Skip to content

Commit 0df0b0e

Browse files
authored
Merge pull request #296398 from halkazwini/afd-cipher
Custom TLS policy - cipher suites
2 parents 866d4ac + dd4edbe commit 0df0b0e

File tree

6 files changed

+153
-0
lines changed

6 files changed

+153
-0
lines changed

articles/frontdoor/TOC.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -193,6 +193,12 @@
193193
href: front-door-ddos.md
194194
- name: End-to-end TLS encryption
195195
href: end-to-end-tls.md
196+
- name: TLS policy
197+
items:
198+
- name: Overview
199+
href: standard-premium/tls-policy.md
200+
- name: Configure TLS policy
201+
href: standard-premium/tls-policy-configure.md
196202
- name: Set up managed identity
197203
href: managed-identity.md
198204
- name: Sensitive data protection
86.2 KB
Loading
47.5 KB
Loading
52.6 KB
Loading
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
---
2+
title: Configure Azure Front Door TLS policy (preview)
3+
description: Learn how you can configure TLS policy to meet security requirements for your Front Door custom domains.
4+
author: halkazwini
5+
ms.author: halkazwini
6+
ms.service: azure-frontdoor
7+
ms.topic: how-to
8+
ms.date: 03/26/2025
9+
---
10+
11+
# Configure TLS policy on a Front Door custom domain (preview)
12+
13+
> [!IMPORTANT]
14+
> TLS policy is currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
15+
16+
Azure Front Door Standard and Premium offer two mechanisms for controlling TLS policy. You can use either a predefined policy or a custom policy per your own needs. If you use Azure Front Door (classic) and Microsoft CDN (classic), you'll continue to use the minimum TLS 1.2 version.
17+
18+
- Azure Front Door offers several predefined TLS policies. You can configure your AFD with any of these policies to get the appropriate level of security. These predefined policies are configured keeping in mind the best practices and recommendations from the Microsoft Security team. We recommend that you use the newest TLS policies to ensure the best TLS security.
19+
20+
- If a TLS policy needs to be configured for your own business and security requirements, you can use a Custom TLS policy. With a custom TLS policy, you have complete control over the minimum TLS protocol version to support, and the supported cipher suites.
21+
22+
In this article, you learn how to configure TLS policy on a Front Door custom domain.
23+
24+
## Prerequisites
25+
26+
- A Front Door. For more information, see [Quickstart: Create a Front Door using the Azure portal](/azure/frontdoor/quickstart-create-front-door).
27+
28+
- A custom domain. If you don't have a custom domain, you must first purchase one with a domain provider. For more information, see [Buy a custom domain name](/azure/app-service/manage-custom-dns-buy-domain).
29+
30+
- If you're using Azure to host your [DNS domains](/azure/dns/dns-overview), you must delegate the domain provider's domain name system (DNS) to an Azure DNS. For more information, see [Delegate a domain to Azure DNS](/azure/dns/dns-delegate-domain-azure-dns). Otherwise, if you're using a domain provider to handle your DNS domain, see [Create a CNAME DNS record](/azure/frontdoor/front-door-custom-domain).
31+
32+
## Configure TLS policy
33+
34+
1. Go to your Azure Front Door profile that you want to configure the TLS policy for.
35+
36+
1. Under **Settings**, select **Domains** . Then select **+** **Add** to add a new domain.
37+
38+
1. On the **Add a domain** page, follow the instructions in [Configure a custom domain on Azure Front Door](/azure/frontdoor/standard-premium/how-to-add-custom-domain) and [Configure HTTPS on an Azure Front Door custom domain](/azure/frontdoor/standard-premium/how-to-configure-https-custom-domain) to configure the domain.
39+
40+
1. For **TLS policy**, select the predefined policy from the dropdown list or **Custom** to customize the cipher suites per your needs.
41+
42+
:::image type="content" source="../media/tls-policy-configure/tls-policy.png" alt-text="Screenshot that shows the TLS policy option in Add a domain page." lightbox="../media/tls-policy-configure/tls-policy.png":::
