Enable TLS 1.2 support as Microsoft Entra TLS 1.0/1.1 is deprecated - Azure (2024)

  • Article

To improve the security posture of your tenant, and to remain in compliance with industry standards, Microsoft Entra ID will soon stop supporting the following Transport Layer Security (TLS) protocols and ciphers:

  • TLS 1.1
  • TLS 1.0
  • 3DES cipher suite (TLS_RSA_WITH_3DES_EDE_CBC_SHA)

How this change might affect your organization

Do your applications communicate with or authenticate against Microsoft Entra ID? Then those applications might not work as expected if they can't use TLS 1.2 to communicate. This situation includes:

  • Microsoft Entra Connect
  • Microsoft Graph PowerShell
  • Microsoft Entra application proxy connectors
  • PTA agents
  • Legacy browsers
  • Applications that are integrated with Microsoft Entra ID

Why this change is being made

These protocols and ciphers are being deprecated for the following reasons:

The TLS 1.0, TLS 1.1, and 3DES Cipher suite services are being deprecated on the following schedule.

Instance typeDeprecation dateStatus
U.S. government instancesMarch 31, 2021COMPLETED
Public instancesJanuary 31, 2022COMPLETED
Microsoft Entra instances operated by 21Vianet in ChinaJune 2023ONGOING

TLS 1.3 support for Microsoft Entra services

In addition to supporting TLS 1.2, Microsoft Entra is also rolling out support for TLS 1.3 for its endpoints to align with security best practices (NIST - SP 800-52 Rev. 2). With this change, Microsoft Entra endpoints will support both TLS 1.2 and TLS 1.3 protocols.

Enable support for TLS 1.2 in your environment

To ensure a secure connection to Microsoft Entra ID and Microsoft 365 services, configure your client apps and both the client and server operating systems (OS) to support TLS 1.2 and contemporary cipher suites.

Guidelines for enabling TLS 1.2 on clients

  • Update Windows and the default TLS that you use for "WinHTTP".
  • Identify and reduce you dependency on the client apps and operating systems that don't support TLS 1.2.
  • Enable TLS 1.2 for applications and services that communicate with Microsoft Entra ID.
  • Update and configure your .NET Framework installation to support TLS 1.2.
  • Make sure that applications and PowerShell (that use Microsoft Graph and Microsoft Graph PowerShell) scripts are hosted and run on a platform that supports TLS 1.2.
  • Make sure that your web browser has the latest updates. We recommend that you use the new Microsoft Edge browser (based on Chromium). For more information, see the Microsoft Edge release notes for Stable Channel.
  • Make sure that your web proxy supports TLS 1.2. For more information about how to update a web proxy, check with the vendor of your web proxy solution.

For more information, see the following articles:

  • How to enable TLS 1.2 on clients
  • Preparing for TLS 1.2 in Office 365 and Office 365 GCC - Microsoft 365 Compliance

Update the Windows OS and the default TLS that you use for WinHTTP

These operating systems natively support TLS 1.2 for client-server communications over WinHTTP:

  • Windows 8.1, Windows 10, and later versions
  • Windows Server 2012 R2, Windows Server 2016, and later versions

Verify that you haven't explicitly disabled TLS 1.2 on these platforms.

By default, earlier versions of Windows (such as Windows 8 and Windows Server 2012) don't enable TLS 1.2 or TLS 1.1 for secure communications by using WinHTTP. For these earlier versions of Windows:

  1. Install Update 3140245.
  2. Enable the registry values from the Enable TLS 1.2 on client or server operating systems section.

You can configure those values to add TLS 1.2 and TLS 1.1 to the default secure protocols list for WinHTTP.

For more information, see How to enable TLS 1.2 on clients.

Note

By default, an OS that supports TLS 1.2 (for example, Windows 10) also supports legacy versions of the TLS protocol. When a connection is made by using TLS 1.2 and it doesn't get a timely response, or when the connection is reset, the OS might try to connect to the target web service by using an older TLS protocol (such as TLS 1.0 or 1.1). This usually occurs if the network is busy, or if a packet drops in the network. After the temporary fallback to the legacy TLS, the OS will try again to make a TLS 1.2 connection.

What will be the status of such fallback traffic after Microsoft stops supporting the legacy TLS? The OS might still try to make a TLS connection by using the legacy TLS protocol. But if the Microsoft service is no longer supporting the older TLS protocol, the legacy TLS-based connection won't succeed. This will force the OS to try the connection again by using TLS 1.2 instead.

