Skip to content

Commit 05fe063

Browse files
Merge pull request #284467 from xboxeer/patch-35
Update concepts-networking.md
2 parents 03527f9 + 0008233 commit 05fe063

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

articles/mysql/flexible-server/concepts-networking.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,16 +71,20 @@ Azure Database for MySQL flexible server supports encrypted connections using Tr
7171

7272
Following are the different configurations of SSL and TLS settings you can have for your flexible server:
7373

74+
>[!IMPORTANT]
75+
>Starting in early September 2024, new servers will no longer be permitted to use TLS 1.0 or 1.1, and existing servers will not be allowed to downgrade to these versions. Beginning mid-September 2024, we will initiate a mandatory upgrade of all servers currently using TLS 1.0 or 1.1 to TLS 1.2. This upgrade process is expected to be completed by the end of September 2024. We strongly recommend that customers ensure their applications are fully compatible with TLS 1.2 before the end of September.
76+
7477
| Scenario | Server parameter settings | Description |
7578
| --- | --- | --- |
7679
| Disable SSL (encrypted connections) | require_secure_transport = OFF | If your legacy application doesn't support encrypted connections to the Azure Database for MySQL flexible server instance, you can disable enforcement of encrypted connections to your flexible server by setting require_secure_transport=OFF. |
77-
| Enforce SSL with TLS version < 1.2 | require_secure_transport = ON and tls_version = TLS 1.0 or TLS 1.1 | If your legacy application supports encrypted connections but requires TLS version < 1.2, you can enable encrypted connections, but configure your flexible server to allow connections with the TLS version (v1.0 or v1.1) supported by your application |
80+
| Enforce SSL with TLS version < 1.2 (Will be deprecated in September 2024) | require_secure_transport = ON and tls_version = TLS 1.0 or TLS 1.1 | If your legacy application supports encrypted connections but requires TLS version < 1.2, you can enable encrypted connections, but configure your flexible server to allow connections with the TLS version (v1.0 or v1.1) supported by your application |
7881
| Enforce SSL with TLS version = 1.2(Default configuration) | require_secure_transport = ON and tls_version = TLS 1.2 | This is the recommended and default configuration for a flexible server. |
7982
| Enforce SSL with TLS version = 1.3(Supported with MySQL v8.0 and above) | require_secure_transport = ON and tls_version = TLS 1.3 | This is useful and recommended for new applications development |
8083

8184
> [!NOTE]
8285
> Changes to SSL Cipher on the flexible server is not supported. FIPS cipher suites is enforced by default when tls_version is set to TLS version 1.2. For TLS versions other than version 1.2, SSL Cipher is set to default settings which comes with MySQL community installation.
8386
87+
8488
Review how to [connect using SSL/TLS](how-to-connect-tls-ssl.md) to learn more.
8589

8690
## Next steps

0 commit comments

Comments
 (0)