Skip to content

Commit 0ae5282

Browse files
committed
Availability test TLS support
1 parent 42c6498 commit 0ae5282

File tree

1 file changed

+19
-19
lines changed

1 file changed

+19
-19
lines changed

articles/azure-monitor/app/availability-overview.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ There are four types of availability tests:
2323
* [Standard test](availability-standard-tests.md): This single request test is similar to the URL ping test. It includes TLS/SSL certificate validity, proactive lifetime check, HTTP request verb (for example, `GET`, `HEAD`, or `POST`), custom headers, and custom data associated with your HTTP request.
2424
* [Custom TrackAvailability test](availability-azure-functions.md): If you decide to create a custom application to run availability tests, you can use the [TrackAvailability()](/dotnet/api/microsoft.applicationinsights.telemetryclient.trackavailability) method to send the results to Application Insights.
2525
* Classic tests (**older versions of availability tests**)
26-
* [URL ping test](monitor-web-app-availability.md): You can create this test through the Azure portal to validate whether an endpoint is responding and measure performance associated with that response. You can also set custom success criteria coupled with more advanced features, like parsing dependent requests and allowing for retries.
26+
* [URL ping test (deprecated)](monitor-web-app-availability.md): You can create this test through the Azure portal to validate whether an endpoint is responding and measure performance associated with that response. You can also set custom success criteria coupled with more advanced features, like parsing dependent requests and allowing for retries.
2727
* [Multi-step web test (deprecated)](availability-multistep.md): You can play back this recording of a sequence of web requests to test more complex scenarios. Multi-step web tests are created in Visual Studio Enterprise and uploaded to the portal, where you can run them.
2828

2929
> [!IMPORTANT]
@@ -34,19 +34,19 @@ You can create up to 100 availability tests per Application Insights resource.
3434
> [!NOTE]
3535
> Availability tests are stored encrypted, according to [Azure data encryption at rest](../../security/fundamentals/encryption-atrest.md#encryption-at-rest-in-microsoft-cloud-services) policies.
3636
37-
## Availability Test TLS Support
37+
## Availability test TLS support
3838
To provide best-in-class encryption, Availability Tests uses Transport Layer Security (TLS) 1.2 or higher as the encryption mechanism of choice.
3939

4040
> [!WARNING]
41-
> On 31 October 2024, in alignment with the [Azure wide legacy TLS deprecation](https://azure.microsoft.com/updates/azure-support-tls-will-end-by-31-october-2024-2/) TLS 1.0/1.1 protocol versions and TLS 1.2/1.3 legacy Cipher Suites and Elliptical Curves will be retired for Application Insights Availability Tests.
41+
> On 31 October 2024, in alignment with the [Azure wide legacy TLS deprecation](https://azure.microsoft.com/updates/azure-support-tls-will-end-by-31-october-2024-2/) TLS 1.0/1.1 protocol versions and TLS 1.2/1.3 legacy Cipher suites and Elliptical curves will be retired for Application Insights Availability Tests.
4242
43-
### Supported TLS Configurations
44-
TLS protocol versions 1.2 and 1.3 are supported encryption mechanisms for Availability Tests. In addition, the following Cipher Suites and Elliptical Curves are also supported within each version.
43+
### Supported TLS configurations
44+
TLS protocol versions 1.2 and 1.3 are supported encryption mechanisms for Availability Tests. In addition, the following Cipher suites and Elliptical curves are also supported within each version.
4545
> [!NOTE]
4646
> TLS 1.3 is currently only available in these Availability Test regions: NorthCentralUS, CentralUS, EastUS, SouthCentralUS, WestUS
4747
4848
#### TLS 1.2
49-
**Cipher Suites**
49+
**Cipher suites**
5050
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
5151
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
5252
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
@@ -56,52 +56,52 @@ TLS protocol versions 1.2 and 1.3 are supported encryption mechanisms for Availa
5656
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
5757
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
5858

59-
**Elliptical Curves**
59+
**Elliptical curves**
6060
- NistP384
6161
- NistP256
6262

6363
#### TLS 1.3
64-
**Cipher Suites**
64+
**Cipher suites**
6565
- TLS_AES_256_GCM_SHA384
6666
- TLS_AES_128_GCM_SHA256
6767

68-
**Elliptical Curves:**
68+
**Elliptical curves:**
6969
- NistP384
7070
- NistP256
7171

72-
### Deprecating TLS Configuration
72+
### Deprecating TLS configuration
7373
> [!WARNING]
74-
> After 31 October 2024, protocol versions TLS 1.0 and 1.1 support will be completely removed. In addition, the following Cipher Suites and Elliptical Curves will be retired.
74+
> After 31 October 2024, protocol versions TLS 1.0 and 1.1 support will be completely removed. In addition, the following Cipher suites and Elliptical curves will be retired.
7575
7676
#### TLS 1.0
77-
**Cipher Suites**
77+
**Cipher suites**
7878
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
7979
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
8080
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
8181
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
8282
- TLS_RSA_WITH_AES_256_CBC_SHA
8383
- TLS_RSA_WITH_AES_128_CBC_SHA
8484

85-
**Elliptical Curves**
85+
**Elliptical curves**
8686
- curve25519
8787

8888
#### TLS 1.1
89-
**Cipher Suites:**
89+
**Cipher suites:**
9090
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
9191
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
9292
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
9393
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
9494
- TLS_RSA_WITH_AES_256_CBC_SHA
9595
- TLS_RSA_WITH_AES_128_CBC_SHA
9696

97-
**Elliptical Curves**
97+
**Elliptical curves**
9898
- curve25519
9999

100100
> [!NOTE]
101-
> After 31 October 2024, only the listed Cipher Suites and Elliptical Curves within these TLS 1.2 and TLS 1.3 will be retired.
101+
> After 31 October 2024, only the listed Cipher suites and Elliptical curves within these TLS 1.2 and TLS 1.3 will be retired.
102102
103103
#### TLS 1.2
104-
**Cipher Suites**
104+
**Cipher suites**
105105
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
106106
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
107107
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
@@ -113,11 +113,11 @@ TLS protocol versions 1.2 and 1.3 are supported encryption mechanisms for Availa
113113
- TLS_RSA_WITH_AES_256_CBC_SHA
114114
- TLS_RSA_WITH_AES_128_CBC_SHA
115115

116-
**Elliptical Curves:**
116+
**Elliptical curves:**
117117
- curve25519
118118

119119
#### TLS 1.3
120-
**Elliptical Curves**
120+
**Elliptical curves**
121121
- curve25519
122122

123123
## Frequently asked questions

0 commit comments

Comments
 (0)