Identify and reduce dependency on clients that don't support TLS 1.2

Update the following clients to provide uninterrupted access:

  • Android version 4.3 and earlier versions
  • Firefox version 5.0 and earlier versions
  • Internet Explorer versions 8-10 on Windows 7 and earlier versions
  • Internet Explorer 10 on Windows Phone 8.0
  • Safari 6.0.4 on OS X 10.8.4 and earlier versions

For more information, see Handshake Simulation for various clients connecting to www.microsoft.com, courtesy SSLLabs.com.

Enable TLS 1.2 on common server roles that communicate with Microsoft Entra ID

  • Microsoft Entra Connect (install the latest version)

    • Do you also want to enable TLS 1.2 between the sync engine server and a remote SQL Server? Then make sure you have the required versions installed for TLS 1.2 support for Microsoft SQL Server.
  • Microsoft Entra Connect Authentication Agent (pass-through authentication) (version 1.5.643.0 and later versions)

  • Azure Application Proxy (version 1.5.1526.0 and later versions enforce TLS 1.2)

  • Active Directory Federation Services (AD FS) for servers that are configured to use Azure multifactor authentication (Azure MFA)

  • NPS servers that are configured to use the NPS extension for Microsoft Entra multifactor authentication

  • MFA Server version 8.0.x or later versions

  • Microsoft Entra Password Protection proxy service

    Action required

    1. We highly recommend that you run the latest version of the agent, service, or connector.

    2. By default, TLS 1.2 is enabled on Windows Server 2012 R2 and later versions. In rare instances, the default OS configuration might have been modified to disable TLS 1.

      To make sure that TLS 1.2 is enabled, we recommend that you explicitly add the registry values from the Enable TLS 1.2 on client or server operating systems section on servers that are running Windows Server and that communicate with Microsoft Entra ID.

    3. Most of the previously listed services are dependent on .NET Framework. Make sure it's updated as described in the Update and configure .NET Framework to support TLS 1.2 section.

    For more information, see the following articles:

    • TLS 1.2 enforcement - Enforce TLS 1.2 for the Microsoft Entra Registration Service
    • Microsoft Entra Connect: TLS 1.2 enforcement for Microsoft Entra Connect
    • Understand Microsoft Entra application proxy connectors

Enable TLS 1.2 on client or server operating systems

Registry strings

For Windows 2012 R2, Windows 8.1, and later operating systems, TLS 1.2 is enabled by default. Thus, the following registry values aren't displayed unless they were set with different values.

To manually configure and enable TLS 1.2 at the operating system level, you can add the following DWORD values:

  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client
    • DisabledByDefault: 00000000
    • Enabled: 00000001
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server
    • DisabledByDefault: 00000000
    • Enabled: 00000001
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319
    • SchUseStrongCrypto: 00000001

To enable TLS 1.2 by using a PowerShell script, see TLS 1.2 enforcement for Microsoft Entra Connect.

How to check which TLS protocol is being used

Here are two ways to check which TLS is being used:

  • Browser security settings
  • Internet Properties in Windows

To check which TLS protocol is being used by using Internet Properties, follow these steps:

  1. Press Windows+R to open the Run box.

  2. Type inetcpl.cpl and then select OK. Then, the Internet Properties window is opened.

  3. In the Internet Properties window, select the Advanced tab and scroll down to check the settings related to TLS.

    Enable TLS 1.2 support as Microsoft Entra TLS 1.0/1.1 is deprecated - Azure (1)

Update and configure .NET Framework to support TLS 1.2

Managed Microsoft Entra integrated applications and Windows PowerShell scripts (using Microsoft Graph PowerShell and Microsoft Graph) may use .NET Framework.

Install .NET updates to enable strong cryptography

Determine the .NET version

First, determine the installed .NET versions.

  • For more information, see Determine which versions and service pack levels of .NET Framework are installed.

Install .NET updates

Install the .NET updates so that you can enable strong cryptography. Some versions of .NET Framework might have to be updated to enable strong cryptography.

Use these guidelines:

  • .NET Framework 4.6.2 and later versions support TLS 1.2 and TLS 1.1. Check the registry settings. No other changes are required.

  • Update .NET Framework 4.6 and earlier versions to support TLS 1.2 and TLS 1.1.

    For more information, see .NET Framework versions and dependencies.

  • Do you use .NET Framework 4.5.2 or 4.5.1 on Windows 8.1 or Windows Server 2012? Then the relevant updates and details are also available from Microsoft Update Catalog.

    • Also see Microsoft Security Advisory 2960358.

For any computer that communicates across the network and runs a TLS 1.2-enabled system, set the following registry DWORD values.

