You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/entra/entra-id/app-integration/application-using-tls-1dot0-1dot2-authentication-fail.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ Applications using an older version of the .NET Framework might encounter authen
28
28
29
29
## Cause
30
30
31
-
Starting January 31, 2022, Microsoft enforced the use of the TLS 1.2 protocol for client applications connecting to Microsoft Entra services on Microsoft Identity Platform for security and industry standards compliance reasons. For more information about this change, see [Enable support for TLS 1.2 in your environment for Microsoft Entra TLS 1.1 and 1.0 deprecation](../ad-dmn-services/enable-support-tls-environment.md) and [Act fast to secure your infrastructure by moving to TLS 1.2!](https://techcommunity.microsoft.com/blog/microsoft-entra-blog/act-fast-to-secure-your-infrastructure-by-moving-to-tls-1-2/2967457)
31
+
Starting January 31, 2022, Microsoft enforced the use of the TLS 1.2 protocol for client applications connecting to Microsoft Entra services on Microsoft Identity Platform, to ensure security and industry standards compliance. For more information about this change, see [Enable support for TLS 1.2 in your environment for Microsoft Entra TLS 1.1 and 1.0 deprecation](../ad-dmn-services/enable-support-tls-environment.md) and [Act fast to secure your infrastructure by moving to TLS 1.2!](https://techcommunity.microsoft.com/blog/microsoft-entra-blog/act-fast-to-secure-your-infrastructure-by-moving-to-tls-1-2/2967457)
32
32
33
33
Applications running on older platforms or using older .NET Framework versions might not have TLS 1.2 enabled, therefore they fail to retrieve the OpenID Connect metadata document resulting in failed authentication.
## Solution 3: Change web.config to enable TLS 1.2
54
54
55
-
If .NET 4.7.2 is available, you can enable TLS 1.2 through adding the following configuration in the **web.config** file:
55
+
If .NET Framework 4.7.2 is available, you can enable TLS 1.2 through adding the following configuration in the **web.config** file:
56
56
57
57
```json
58
58
<system.web>
@@ -61,11 +61,11 @@ If .NET 4.7.2 is available, you can enable TLS 1.2 through adding the following
61
61
```
62
62
63
63
> [!NOTE]
64
-
> If using the 4.7.2 runtime causes breaking changes to your app, this solution might not work.
64
+
> If using .NET Framework 4.7.2 causes breaking changes to your app, this solution might not work.
65
65
66
66
## Solution 4: Enable TLS 1.2 for running PowerShell commands
67
67
68
-
If you encounter the AADSTS1002016 error while running PowerShell commands (Connect-MSolService, Connect-AzureAD, or Connect-MSGraph) from the Microsoft Intune PowerShell SDK module, set the security protocol to TLS 1.2 before executing the commands:
68
+
If you encounter the AADSTS1002016 error while running PowerShell command `Connect-MSolService`, `Connect-AzureAD`, or `Connect-MSGraph` (from the Microsoft Intune PowerShell SDK module), set the security protocol to TLS 1.2 before executing the commands:
0 commit comments