From af364e30124874ae70d58805aa6131a91c9e998d Mon Sep 17 00:00:00 2001 From: Cursor Agent Date: Thu, 12 Feb 2026 19:55:49 +0000 Subject: [PATCH] Remove mTLS references from webhook authentication documentation - Remove mTLS from frontmatter description - Remove mTLS section from Webhook Network Security - This change aligns with the industry-wide deprecation of mTLS support due to Certificate Authorities removing Client Authentication capabilities from publicly trusted certificates Co-authored-by: Daniel Sousa --- content/docs/tech-resources/webhook-authentication.md | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/content/docs/tech-resources/webhook-authentication.md b/content/docs/tech-resources/webhook-authentication.md index c3ca6da4d..00d11afd8 100644 --- a/content/docs/tech-resources/webhook-authentication.md +++ b/content/docs/tech-resources/webhook-authentication.md @@ -1,7 +1,7 @@ --- lastUpdated: "10/01/2021" title: "Event Webhook Authentication and Security" -description: "Spark Post offers optional but highly recommended security measures that can be implemented when setting up a webhook namely, SSL, OAuth 2.0, mTLS, and Basic Authentication These measures increase the security of your webhook event data and ensure that the data delivered originates from Spark Post OAuth 2..." +description: "Spark Post offers optional but highly recommended security measures that can be implemented when setting up a webhook namely, SSL, OAuth 2.0, and Basic Authentication These measures increase the security of your webhook event data and ensure that the data delivered originates from Spark Post OAuth 2..." --- SparkPost [Event Webhooks](https://developers.sparkpost.com/api/webhooks/) offers some optional (but highly recommended) security measures that can be implemented when setting up a webhook. These measures increase the security of your webhook event data and ensure that the data delivered originates from SparkPost. @@ -12,9 +12,6 @@ SparkPost [Event Webhooks](https://developers.sparkpost.com/api/webhooks/) offer Secure Socket Layer (SSL), also known as Transport Layer Security (TLS), are cryptographic protocols that provide communications security over a computer network. If your Target endpoint supports SSL then you can prefix your endpoint URL with "https://". The default port is 443, in which case you do not need to specify the port in the URL e.g. https://yourdomain.com/yourendpoint. If your Target endpoint has SSL enabled on a different port then you may specifcy it in your URL. E.g. "https://yourdomain.com:81/yourendpoint" -**mTLS** -Event webhooks supports [mTLS](https://en.wikipedia.org/wiki/Mutual_authentication) for transport layer authentication. mTLS is not a separate authentication schema, it is simply a change in how the TLS connection handshake happens. SparkPost = CLIENT, your app = SERVER. - **IP Whitelisting** For those customers that require inbound traffic to be whitelisted in a firewall we do maintain the hostname wh.egress.sparkpost.com which lists the egress IPs under the host’s A record. Please let your TAM know that you are whitelisting IPs and SparkPost will notify you if this list changes, with some advance notice.