  • For 32-bit applications that are running on a 32-bit OS and 64-bit applications that are running on a 64-bit OS, update the following subkey values:

    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727

      • SystemDefaultTlsVersions: 00000001
      • SchUseStrongCrypto: 00000001
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319

      • SystemDefaultTlsVersions: 00000001
      • SchUseStrongCrypto: 00000001
  • For 32-bit applications that are running on 64-bit OSs, update the following subkey values:

    • HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v2.0.50727
      • SystemDefaultTlsVersions: dword:00000001
      • SchUseStrongCrypto: dword:00000001
    • HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319
      • SystemDefaultTlsVersions: dword:00000001
      • SchUseStrongCrypto: dword:00000001

For example, set these values on:

  • Configuration Manager clients
  • Remote site system roles that aren't installed on the site server
  • The site server itself

For more information, see the following articles:

  • TLS Cipher Suites supported by Microsoft Entra ID
  • How to enable TLS 1.2 on clients
  • Transport Layer Security (TLS) best practices with the .NET Framework
  • Solving the TLS 1.0 Problem - Security documentation

Overview of new telemetry in the sign-in logs

To help you identify any clients or apps that still use legacy TLS in your environment, view the Microsoft Entra sign-in logs. For clients or apps that sign in over legacy TLS, Microsoft Entra ID marks the Legacy TLS field in Additional Details with True. The Legacy TLS field only appears if the sign-in occurred over legacy TLS. If you don't see any legacy TLS in your logs, you're ready to switch to TLS 1.2.

To find the sign-in attempts that used legacy TLS protocols, an administrator can review the logs by:

  • Exporting and querying the logs in Azure Monitor.
  • Downloading the last seven days of logs in JavaScript Object Notation (JSON) format.
  • Filtering and exporting sign-in logs using PowerShell.

These methods are described below.

  • Azure Monitor
  • JSON
  • PowerShell

You can query the sign-in logs using Azure Monitor. Azure Monitor is a powerful log analysis, monitoring, and alerting tool. Use Azure Monitor for:

  • Microsoft Entra logs
  • Azure resources logs
  • Logs from independent software tools

Note

You need a Microsoft Entra ID P1 or P2 license to export reporting data to Azure Monitor.

To query for legacy TLS entries using Azure Monitor:

  1. In Integrate Microsoft Entra logs with Azure Monitor logs, follow the instructions for how to access the Microsoft Entra sign-in logs in Azure Monitor.

  2. In the query definition area, paste the following Kusto Query Language query:

    // Interactive sign-ins onlySigninLogs| where AuthenticationProcessingDetails has "Legacy TLS" and AuthenticationProcessingDetails has "True"| extend JsonAuthProcDetails = parse_json(AuthenticationProcessingDetails)| mv-apply JsonAuthProcDetails on ( where JsonAuthProcDetails.key startswith "Legacy TLS" | project HasLegacyTls=JsonAuthProcDetails.value)| where HasLegacyTls == true// Non-interactive sign-insAADNonInteractiveUserSignInLogs| where AuthenticationProcessingDetails has "Legacy TLS" and AuthenticationProcessingDetails has "True"| extend JsonAuthProcDetails = parse_json(AuthenticationProcessingDetails)| mv-apply JsonAuthProcDetails on ( where JsonAuthProcDetails.key startswith "Legacy TLS" | project HasLegacyTls=JsonAuthProcDetails.value)| where HasLegacyTls == true// Workload Identity (service principal) sign-insAADServicePrincipalSignInLogs| where AuthenticationProcessingDetails has "Legacy TLS" and AuthenticationProcessingDetails has "True"| extend JsonAuthProcDetails = parse_json(AuthenticationProcessingDetails)| mv-apply JsonAuthProcDetails on ( where JsonAuthProcDetails.key startswith "Legacy TLS" | project HasLegacyTls=JsonAuthProcDetails.value)| where HasLegacyTls == true
  3. Select Run to execute the query. The log entries that match the query appear in the Results tab below the query definition.

  4. To learn more about the source of the legacy TLS request, look for the following fields:

    • UserDisplayName
    • AppDisplayName
    • ResourceDisplayName
    • UserAgent

View details about log entries in the Microsoft Entra admin center

After you obtain the logs, you can get more details about legacy TLS-based sign-in log entries in the Microsoft Entra admin center. Follow these steps:

  1. In the Azure portal, search for and select Microsoft Entra ID.

  2. In the Overview page menu, select Sign-in logs.

  3. Select a sign-in log entry for a user.

  4. Select the Additional details tab. (If you don't see this tab, first select the ellipsis (...) in the right corner to view the full list of tabs.)

