Last checked: 6 minutes ago
Get notified about any outages, downtime or incidents for Templafy and 1800+ other cloud vendors. Monitor 10 companies, for free.
Outage and incident data over the last 30 days for Templafy.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage. It's completely free and takes less than 2 minutes!
Sign Up NowOutlogger tracks the status of these components for Xero:
Component | Status |
---|---|
Templafy Email Signature Server | Active |
Email Signature Server | Active |
Templafy Hive | Active |
Account Management | Active |
Add-in Management | Active |
AI Assistant | Active |
Authentication | Active |
Email Signature | Active |
Engage | Active |
Integrations | Active |
Library & Dynamics | Active |
Productivity | Active |
Resource Management | Active |
User Management | Active |
Templafy One | Active |
Public API | Active |
WebApp | Active |
View the latest incidents for Templafy and check for official updates:
Description: Starting at 24-th of May at 10:27 CEST a subset of Templafy One custtomers started experiencing slow response times when accessing the application. The issue was caused by an unexpected situation in our offline component, that resulted in an excesive number of operations on our storage account, causing it to have a slower response. Upon identifying the issue, at 11:35 CEST, we promptly implemented short-term preemptive measures to stabilize the system and restore performance to acceptable levels. These measures, including immediate mitigation steps and intensified monitoring, proved effective in maintaining system stability and ensuring ongoing performance within our standards. In parallel, we have initiated a comprehensive review of our system to implement long-term changes aimed at enhancing efficiency and performance. Our team is diligently working on optimizing the codebase to identify and implement improvements that will ensure optimized performance in future scenarios.
Status: Postmortem
Impact: Minor | Started At: May 24, 2023, 8:27 a.m.
Description: Starting at 23-th of May at 11:00 CEST a subset of Templafy One custtomers started experiencing slow response times when accessing the application. The issue was caused by an unexpected situation in our offline component, which resulted in an excessive number of operations on our storage account, causing it to have a slower response. After identifying the issue we started to apply mitigation steps to stabilize the system and restore performance to acceptable levels. At 12:10 CEST we could already confirm that the system was working within the desired performance metrics. Following this the engineering team maintained continuous monitoring of the system to ensure that all operational metrics pertaining to performance stayed within optimal parameters.
Status: Postmortem
Impact: Minor | Started At: May 23, 2023, 9 a.m.
Description: **Summary:** Early this week, we identified an issue with Templafy VSTO Add-ins in Microsoft Office for PC. A subset of users received a “Publisher cannot be verified” notification when starting Office desktop applications that had Templafy VSTO Add-ins installed. Our service was not down, and users who chose to install the Office Add-in from the unknown publisher could continue using our product via Office desktop. As an immediate response, we assembled a team from Engineering, Product, Support, and InfoSec to scope and address the issue. Templafy identified that the issue was only impacting customers using a particular subset of VSTO add-ins and versions. Subsequently, on Tuesday, Templafy implemented and then deployed a fix for the impacted customers, without requiring any further action from the clients, to ensure that the issue was resolved. **Issue overview:** On Sunday, 30th of April, we received support tickets indicating users were being prompted with a Microsoft Office Customization Installer notification, stating “Publisher cannot be verified.” Upon investigation, we determined that the issue was limited to Windows users who opened Microsoft Word, PowerPoint, Excel, or Outlook using Templafy One and Hive with the following VSTO Add-ins and their versions: * Library version 6.1.36 - 6.1.73 * Productivity version 5.0.701 - 7.1.205 * Email Signature version 6.1.36 - 6.1.65 Templafy Web Add-ins \(For MS Office on-prem, Online & Mac\) were not impacted. Customers on the latest stable version of Templafy Hive were also not impacted. **Root cause:** Upon thorough investigation, we determined that the root cause was that the signing certificate, used to sign the VSTO Add-ins, could not be verified by Microsoft Office anymore due to a change in the Time Stamp Authority requirements. The signing certificate we used was valid until the 28th of April. To ensure that Add-ins are valid after the certificate expires, we use a Time Stamp Authority \(TSA\) when signing add-ins. As long as the Time Stamp Authority is trusted, add-ins remain valid after the certificate expires. To enhance