Skip to content

Commit 002b0a5

Browse files
author
gitName
committed
edits
1 parent 1a6b7c3 commit 002b0a5

File tree

1 file changed

+12
-10
lines changed

1 file changed

+12
-10
lines changed

articles/api-management/api-management-howto-manage-protocols-ciphers.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: how-to
9-
ms.date: 08/01/2025
9+
ms.date: 08/04/2025
1010
ms.author: danlep
1111
---
1212

@@ -15,12 +15,13 @@ ms.author: danlep
1515
[!INCLUDE [api-management-availability-all-tiers](../../includes/api-management-availability-all-tiers.md)]
1616

1717
Azure API Management supports multiple versions of Transport Layer Security (TLS) protocol to secure API traffic for:
18+
1819
* Client side (client to API Management gateway)
1920
* Backend side (API Management gateway to backend)
2021

2122
API Management also supports multiple cipher suites used by the API gateway.
2223

23-
Depending on the service tier, API Management supports TLS 1.2 or TLS 1.3 by default for client and backend connectivity and several supported cipher suites. This guide shows you how to manage protocols and ciphers configuration for an Azure API Management instance.
24+
Depending on the service tier, API Management supports TLS versions up to 1.2 or TLS 1.3 for client and backend connectivity and several supported cipher suites. This guide shows you how to manage protocols and ciphers configuration for an Azure API Management instance.
2425

2526
:::image type="content" source="media/api-management-howto-manage-protocols-ciphers/api-management-protocols-ciphers.png" alt-text="Screenshot of managing protocols and ciphers in the Azure portal.":::
2627

@@ -41,7 +42,7 @@ Depending on the service tier, API Management supports TLS 1.2 or TLS 1.3 by def
4142
1. Enable or disable desired protocols or ciphers.
4243
1. Select **Save**.
4344

44-
Changes can take some time to apply. An instance in the Developer service tier has downtime during the process. Instances in the Basic and higher tiers don't have downtime during the process.
45+
Changes can take 15 to 45 minutes or longer to apply. An instance in the Developer service tier has downtime during the process. Instances in the Basic and higher tiers don't have downtime during the process.
4546

4647
> [!NOTE]
4748
> Some protocols or cipher suites (such as backend-side TLS 1.2) can't be enabled or disabled from the Azure portal. Instead, you'll need to apply the REST API call. Use the `properties.customProperties` structure in the [Create/Update API Management Service](/rest/api/apimanagement/current-ga/api-management-service/create-or-update) REST API.
@@ -53,19 +54,20 @@ Changes can take some time to apply. An instance in the Developer service tier h
5354
5455
1. In v1/Consumption tiers, is TLS 1.2 also enabled by default, or is it only TLS 1.3?
5556
2. Is TLS 1.3 supported in v2 tiers for client-side and backend-side connections?
56-
3. What ciphers are supported in TLS 1.3?
57+
3. What ciphers are supported in TLS 1.3? Any user configuration possible?
5758
4. Can TLS 1.3 be enabled/disabled via REST API
58-
5. On backend side, is TLS 1.2 also enabled by default? -->
59+
5. On backend side, is TLS 1.2 also enabled by default?
60+
6. Is TLS 1.3 also supported in workspace gateways? -->
5961

60-
TLS 1.3 support is available in the API Management **Consumption**, **Developer**, **Basic**, **Standard**, and **Premium** service tiers. TLS 1.3 is enabled by default for client-side connections in most instances created in these service tiers. Enabling backend-side TLS 1.3 is optional.
62+
TLS 1.3 support is available in the API Management **Consumption**, **Developer**, **Basic**, **Standard**, and **Premium** service tiers. In most instances created in those service tiers, TLS 1.3 is enabled by default for client-side connections. Enabling backend-side TLS 1.3 is optional.
6163

6264
TLS 1.3 is a major revision of the TLS protocol that provides improved security and performance. It includes features such as reduced handshake latency and improved security against certain types of attacks.
6365

6466
### Optionally enable TLS 1.3 when clients require certificate renegotiation
6567

66-
TLS-compliant clients that require certificate renegotiation are not compatible with TLS 1.3. If your API Management service is detected to have received TLS connections that require certificate renegotiation, enabling client-side TLS 1.3 in your instance is *optional*.
68+
If your API Management service is detected to have received TLS connections that require certificate renegotiation, enabling client-side TLS 1.3 in your instance is *optional*. TLS-compliant clients that require certificate renegotiation are not compatible with TLS 1.3.
6769

68-
You can review the recent connections that required certificate renegotiation in the **Protocols + ciphers** page and decide whether to enable TLS 1.3 for client-side connections:
70+
You can review the recent connections that required certificate renegotiation page and choose whether to enable TLS 1.3 for client-side connections:
6971

7072
1. On the **Protocols + ciphers** page, in the **Client protocol** section, next to **TLS 1.3**, select **View and manage configuration**.
7173
1. Review the list of **Recent client certificate renegotiations**. The list shows API operations where clients recently used client certificate renegotiation.
@@ -74,8 +76,8 @@ You can review the recent connections that required certificate renegotiation in
7476

7577
> [!WARNING]
7678
> * If your APIs are accessed by TLS-compliant clients that rely on certificate renegotiation, enabling TLS 1.3 for client-side connections will cause those clients to fail to connect.
77-
> * We recommend carefully monitoring the **Recent client certificate renegotiations** list before enabling TLS 1.3 for client-side connections.
78-
> * After enabling TLS 1.3, review gateway request metrics or TLS-related exceptions in Application Insights. If necessary, you can disable TLS 1.3 for client-side connections and downgrade to TLS 1.2
79+
> * We recommend carefully monitoring the **Recent client certificate renegotiations** list both before and after enabling TLS 1.3 for client-side connections.
80+
> * After enabling TLS 1.3, review gateway request metrics or TLS-related exceptions in Application Insights that indicate TLS connection failures. If necessary, disable TLS 1.3 for client-side connections and downgrade to TLS 1.2.
7981
8082
### Optionally disable TLS 1.3
8183

0 commit comments

Comments
 (0)