Skip to content

Commit a0f38e3

Browse files
authored
update
1 parent 4cf5878 commit a0f38e3

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

support/entra/entra-id/app-integration/application-using-tls-1dot0-1dot2-authentication-fail.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Applications using an older version of the .NET Framework might encounter authen
2828
2929
## Cause
3030

31-
Starting January 31, 2022, Microsoft enforced the use of the TLS 1.2 protocol for client applications connecting to Microsoft Entra services on Microsoft Identity Platform for security and industry standards compliance reasons. For more information about this change, see [Enable support for TLS 1.2 in your environment for Microsoft Entra TLS 1.1 and 1.0 deprecation](../ad-dmn-services/enable-support-tls-environment.md) and [Act fast to secure your infrastructure by moving to TLS 1.2!](https://techcommunity.microsoft.com/blog/microsoft-entra-blog/act-fast-to-secure-your-infrastructure-by-moving-to-tls-1-2/2967457)
31+
Starting January 31, 2022, Microsoft enforced the use of the TLS 1.2 protocol for client applications connecting to Microsoft Entra services on Microsoft Identity Platform, to ensure security and industry standards compliance. For more information about this change, see [Enable support for TLS 1.2 in your environment for Microsoft Entra TLS 1.1 and 1.0 deprecation](../ad-dmn-services/enable-support-tls-environment.md) and [Act fast to secure your infrastructure by moving to TLS 1.2!](https://techcommunity.microsoft.com/blog/microsoft-entra-blog/act-fast-to-secure-your-infrastructure-by-moving-to-tls-1-2/2967457)
3232

3333
Applications running on older platforms or using older .NET Framework versions might not have TLS 1.2 enabled, therefore they fail to retrieve the OpenID Connect metadata document resulting in failed authentication.
3434

@@ -52,7 +52,7 @@ ServicePointManager.SecurityProtocol = SecurityProtocolType.Tls12 | SecurityProt
5252

5353
## Solution 3: Change web.config to enable TLS 1.2
5454

55-
If .NET 4.7.2 is available, you can enable TLS 1.2 through adding the following configuration in the **web.config** file:
55+
If .NET Framework 4.7.2 is available, you can enable TLS 1.2 through adding the following configuration in the **web.config** file:
5656

5757
```json
5858
<system.web>
@@ -61,11 +61,11 @@ If .NET 4.7.2 is available, you can enable TLS 1.2 through adding the following
6161
```
6262

6363
> [!NOTE]
64-
> If using the 4.7.2 runtime causes breaking changes to your app, this solution might not work.
64+
> If using .NET Framework 4.7.2 causes breaking changes to your app, this solution might not work.
6565
6666
## Solution 4: Enable TLS 1.2 for running PowerShell commands
6767

68-
If you encounter the AADSTS1002016 error while running PowerShell commands (Connect-MSolService, Connect-AzureAD, or Connect-MSGraph) from the Microsoft Intune PowerShell SDK module, set the security protocol to TLS 1.2 before executing the commands:
68+
If you encounter the AADSTS1002016 error while running PowerShell command `Connect-MSolService`, `Connect-AzureAD`, or `Connect-MSGraph` (from the Microsoft Intune PowerShell SDK module), set the security protocol to TLS 1.2 before executing the commands:
6969

7070
```powershell
7171
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12

0 commit comments

Comments
 (0)