global security, on the 1st of June 2021, [the CA/B Forum](https://cabforum.org/wp-content/uploads/Baseline-Requirements-for-the-Issuance-and-Management-of-Code-Signing.v2.8.pdf#page=40) increased the required key length for Time Stamp Authority certificates to a minimum of 3072[.](https://bit.ly/3LAEoXW).) The Time Stamp Authority \(TSA\) we used when signing our add-ins was using a key length of 2048. Therefore, it was no longer trusted, resulting in the add-ins becoming invalid after the certificate expiration date. We had anticipated this problem and had switched to a new Time Stamp Authority \(TSA\) when signing executable files in March 2021, but we had not correctly switched to the new TSA when signing manifest files. Because of this, after the certificate expiration date on the 28th of April, users with impacted VSTO Add-in versions who opened an Office application received the "Publisher cannot be verified" notification. **Resolution:** To resolve the issue, we manually re-signed Library, Email Signature, and Productivity VSTO Add-ins using a new certificate with a valid Time Stamp Authority without changing any behavior of the software. We manually validated the re-signed VSTO Add-ins with both Templafy One and Hive customers. After confirmation, we re-signed all affected add-ins and programmatically updated Templafy Desktop packages for all affected Templafy One customers. Similarly, we programmatically updated all affected Hive customers to the re-signed add-ins. This process was completed by the end of Tuesday, 2nd of May. The packages with the re-signed VSTO Add-ins were automatically installed by Templafy Desktop on end users' PCs after midnight Tuesday \(local time\). Going forward, we will take extra precautions to ensure that our signed packages remain valid and adhere to the necessary key length standards in order to prevent similar problems in the future. **Timeline:** * Sunday, 30th of April: We identified the incident and received the first support tickets. * Monday, 1st of May: We began investigating and escalated to involve our Engineering, Product, Support, and InfoSec departments. We identified the scope, cause, and solution. At the end of Monday, we got confirmation from a few customers that the fix was working. * Tuesday, 2nd of May: We automatically re-signed all add-ins and updated all affected customers. * Wednesday, 3rd of May: Customers received the corrected VSTO Add-ins and the issue was officially resolved for all impacted customers. Lastly, we would like to thank you for your patience and understanding during this incident. We know that disruptions to your business operations are costly and frustrating, and as outlined above, we are committed to doing everything in our power to prevent similar incidents from occurring in the future. If you have any further questions or concerns, please do not hesitate to reach out to [[email protected]](mailto:[email protected]). We are always here to assist you and help you get the most out of our product. We value your business and appreciate your ongoing trust in our service.
Status: Postmortem
Impact: Major | Started At: May 1, 2023, 10:03 a.m.
Description: On 19-th of April 2023 9:53 AM CEST, a software incident occurred during the rollout of a new certificate. The previous certificate was inadvertently removed from the Trusted Publisher store, causing a Certification prompt to be displayed for Add-Ins that still utilized the old certificate. To resolve the incident, the engineering team developed and rolled out a fix, which added both the old and new certificates to the Trusted Publisher store. The fix was deployed at 12:57 CEST. This prevented the Certification prompt from being displayed and restored normal operation. To avoid similar incidents in the future, the team is implementing several measures, such as improving the deployment process to ensure the proper configuration of Trusted Publisher store and conducting additional testing to catch potential issues before rollout. The incident caused inconvenience to users and required immediate action from the engineering team to restore normal operation. However, through a swift and effective response, the team was able to resolve the incident and put measures in place to prevent similar incidents in the future.
Status: Postmortem
Impact: Major | Started At: April 19, 2023, 9:53 a.m.
Description: Starting at 6th April 2023 11:50 AM CET, Templafy One customers started to get an exception when trying to upload slides and/or presentations. This behaviour was introduced by system misconfiguration. We noticed the issue at 11th April 8:23 PM CET from a customer report. The engineering team started working on this issue at 11th April 2023 9:00 PM CET and the issue was mitigated at 11th April 2023 10:15 PM CET.
Status: Postmortem
Impact: Major | Started At: April 11, 2023, 6:37 p.m.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage or down time. Join for free - no credit card required.