You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/entra/entra-id/app-integration/application-using-tls-1dot0-1dot2-authentication-fail.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,9 @@
1
1
---
2
-
title: Microsoft Entra applications using TLS 1.0/1.1 fail to authenticate
2
+
title: Microsoft Entra Applications Using TLS 1.0/1.1 Fail to Authenticate
3
3
description: Provides solutions to authentication errors that occur with Microsoft Entra applications using TLS version 1.0 or 1.1.
4
4
ms.reviewer: bachoang, v-weizhu
5
5
ms.service: entra-id
6
-
ms.date: 04/28/2025
6
+
ms.date: 05/09/2025
7
7
ms.custom: sap:Developing or Registering apps with Microsoft identity platform
8
8
---
9
9
# Microsoft Entra applications using TLS 1.0/1.1 fail to authenticate
@@ -28,17 +28,17 @@ Applications using an older version of the .NET Framework might encounter authen
28
28
29
29
## Cause
30
30
31
-
Starting January 31, 2022, Microsoft enforced the use of the TLS 1.2 protocol for client applications connecting to Microsoft Entra services on Microsoft Identity Platform, to ensure security and industry standards compliance. For more information about this change, see [Enable support for TLS 1.2 in your environment for Microsoft Entra TLS 1.1 and 1.0 deprecation](../ad-dmn-services/enable-support-tls-environment.md) and [Act fast to secure your infrastructure by moving to TLS 1.2!](https://techcommunity.microsoft.com/blog/microsoft-entra-blog/act-fast-to-secure-your-infrastructure-by-moving-to-tls-1-2/2967457)
31
+
Starting January 31, 2022, Microsoft enforced the use of the TLS 1.2 protocol for client applications connecting to Microsoft Entra services on the Microsoft Identity Platform to ensure compliance with security and industry standards. For more information about this change, see [Enable support for TLS 1.2 in your environment for Microsoft Entra TLS 1.1 and 1.0 deprecation](../ad-dmn-services/enable-support-tls-environment.md) and [Act fast to secure your infrastructure by moving to TLS 1.2!](https://techcommunity.microsoft.com/blog/microsoft-entra-blog/act-fast-to-secure-your-infrastructure-by-moving-to-tls-1-2/2967457)
32
32
33
-
Applications running on older platforms or using older .NET Framework versions might not have TLS 1.2 enabled, therefore they fail to retrieve the OpenID Connect metadata document resulting in failed authentication.
33
+
Applications running on older platforms or using older .NET Framework versions might not have TLS 1.2 enabled. Therefore, they can't retrieve the OpenID Connect metadata document, resulting in failed authentication.
34
34
35
35
## Solution 1: Upgrade the .NET Framework
36
36
37
-
Upgrade the application to use .NET Framework 4.7 or later where TLS 1.2 is enabled by default.
37
+
Upgrade the application to use .NET Framework 4.7 or later, where TLS 1.2 is enabled by default.
38
38
39
39
## Solution 2: Enable TLS 1.2 programmatically
40
40
41
-
If upgrading the .NET Framework is not feasible, you can enable TLS 1.2 through adding the following code in the **Global.asax.cs** file in your application:
41
+
If upgrading the .NET Framework isn't feasible, you can enable TLS 1.2 by adding the following code to the **Global.asax.cs** file in your application:
## Solution 3: Change web.config to enable TLS 1.2
54
54
55
-
If .NET Framework 4.7.2 is available, you can enable TLS 1.2 through adding the following configuration in the **web.config** file:
55
+
If .NET Framework 4.7.2 is available, you can enable TLS 1.2 by adding the following configuration to the **web.config** file:
56
56
57
57
```json
58
58
<system.web>
@@ -63,14 +63,14 @@ If .NET Framework 4.7.2 is available, you can enable TLS 1.2 through adding the
63
63
> [!NOTE]
64
64
> If using .NET Framework 4.7.2 causes breaking changes to your app, this solution might not work.
65
65
66
-
## Solution 4: Enable TLS 1.2 for running PowerShell commands
66
+
## Solution 4: Enable TLS 1.2 before running PowerShell commands
67
67
68
-
If you encounter the AADSTS1002016 error while running PowerShell command `Connect-MSolService`, `Connect-AzureAD`, or `Connect-MSGraph` (from the Microsoft Intune PowerShell SDK module), set the security protocol to TLS 1.2 before executing the commands:
68
+
If you encounter the AADSTS1002016 error while running the PowerShell command `Connect-MSolService`, `Connect-AzureAD`, or `Connect-MSGraph` (from the Microsoft Intune PowerShell SDK module), set the security protocol to TLS 1.2 before executing the commands:
0 commit comments