Skip to content

Commit 30b1426

Browse files
author
gitName
committed
review comments
1 parent 470ec90 commit 30b1426

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

articles/api-management/api-management-howto-manage-protocols-ciphers.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -60,26 +60,28 @@ TLS 1.3 is a major revision of the TLS protocol that provides improved security
6060
6161
### Optionally enable TLS 1.3 when clients require certificate renegotiation
6262

63-
Client-side TLS 1.3 is disabled by default in certain classic tier instances that recently received API requests over TLS connections that used certificate renegotiation. Certificate renegotiation in TLS allows client and server to renegotiate connection parameters mid-session for authentication without terminating the connection. TLS-compliant clients that rely on certificate renegotiation are not compatible with TLS 1.3.
63+
TLS 1.3 doesn't support certificate renegotiation. Because of this, client-side TLS 1.3 is disabled by default on classic tier instances that recently handled requests with certificate renegotiation. Certificate renegotiation in TLS allows client and server to renegotiate connection parameters mid-session for authentication without terminating the connection.
6464

65-
In these instances, you can review recent API requests that used certificate renegotiation and choose whether to enable TLS 1.3 for client-side connections:
65+
In these instances, you can review recent API requests that used certificate renegotiation and choose whether to enable TLS 1.3 for client-side connections.
66+
67+
> [!WARNING]
68+
> If your APIs are accessed by TLS-compliant clients that rely on certificate renegotiation, enabling TLS 1.3 for client-side connections will cause those clients to fail to connect.
69+
70+
To enable TLS 1.3 for client-side connections in these instances, configure settings on the **Protocols + ciphers** page:
6671

6772
1. On the **Protocols + ciphers** page, in the **Client protocol** section, next to **TLS 1.3**, select **View and manage configuration**.
6873
1. Review the list of **Recent client certificate renegotiations**. The list shows API operations where clients recently used client certificate renegotiation.
6974
1. If you choose to enable TLS 1.3 for client-side connections, select **Enable**.
7075
1. Select **Close**.
7176

72-
After enabling TLS 1.3, review gateway request metrics or TLS-related exceptions in Application Insights that indicate TLS connection failures. If necessary, disable TLS 1.3 for client-side connections and downgrade to TLS 1.2.
77+
After enabling TLS 1.3, review gateway request metrics or TLS-related exceptions in logs that indicate TLS connection failures. If necessary, disable TLS 1.3 for client-side connections and downgrade to TLS 1.2.
7378

7479
If you need to disable TLS 1.3 for client-side connections in these instances, configure settings on the **Protocols + ciphers** page:
7580

7681
1. On the **Protocols + ciphers** page, in the **Client protocol** section, next to **TLS 1.3**, select **View and manage configuration**.
7782
1. Select **Disable**.
7883
1. Select **Close**.
7984

80-
> [!WARNING]
81-
> If your APIs are accessed by TLS-compliant clients that rely on certificate renegotiation, enabling TLS 1.3 for client-side connections will cause those clients to fail to connect.
82-
8385
### Backend-side TLS 1.3
8486

8587
Enabling backend-side TLS 1.3 is optional. If you enable it, API Management uses TLS 1.3 for connections to your backend services.

0 commit comments

Comments
 (0)