Skip to content

Commit 5aab506

Browse files
authored
Updates from editor
1 parent 747ed57 commit 5aab506

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

support/entra/entra-id/app-integration/application-using-tls-1dot0-1dot2-authentication-fail.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
2-
title: Microsoft Entra applications using TLS 1.0/1.1 fail to authenticate
2+
title: Microsoft Entra Applications Using TLS 1.0/1.1 Fail to Authenticate
33
description: Provides solutions to authentication errors that occur with Microsoft Entra applications using TLS version 1.0 or 1.1.
44
ms.reviewer: bachoang, v-weizhu
55
ms.service: entra-id
6-
ms.date: 04/28/2025
6+
ms.date: 05/09/2025
77
ms.custom: sap:Developing or Registering apps with Microsoft identity platform
88
---
99
# Microsoft Entra applications using TLS 1.0/1.1 fail to authenticate
@@ -28,17 +28,17 @@ Applications using an older version of the .NET Framework might encounter authen
2828
2929
## Cause
3030

31-
Starting January 31, 2022, Microsoft enforced the use of the TLS 1.2 protocol for client applications connecting to Microsoft Entra services on Microsoft Identity Platform, to ensure security and industry standards compliance. For more information about this change, see [Enable support for TLS 1.2 in your environment for Microsoft Entra TLS 1.1 and 1.0 deprecation](../ad-dmn-services/enable-support-tls-environment.md) and [Act fast to secure your infrastructure by moving to TLS 1.2!](https://techcommunity.microsoft.com/blog/microsoft-entra-blog/act-fast-to-secure-your-infrastructure-by-moving-to-tls-1-2/2967457)
31+
Starting January 31, 2022, Microsoft enforced the use of the TLS 1.2 protocol for client applications connecting to Microsoft Entra services on the Microsoft Identity Platform to ensure compliance with security and industry standards. For more information about this change, see [Enable support for TLS 1.2 in your environment for Microsoft Entra TLS 1.1 and 1.0 deprecation](../ad-dmn-services/enable-support-tls-environment.md) and [Act fast to secure your infrastructure by moving to TLS 1.2!](https://techcommunity.microsoft.com/blog/microsoft-entra-blog/act-fast-to-secure-your-infrastructure-by-moving-to-tls-1-2/2967457)
3232

33-
Applications running on older platforms or using older .NET Framework versions might not have TLS 1.2 enabled, therefore they fail to retrieve the OpenID Connect metadata document resulting in failed authentication.
33+
Applications running on older platforms or using older .NET Framework versions might not have TLS 1.2 enabled. Therefore, they can't retrieve the OpenID Connect metadata document, resulting in failed authentication.
3434

3535
## Solution 1: Upgrade the .NET Framework
3636

37-
Upgrade the application to use .NET Framework 4.7 or later where TLS 1.2 is enabled by default.
37+
Upgrade the application to use .NET Framework 4.7 or later, where TLS 1.2 is enabled by default.
3838

3939
## Solution 2: Enable TLS 1.2 programmatically
4040

41-
If upgrading the .NET Framework is not feasible, you can enable TLS 1.2 through adding the following code in the **Global.asax.cs** file in your application:
41+
If upgrading the .NET Framework isn't feasible, you can enable TLS 1.2 by adding the following code to the **Global.asax.cs** file in your application:
4242

4343
```csharp
4444
using System.Net;
@@ -52,7 +52,7 @@ ServicePointManager.SecurityProtocol = SecurityProtocolType.Tls12 | SecurityProt
5252

5353
## Solution 3: Change web.config to enable TLS 1.2
5454

55-
If .NET Framework 4.7.2 is available, you can enable TLS 1.2 through adding the following configuration in the **web.config** file:
55+
If .NET Framework 4.7.2 is available, you can enable TLS 1.2 by adding the following configuration to the **web.config** file:
5656

5757
```json
5858
<system.web>
@@ -63,14 +63,14 @@ If .NET Framework 4.7.2 is available, you can enable TLS 1.2 through adding the
6363
> [!NOTE]
6464
> If using .NET Framework 4.7.2 causes breaking changes to your app, this solution might not work.
6565
66-
## Solution 4: Enable TLS 1.2 for running PowerShell commands
66+
## Solution 4: Enable TLS 1.2 before running PowerShell commands
6767

68-
If you encounter the AADSTS1002016 error while running PowerShell command `Connect-MSolService`, `Connect-AzureAD`, or `Connect-MSGraph` (from the Microsoft Intune PowerShell SDK module), set the security protocol to TLS 1.2 before executing the commands:
68+
If you encounter the AADSTS1002016 error while running the PowerShell command `Connect-MSolService`, `Connect-AzureAD`, or `Connect-MSGraph` (from the Microsoft Intune PowerShell SDK module), set the security protocol to TLS 1.2 before executing the commands:
6969

7070
```powershell
7171
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
7272
```
7373

7474
## References
7575

76-
[Transport Layer Security (TLS) best practices with .NET Framework](/dotnet/framework/network-programming/tls)
76+
[Transport Layer Security (TLS) best practices with .NET Framework](/dotnet/framework/network-programming/tls)

0 commit comments

Comments
 (0)