Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Current »

(Note that this page applies only when customers wish to ensure that callbacks from Vibes to their own systems are definitely being made by Vibes. Customers who wish to use client certificates as an additional authentication mechanism when making calls to Vibes APIs should consult Client Certificate Authentication for Vibes APIs instead.)

The Vibes Mobile Engagement Platform is able to make callback requests to third-party systems as event notifications.

When the Vibes platform issues callback requests, it will validate the server's TLS certificate against a common list of public Certificate Authorities.

If a customer wishes to ensure that it is actually the Vibes platform issuing callback requests, and not some other (unauthorized) system, this can be done by validating the Vibes client certificate. At this point, there is only one certificate available for this purpose. The Vibes client certificate has:

Systems receiving HTTPS callback requests from the Vibes platform must be configured to request client certificates as part of the TLS handshake, and must accept the GoDaddy certificate authority that issued the certificate. The complete chain of CA certificates (the root CA certificate and all intermediate CA certificates) is attached to this page in PEM format below:


(There is no configuration work that must be done by Vibes to set this up. The Vibes client certificate will be presented in any and all callback requests made to systems that are configured as described above.)

  • No labels