Block Redirect Link Requests with Invalid Authentication Hashes for SMS
Authentication Hash also being added for SMS Links
In the 24D, Oracle introduced the addition of the authentication hash parameter to your email redirect links. With the 25A release, we are implementing the same authentication hash parameter for your redirect links in SMS.
- Enhanced redirect link authentication
- Improved security by blocking requests with invalid auth hashes
- Prevents redirect links from being altered externally
- Included authentication hash in SMS links
- Added in links sent after 25A release
- Enforced in 25B release (expected May 2025)
As a reminder, this functionality enhances redirect link authentication and prevents your redirect links from being altered externally.
Steps to Enable
You don't need to do anything to enable this feature.
Tips And Considerations
Redirect links in SMS sent after the 25A release will automatically include the authentication hash parameter.
SMS redirect links will continue to work until Eloqua enforces the authentication hash parameter with the 25B release. This means that, any SMS sent prior to the 25A release and are in a recipient’s inbox that contain redirect links will be blocked starting with the 25B release.
Key Resources
Eloqua Product Notice: Block Redirect Link Requests with Invalid Authentication Hashes [Updated for 2025]