RSS BSPlink MESSAGE CENTRE
 Newsletters

 Developments

 Message Centre


BSPlink account locked contact

Please be informed that, for questions concerning lockouts of your BSPlink account, you will need to contact IATA Customer Service at http://portal.iata.org

SFTP unsafe protocols removal on August 13th 2018

Information to share with your IT department - Important for those users accessing sftp.accelya.com to upload and download files

As announced to you since last year, it was identified that sftp.accelya.com was using a set of unsafe SFTP protocols, which need to be removed.
Recently, the removal of these protocols has become critical because they threaten the PCI (Payment Card Industry) certificate. For that reason, it has been agreed that they are definitely and irrevocably removed on the 13th of August 2018.

The impacted customers are those which are accessing sftp.accelya.com using one of the protocols listed below.
Once the protocols are eliminated, if youdo not take any action, you will not be able to upload or download files on sftp.accelya.com

Please make sure that following information is review by your ITS department:

Technical details:

The following algorithms defined as weak/unsafe will be disabled on sftp.accelya.com, on the 13th of August 2018:

Weak SSH Key Exchange Algorithms

Weak SSHv2 Key Exchange Algorithms: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1

Weak SSH Encryption Algorithms

Weak SSHv2 MAC Algorithms Client to Server: hmac-md5, hmac-md5-96, hmac-sha1, hmac-sha1-96 Weak SSHv2 MAC Algorithms Server to Client: hmac-md5, hmac-md5-96, hmac-sha1, hmac-sha1-96

Weak SSH Hashing Algorithms

Weak SSHv2 MAC Algorithms Client to Server: hmac-md5, hmac-md5-96, hmac-sha1, hmac-sha1-96 Weak SSHv2 MAC Algorithms Server to Client: hmac-md5, hmac-md5-96, hmac-sha1, hmac-sha1-96

Please make sure you update your SFTP client to the latest version and you accept the new fingerprint when first connecting both to the test server as well as the production server sftp.accelya.com, after the change.

Please contact IATA customer service (www.iata.org/cs) for more information.

TLS 1.1 protocol disabled for BSPlink

Due to PCI security requirements, on Friday December 15th 2017 CET, the TLS 1.1 protocol was disabled for BSPlink. User access is only possible from browsers having the TLS 1.2 protocol enabled.

Important message to all BSPlink users

BSPlink users are reminded not to share their passwords. Sharing account credentials can put organizational security at risk by exposing customer data and financial data to unauthorized users.
Also, use strong passwords and remember they need to be unique in every system and changed on a regular basis.
Lastly, you can use the "Forgotten Password?" link in the BSPlink home page to reset and reinforce your credentials.

Warning - Fraudulent E-mails - All users!

To read the fraudulent e-mails document please click here.

Please note that only correspondence relating to fraudulent e-mails should be sent to the information.security@iata.org mailbox. Regular business-related messages must be sent to the appropriate Customer Services team.

BSPlink Newsletters

Agents!! Click here to download the latest edition of the BSPlink Agent Newsletter

Airlines!! Click here to download the latest edition of the BSPlink Airline Newsletter

GDSs!! Click here to download the latest edition of the BSPlink GDS Newsletter

Click here to access the pre-programmed system down times