign up here