  5. Check for a Legacy TLS (TLS 1.0, 1.1, or 3DES) value that's set to True. If you see that particular field and value, the sign-in attempt was made using legacy TLS. If the sign-in attempt was made using TLS 1.2, that field doesn't appear.

For more information, see Sign-in logs in Microsoft Entra ID.

If you have questions or need help, create a support request, or ask Azure community support. You can also submit product feedback to Azure feedback community.

Enable TLS 1.2 support as Microsoft Entra TLS 1.0/1.1 is deprecated - Azure (2024)

FAQs

How do I enable TLS 1.2 in Azure? ›

Follow these steps:
  1. In the Azure portal, search for and select Microsoft Entra ID.
  2. In the Overview page menu, select Sign-in logs.
  3. Select a sign-in log entry for a user.
  4. Select the Additional details tab. ...
  5. Check for a Legacy TLS (TLS 1.0, 1.1, or 3DES) value that's set to True.
Apr 11, 2024

Why is TLS 1.0 and 1.1 deprecated? ›

Specifically, TLS 1.0 and 1.1 have flaws like weak ciphers that can be exploited to decrypt traffic. Newer protocols use improved encryption algorithms that make snooping much harder. Disabling legacy versions forces services to adopt the latest standards if they want to be accessible in future versions of Windows.

Why is TLS 1.2 deprecated? ›

One reason to change version is vulnerabilities and TLS1. 2 has a lot of vulnerabilities caused by the older cryptographic algorithms that it still supports for compatibility reasons. Also TLS1. 2 doesn't have the latest quantum secure algorithms for protection against quantum computer encryption attacks.

How do I disable TLS 1.0 and 1.1 on Azure VM? ›

Open the Azure Portal and go to API Management. Choose the API you wish to edit. Under Security, select Protocols + ciphers. Under Client protocol, check the box for each insecure version (SSLv3, TLS 1.1, and TLS 1.0), then select Disable.

How to check if TLS 1.2 is enabled? ›

In the Windows menu search box, type Internet options. Under Best match, click Internet Options. In the Internet Properties window, on the Advanced tab, scroll down to the Security section. Check the User TLS 1.2 checkbox.

How do I enable TLS in Azure function? ›

Open the Azure Portal and go to Function App. Choose the Function App you wish to edit. Under Settings, select TLS/SSL Settings.

How to turn on TLS 1.0 TLS 1.1 and TLS 1.2 in advanced settings? ›

Click the Tools icon (gear symbol) in the upper right hand corner of the browser and click Internet Options. In the Internet Options window, select the Advanced tab. In the Advanced tab, under Settings, scroll down to the Security section. In the Security section, check Use TLS 1.1 and Use TLS 1.2.

How to enable TLS 1.2 on Windows 11? ›

Step to enable TLS 1.2 in Internet Explorer Version 11
  1. Open Internet Explorer.
  2. Click on Tools menu.
  3. Select Internet options.
  4. Select the Advanced tab.
  5. Scroll down to Security category and tick the box for Use TLS 1.2.
  6. Click OK.
  7. Close your browser and restart Internet Explorer.

Has TLS 1.1 been compromised? ›

SSL v2, TLS 1.0, and TLS 1.1 are all susceptible to various security vulnerabilities that can compromise the security of communications over the internet. It is recommended to use the latest version of TLS, currently TLS 1.3, which addresses these vulnerabilities and provides better security.

How to enable TLS 1.2 on Office 365? ›

How to force your Azure AD Connect server to use only TLS v1. 2 when connecting to Microsoft 365?
  1. Step 1: Right click Windows PowerShell and select Run as administrator.
  2. Step 2: Run Connect-MsolService.
  3. Step 3: Enter the credentials to sign in to your Microsoft account.
  4. Step 4: If TLS v1. ...
  5. Step 5: Restart ADManager Plus.

How do I enable TLS 1.2 only? ›

Google Chrome
  1. From the Start Menu > Open 'Internet Options' Options > Advanced tab.
  2. Scroll down to the Security category, manually check the option box for Use TLS 1.2 and un-check the option box for Use TLS 1.1 and Use TLS 1.0.
  3. Click OK.
  4. Close your browser and restart Google Chrome.
Oct 21, 2023

Why is TLS 1.2 bad? ›

Many of the major vulnerabilities in TLS 1.2 had to do with older cryptographic algorithms that were still supported. TLS 1.3 drops support for these vulnerable cryptographic algorithms, and as a result it is less vulnerable to cyber attacks.

Where to check TLS version in Azure Portal? ›

On the "TLS/SSL settings" page select the Bindings tab, scroll down and under the "Protocol Settings" check the "Minimum TLS Version".

