Skip to content

Commit 2c99d81

Browse files
committed
Added redirect links
1 parent ca20366 commit 2c99d81

File tree

2 files changed

+11
-1
lines changed

2 files changed

+11
-1
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42602,6 +42602,16 @@
4260242602
"source_path": "articles/security/fundamentals/mvp.md",
4260342603
"redirect_url": "https://mvp.microsoft.com/",
4260442604
"redirect_document_id": false
42605+
},
42606+
{
42607+
"source_path": "articles/azure-cache-for-redis/cache-how-to-troubleshoot.md",
42608+
"redirect_url": "/azure/azure-cache-for-redis/cache-troubleshoot-server",
42609+
"redirect_document_id": false
42610+
},
42611+
{
42612+
"source_path": "articles/azure-cache-for-redis/cache-howto-manage-redis-cache-powershell.md",
42613+
"redirect_url": "/azure/azure-cache-for-redis/cache-how-to-manage-redis-cache-powershell",
42614+
"redirect_document_id": false
4260542615
}
4260642616
]
4260742617
}

articles/azure-cache-for-redis/cache-deprecate-tls-10-11.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.author: yegu
2222

2323
There is an industry-wide push towards using TLS 1.2 or higher exclusively. TLS Versions 1.0 and 1.1 are known to be susceptible to attacks such as BEAST and POODLE and have other Common Vulnerabilities and Exposures (CVE) weaknesses. They also do not support the modern encryption methods and cipher suites recommended by PCI compliance standards. This [TLS security blog](https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-part/) explains some of these vulnerabilities in more details.
2424

25-
While none of these pose immediate problems, you should consider moving away from using TLS 1.0 and 1.1 as early as possible. Azure Cache for Redis will stop supporting these TLS versions starting on (date). Your application will be required to use at least TLS 1.2 in order to communicate with your cache after this date.
25+
While none of these pose immediate problems, you should consider moving away from using TLS 1.0 and 1.1 as early as possible. Azure Cache for Redis will stop supporting these TLS versions starting on March 31, 2020. Your application will be required to use at least TLS 1.2 in order to communicate with your cache after this date.
2626

2727
This article provides general guidance on how to detect and remove these dependencies from your application.
2828

0 commit comments

Comments
 (0)