43+
44+
You can view the supported cipher suites by selecting **View policy details**.
45+
46+
:::image type="content" source="../media/tls-policy-configure/tls-policy-details.png" alt-text="Screenshot that shows the TLS policy details." lightbox="../media/tls-policy-configure/tls-policy-details.png":::
47+
48+
When you select **Custom**, you can choose the Minimum TLS version and the corresponding cipher suites by selecting **Select cipher suites**.
49+
50+
:::image type="content" source="../media/tls-policy-configure/tls-policy-customize.png" alt-text="Screenshot that shows how to customize your TLS policy." lightbox="../media/tls-policy-configure/tls-policy-customize.png":::
51+
52+
> [!NOTE]
53+
> You can reuse the custom TLS policy setting from other domains in the portal by selecting the domain in **Reuse setting from other domain**.
54+
55+
1. Select **Add** to add the domain.
56+
57+
## Verify TLS policy configurations
58+
59+
View the supported cipher suite of your domain via [www.ssllabs.com/ssltest](https://www.ssllabs.com/ssltest/) or use the sslscan tool.
60+
61+
## Related content
62+
63+
- [Azure Front Door TLS Policy (preview)](tls-policy.md)
64+
- [Add a custom domain on Azure Front Door](how-to-add-custom-domain.md)
65+
- [Configure HTTPS for your custom domain on Azure Front Door](how-to-configure-https-custom-domain.md)
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
title: Azure Front Door TLS policy (preview)
3+
description: Learn how custom TLS policies help you meet security requirements for your Azure Front Door custom domains.
4+
author: halkazwini
5+
ms.author: halkazwini
6+
ms.service: azure-frontdoor
7+
ms.topic: concept-article
8+
ms.date: 03/26/2025
9+
---
10+
11+
# Azure Front Door TLS policy (preview)
12+
13+
> [!IMPORTANT]
14+
> TLS policy is currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
15+
16+
Azure Front Door supports [end-to-end TLS encryption](../end-to-end-tls.md). When you add a custom domain to Azure Front Door, HTTPS is required, and you need to define a TLS policy which includes control of the TLS protocol version and the cipher suites during a TLS handshake.
17+
18+
Azure Front Door supports two versions of the TLS protocol: TLS versions 1.2 and 1.3. Currently, Azure Front Door doesn't support client/mutual authentication (mTLS).
19+
20+
> [!NOTE]
21+
> As of March 1, 2025, TLS 1.0 and 1.1 are disallowed on Azure Front Door. If you didn't disable TLS 1.0 and 1.1 on legacy settings before this date, they'll still work temporarily but will be disabled in April 2025.
22+
23+
Azure Front Door Standard and Premium offer two mechanisms for controlling TLS policy. You can use either a predefined policy or a custom policy per your own needs. If you use Azure Front Door (classic) and Microsoft CDN (classic), you'll continue to use the minimum TLS 1.2 version.
24+
25+
- Azure Front Door offers several predefined TLS policies. You can configure your AFD with any of these policies to get the appropriate level of security. These predefined policies are configured keeping in mind the best practices and recommendations from the Microsoft Security team. We recommend that you use the newest TLS policies to ensure the best TLS security.
26+
- If a TLS policy needs to be configured for your own business and security requirements, you can use a Custom TLS policy. With a custom TLS policy, you have complete control over the minimum TLS protocol version to support, and the supported cipher suites.
27+
28+
For a minimum TLS version 1.2, the negotiation will attempt to establish TLS 1.3 and then TLS 1.2. The client must support at least one of the supported ciphers to establish an HTTPS connection with Azure Front Door. Azure Front Door chooses a cipher in the listed order from the client-supported ciphers.
29+
30+
When Azure Front Door initiates TLS traffic to the origin, it will attempt to negotiate the best TLS version that the origin can reliably and consistently accept. Supported TLS versions for origin connections are TLS 1.2, and TLS 1.3.
31+
32+
> [!NOTE]
33+
