Skip to content

Commit 1e673bf

Browse files
committed
draft
1 parent 1714317 commit 1e673bf

File tree

1 file changed

+24
-1
lines changed

1 file changed

+24
-1
lines changed

articles/app-service/overview-tls.md

Lines changed: 24 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Transport Layer Security (TLS) overview
33
description: Learn about Transport Layer Security (TLS) on App Service.
44
keywords: app service, azure app service, tls, transport layer security, support, web app, troubleshooting,
55
ms.topic: article
6-
ms.date: 11/06/2023
6+
ms.date: 07/24/2024
77
ms.author: msangapu
88
author: msangapu-msft
99
ms.custom: UpdateFrequency3
@@ -32,5 +32,28 @@ To ensure backward compatibility for TLS 1.0 and TLS 1.1, App Service will conti
3232
> Incoming requests to web apps and incoming requests to Azure are treated differently. App Service will continue to support TLS 1.0 and 1.1 for incoming requests to the web apps. For incoming requests directly to Azure, for example through ARM or API, it's not recommended to use TLS 1.0 or 1.1.
3333
>
3434
35+
### TLS 1.3
36+
With TLS 1.3, a "Minimum TLS Cipher Suite" setting is now available. This includes two cipher suites at the top of the cipher suite order:
37+
- TLS_AES_256_GCM_SHA384
38+
- TLS_AES_128_GCM_SHA256
39+
40+
> [!NOTE]
41+
> Minimum TLS Cipher Suite is supported on Premium SKUs and higher on multi-tenant App Service.
42+
>
43+
44+
#### What are cipher suites and how do they work on App Service?
45+
46+
A cipher suite is a set of instructions that contains algorithms and protocols to help secure network connections between clients and servers. By default, the front-end's OS would pick the most secure cipher suite that is supported by both App Service and the client. However, if the client only supports weak cipher suites, then the front-end's OS would end up picking a weak cipher suite that is supported by them both. If your organization has restrictions on what cipher suites should not be allowed, you may update your web app’s minimum TLS cipher suite property to ensure that the weak cipher suites would be disabled for your web app.
47+
48+
#### App Service Environment (ASE) V3 with Cluster Setting "FrontEndSSLCipherSuiteOrder"
49+
50+
For App Service Environments with "FrontEndSSLCipherSuiteOrder" cluster setting, you need to update your settings to include two TLS 1.3 cipher suites (TLS_AES_256_GCM_SHA384 and TLS_AES_128_GCM_SHA256). Once updated, restart your front-end for the change to take effect. You must still include the two required cipher suites as mentioned in the docs.
51+
52+
## End-to-end TLS Encryption (preview)
53+
54+
End-to-end (E2E) TLS encryption is available in Standard App Service plans and higher. Front-end intra-cluster traffic between App Service front-ends and the workers running application workloads can now be encrypted. Below is a simple diagram to help you understand how it works.
55+
56+
INSERT-IMAGE-HERE
57+
3558
## Next steps
3659
* [Secure a custom DNS name with a TLS/SSL binding](configure-ssl-bindings.md)

0 commit comments

Comments
 (0)