On March 12, 2021 an isolated technical issue caused an email message requesting a password reset to the TransUnion Net Access (TUNA) system to be sent in error to some of our valued customers. Please disregard this message. We sincerely apologize for any confusion this may have caused.
TransUnion is preparing to update the Client Technical Services Portal (CTS Portal) to accept only traffic using version 1.2 of TLS (Transport Layer Security). TLS 1.1 will no longer be enabled. Browsers using TLS 1.1 will no longer be able to access the CTS Portal. This change will allow TransUnion to leverage newer versions of TLS to increase the security of our customer connections. See General Announcement #188
for additional information.
As part of ongoing security enhancements, TransUnion will no longer support the HTTP GET method. TransUnion’s target for blocking all HTTP GET requests, including Production and UAT/Test, is currently set for August 10, 2020. As an alternative, customers can use HTTP POST. This method is used to send data to a server to create and update a resource. Data sent to the server using HTTP POST is stored in the request body of the HTTP request and is more secure than the GET method.
The change to disable the GET method is currently targeted for the following dates:
- UAT/Test: July 15, 2020
- Production: August 10, 2020
See General Announcement #182 for additional information.
Reminder to all TUNA customers who blacklist outbound traffic: you will need to whitelist the IP address range listed below to leverage TransUnion's secondary TUNA platform, which will enhance its current High Availability even further, as well as "future-proof" for upcoming TransUnion products.
IP address range: 184.108.40.206/20