> Clients with TLS 1.3 enabled are required to support one of the Microsoft SDL compliant EC Curves, including Secp384r1, Secp256r1, and Secp521, in order to successfully make requests with Azure Front Door using TLS 1.3. It's recommended that clients use one of these curves as their preferred curve during requests to avoid increased TLS handshake latency, which may result from multiple round trips to negotiate the supported EC curve.
34+
35+
## Predefined TLS policy
36+
37+
Azure Front Door offers several predefined TLS policies. You can configure your AFD with any of these policies to get the appropriate level of security. The policy names are annotated by the minimum TLS versions and the year in which they were configured (TLSv1.2_2023>). Each policy offers different TLS protocol versions and/or cipher suites. These predefined policies are configured keeping in mind the best practices and recommendations from the Microsoft Security team. We recommend that you use the newest TLS policies to ensure the best TLS security.
38+
39+
The following table shows the list of cipher suites and minimum protocol version support for each predefined policy. The ordering of the cipher suites determines the priority order during TLS negotiation.
40+
41+
By default, TLSv1.2_2023 will be selected. TLSv1.2_2022 maps to the minimum TLS 1.2 version in previous design. Some might see a read-only TLSv1.0/1.1_2019 which maps to the minimum TLS 1.0/1.1 version in previous design, because they don't specifically switch to minimum TLS 1.2 version. The TLSv1.0/1.1_2019 policy for such will be removed and disabled in April 2025.
42+
43+
| **OpenSSL** | **Cipher** **Suite** | **TLSv1.2_2023** | **TLSv1.2_2022** |
44+
|---|---|---|---|
45+
| **Minimum Protocol version** | | **1.2** | **1.2** |
46+
| **Supported Protocols** | | **1.3/1.2** | **1.3./1.2** |
47+
| **TLS_AES_256_GCM_SHA384** | TLS_AES_256_GCM_SHA384 | Yes | Yes |
48+
| **TLS_AES_128_GCM_SHA256** | TLS_AES_128_GCM_SHA256 | Yes | Yes |
49+
| **ECDHE-RSA-AES256-GCM-SHA384** | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 | Yes | Yes |
50+
| **ECDHE-RSA-AES128-GCM-SHA256** | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | Yes | Yes |
51+
| **DHE-RSA-AES256-GCM-SHA384** | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 | | Yes |
52+
| **DHE-RSA-AES128-GCM-SHA256** | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 | | Yes |
53+
| **ECDHE-RSA-AES256-SHA384** | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 | | Yes |
54+
| **ECDHE-RSA-AES128-SHA256** | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 | | Yes |
55+
56+
## Custom TLS policy
57+
58+
If a TLS policy needs to be configured for your requirements, you can use a Custom TLS policy. With a custom TLS policy, you have complete control over the minimum TLS protocol version to support, and the supported cipher suites and their priority order.
59+
60+
> [!NOTE]
61+
> TLS 1.3 is always enabled no matter what minimum version is enabled.
62+
63+
### Cipher suites
64+
65+
Azure Front Door supports the following cipher suites from which you can choose your custom policy. The ordering of the cipher suites determines the priority order during TLS negotiation.
66+
67+
- TLS_AES_256_GCM_SHA384 (TLS 1.3 only)
68+
- TLS_AES_128_GCM_SHA256 (TLS 1.3 only)
69+
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
70+
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
71+
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
72+
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
73+
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
74+
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
75+
76+
> [!NOTE]
77+
> For Windows 10 and later versions, we recommend enabling one or both of the ECDHE_GCM cipher suites for better security. Windows 8.1, 8, and 7 aren't compatible with these ECDHE_GCM cipher suites. The ECDHE_CBC and DHE cipher suites have been provided for compatibility with those operating systems.
78+
79+
## Next step
80+
81+
> [!div class="nextstepaction"]
82+
> [Configure TLS policy on Front Door](tls-policy-configure.md)

0 commit comments

Comments
 (0)