How do I disable TLS 1.0 and TLS 1.1 Protocols? ›

Step 1: Navigate to "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols". Create a key named "TLS 1.1" with two DWORDs for both TLS 1.0 & 1.1: "DisabledByDefault=1" & "Enabled=0".

How to disable TLS 1.0 and 1.1 in regedit? ›

Type regedit and press Enter to open Registry Editor. Right-click on the “Protocols” folder and select “New” -> “Key“. Create a new DWORD registry entry named “DisabledByDefault” and set its value to “1“. Create a new DWORD registry entry named “Enabled” and set its value to “0“.

How do I enable TLS 1.2 protocol? ›

Google Chrome
  1. From the Start Menu > Open 'Internet Options' Options > Advanced tab.
  2. Scroll down to the Security category, manually check the option box for Use TLS 1.2 and un-check the option box for Use TLS 1.1 and Use TLS 1.0.
  3. Click OK.
  4. Close your browser and restart Google Chrome.
Oct 21, 2023

How to check TLS version in Azure database? ›

In the Azure portal, go to your SQL server resource. Under the Security settings, select Networking and then choose the Connectivity tab. Select the Minimum TLS Version desired for all databases associated with the server, and select Save. It's possible to change the minimum TLS version by using Azure PowerShell.

How do I enable TLS in Azure firewall? ›

Use the following steps to configure TLS using the Azure platform.
  1. Configure the appropriate IAM role for the policy. Refer to Key Vault roles.
  2. Configure an Azure Key Vault. Learn more.
  3. Go to Policy > TLS Inspection and click Configure TLS Inspection to enter the configuration wizard.

Top Articles
ETFs with Uber Technologies (UBER) Exposure - TipRanks.com
7 SaaS Subscription Models for Your Business
Fiskars X27 Kloofbijl - 92 cm | bol
Victor Spizzirri Linkedin
Public Opinion Obituaries Chambersburg Pa
Exclusive: Baby Alien Fan Bus Leaked - Get the Inside Scoop! - Nick Lachey
Splunk Stats Count By Hour
Bashas Elearning
Stretchmark Camouflage Highland Park
OSRS Fishing Training Guide: Quick Methods To Reach Level 99 - Rune Fanatics
Merlot Aero Crew Portal
More Apt To Complain Crossword
Draconic Treatise On Mining
Syracuse Jr High Home Page
Colts seventh rotation of thin secondary raises concerns on roster evaluation
How do you like playing as an antagonist? - Goonstation Forums
Costco Gas Foster City
Char-Em Isd
Beebe Portal Athena
라이키 유출
Td Small Business Banking Login
Kamzz Llc
The Ultimate Guide to Extras Casting: Everything You Need to Know - MyCastingFile
What Are The Symptoms Of A Bad Solenoid Pack E4od?
Deshuesadero El Pulpo
2000 Ford F-150 for sale - Scottsdale, AZ - craigslist
Craigslist Dubuque Iowa Pets
Villano Antillano Desnuda
Danielle Ranslow Obituary
Craftsman Yt3000 Oil Capacity
Obsidian Guard's Skullsplitter
Grandstand 13 Fenway
ShadowCat - Forestry Mulching, Land Clearing, Bush Hog, Brush, Bobcat - farm & garden services - craigslist
Puretalkusa.com/Amac
Blackstone Launchpad Ucf
Audi Q3 | 2023 - 2024 | De Waal Autogroep
Http://N14.Ultipro.com
Cruise Ships Archives
Muma Eric Rice San Mateo
19 Best Seafood Restaurants in San Antonio - The Texas Tasty
Hingham Police Scanner Wicked Local
Wsbtv Fish And Game Report
Doordash Promo Code Generator
Worcester County Circuit Court
Sams Gas Price Sanford Fl
Penny Paws San Antonio Photos
Greatpeople.me Login Schedule
Worland Wy Directions
Smoke From Street Outlaws Net Worth
Superecchll
Estes4Me Payroll
Latest Posts
Article information

Author: Frankie Dare

Last Updated:

Views: 5763

Rating: 4.2 / 5 (73 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Frankie Dare

Birthday: 2000-01-27

Address: Suite 313 45115 Caridad Freeway, Port Barabaraville, MS 66713

Phone: +3769542039359

Job: Sales Manager

Hobby: Baton twirling, Stand-up comedy, Leather crafting, Rugby, tabletop games, Jigsaw puzzles, Air sports

Introduction: My name is Frankie Dare, I am a funny, beautiful, proud, fair, pleasant, cheerful, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.