Skip to content

Commit 2b52802

Browse files
Merge pull request #214361 from alfpark/patch-24
Update batch-tls-101-migration-guide.md
2 parents 5204bcc + 7e30402 commit 2b52802

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/batch/batch-tls-101-migration-guide.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,18 @@ author: harperche
55
ms.author: harpercheng
66
ms.service: batch
77
ms.topic: how-to
8-
ms.date: 08/16/2022
8+
ms.date: 10/12/2022
99
---
1010

1111
# Migrate client code to TLS 1.2 in Batch
1212

13-
To support security best practices and remain in compliance with industry standards, Azure Batch will retire Transport Layer Security (TLS) 1.0 and TLS 1.1 in Azure Batch on *March 31, 2023*. Learn how to migrate to TLS 1.2 in the client code you manage by using Batch.
13+
To support security best practices and remain in compliance with industry standards, Azure Batch will retire Transport Layer Security (TLS) 1.0 and TLS 1.1 in Azure Batch on *March 31, 2023*. Learn how to migrate to TLS 1.2 in your Batch service client code.
1414

1515
## End of support for TLS 1.0 and TLS 1.1 in Batch
1616

1717
TLS versions 1.0 and TLS 1.1 are known to be susceptible to BEAST and POODLE attacks and to have other Common Vulnerabilities and Exposures (CVE) weaknesses. TLS 1.0 and TLS 1.1 don't support the modern encryption methods and cipher suites that the Payment Card Industry (PCI) compliance standards recommends. Microsoft is participating in an industry-wide push toward the exclusive use of TLS version 1.2 or later.
1818

19-
Most customers have already migrated to TLS 1.2. Customers who continue to use TLS 1.0 or TLS 1.1 can be identified via existing BatchOperation data. If you're using TLS 1.0 or TLS 1.1, to avoid disruption to your Batch workflows, update existing workflows to use TLS 1.2.
19+
If you've already migrated to use TLS 1.2 in your Batch client applications, then this retirement doesn't apply to you. Only API requests that go directly to the Batch service via the data plane API (not management plane) are impacted. API requests at the management plane layer are routed through ARM and are subject to ARM TLS minimum version requirements. We recommend that you migrate to TLS 1.2 across Batch data plane or management plane API calls for security best practices, if possible.
2020

2121
## Alternative: Use TLS 1.2
2222

@@ -36,19 +36,19 @@ For more information, see [TLS best practices for the .NET Framework](/dotnet/fr
3636

3737
- Why do I need to upgrade to TLS 1.2?
3838

39-
TLS 1.0 and TLS 1.1 have security issues that are fixed in TLS 1.2. TLS 1.2 has been available since 2008. TLS 1.2 is the current default version in most development frameworks.
39+
TLS 1.0 and TLS 1.1 are considered insecure and have security issues that are addressed in TLS 1.2. TLS 1.2 has been available since 2008. TLS 1.2 is widely adopted as the minimum version for securing communication channels using TLS.
4040

41-
- What happens if I dont upgrade?
41+
- What happens if I don't upgrade?
4242

43-
After the feature retirement from Azure Batch, your client application won't work until you upgrade the code to use TLS 1.2.
43+
After the feature retirement from Azure Batch, your client application won't be able to communicate with Batch data plane API services unless you upgrade to TLS 1.2.
4444

45-
- Will upgrading to TLS 1.2 affect the performance of my application?
45+
- Does upgrading to TLS 1.2 affect the performance of my application?
4646

47-
Upgrading to TLS 1.2 won't affect your application's performance.
47+
Upgrading to TLS 1.2 generally shouldn't affect your application's performance.
4848

4949
- How do I know if I’m using TLS 1.0 or TLS 1.1?
5050

51-
To determine the TLS version you're using, check the audit log for your Batch deployment.
51+
To determine the TLS version you're using, check your client application logs and the audit log for your Batch deployment.
5252

5353
## Next steps
5454

0 commit comments

Comments
 (0)